Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:While I agree it's not as good as... (Score 1) 609

I agree with you. Also, I think I need to add to that the carriers the new WP7 phones came out on: AT&T and T-Mobile. AT&T has the iPhone and T-Mobile has the MyTouch 4G as their flagship phones. Moreover, until there are as many WP7 phone models as there are Android models, you can't really make a comparison between X number of total Android phones sold and Y number of total WP7 phones sold. That's apples and oranges. If you chose the same number of Android and WP7 phones and then compared their sales, I would guess that they'll be closer than the bogus numbers reported in the summary, especially since every major carrier has at least one Android phone and most have double digits.

I also think comparisons to the iPhone are overrated too. Yes, the comparison will be made, but Apple has really put all its eggs in one basket on purpose, while Microsoft, Blackberry, and Google have diversified their lineups and a single phone from any of those lineups is not designed to be all things to all people. So the fairness of the comparison is at least debatable. On top of that Apple was essentially first to the game and now has a huge base locked into their product and its easier to continue your wireless phone contract than break it and much easier to stick with the same smartphone OS. Which is at least part of the reason we see such "huge" iPhone sales every time a new one is released

Comment Re:You can't have their email address (Score 5, Insightful) 120

Back in the day (2004-2006), when Facebook was only for college students, email addresses on Facebook used to be mailto: links. Since crossing the collegiate network boundaries was more difficult than it is now (Facebook hadn't eroded basic privacy that far yet), having a person's email was a surefire way to make sure you found who you were looking for.

Once Facebook opened up to non-college students, I believe emails displayed on Facebook actually became images to harden them from harvesting by spam bots. This was before "granular" privacy controls, and so anyone who was your "friend" on Facebook could see your basic information, of which your email was a part.

Once Facebook was forced to introduce stricter/"easier" privacy controls, a user could restrict, on an per-individual basis, who could see their email(s). As a result, emails became text.

In regards to allowing exporting other users' information, I think Facebook would face a huge backlash from users and "game" developers, for different, though obvious reasons. However, the biggest reason this won't happen is because Facebook's goal is to hoard users' information by providing low barriers to entry and high barriers to exit.

Comment Re:Article Doesnt Say (Score 1) 159

Hey! I was on the team in '07. My area of expertise was parallelizing POV-Ray and I rushed to the center Tuesday morning when the power failed to reconstruct our POV-Ray run. If only our system ran as well as it looked. Stupid Apple xServes took up 4A per server. Probably why we went with IBM on '08 FTW!

Comment Re:Article Doesnt Say (Score 1) 159

I don't have links to results, but I was there for the first one and helped implement the second one. Prices are compiled by the teams but usually not in the press releases

  • 2007: University of Alberta with an SGI system
  • 2008: Indiana University/Technische Universität Dresden running an IBM Bladecenter

My guess is systems usually run in the $100K to $150K range. The fastest system in 2007 was from Tiawan made by Asus with prototype 45nm Xeons (released the day before the competition).

Comment Re:Article Doesnt Say (Score 1) 159

If you can reconstruct the applications you have to run (which are different every year) to run efficiently on the GPUs. Sometimes it takes months just to get them to compile on your configuration (think software written in FORTRAN70 by a non-Computer Scientist).

Comment Re:Article Doesnt Say (Score 1) 159

Your 36 Pico-ITX's wouldn't qualify. Teams are paired with vendors and some schools are paired together, for instance my university was paired with Technische Universität Dresden in 2008. You're allowed to customize, within reason, what comes in your server, but usually it's a system put together by the vendor and not purchased by the university because that's a considerable investment for a system that isn't anywhere near as powerful as current Top500 systems.

For example, in 2007, we had 9 Apple xServes connected by Myrinet 10G over 10Gig-E. I don't want to get into how power hungry or poor performing they were, but that system was completely provided by Apple and Myricom, but those 9 servers and that switch had a list price north of $100,000. The hardware was beautiful, but it didn't perform like the jet engine it looked and sounded like.

Once again, the point is to demonstrate that even undergraduates, who don't have a lot of experience or exposure to HPC, can construct and operate a small cluster. My guess is the cost of hardware isn't part of the contest because the hardware is provided by the vendor as a promotional expense and then returned to the vendor after the competition, costing the institutions very little.

Comment Re:Article Doesnt Say (Score 1) 159

Moreover, all hardware must be in production and unmodified

That's an odd requirement. IMO a team that could design and build their own hardware that's more efficient than off the shelf hardware should be encouraged to do so.

True, but the point of the competition isn't to show off the vendor, or even the hardware; it's to show off how easy it is for undergraduate students, using commodity hardware, to construct and run a cluster that has more computing power than the fastest supercomputers from a decade ago at a fraction of the TCO.

Comment Re:Article Doesnt Say (Score 1) 159

The point of the "unmodified, in production" simply means that you have to use off-the-shelf equipment. As the organizers put it, if someone wanted to walk up and buy your cluster, or an exact copy, they should be able to.

You're right that it's hard to fill a full rack, even with 4U servers that use 120mm fans, but I believe Stony Brook came the closest because they were using ULV Xeons. They had 16 servers I think and each was 4U

As far as fun, it was incredible and very stressful

Comment Re:Article Doesnt Say (Score 3, Interesting) 159

Having participated in the first of the Student Cluster Challenges at SC07 when I was still in undergrad, I can attest that there's far more to this than what the summary lets on. Not only are you limited to 26 Amps, which is the significant limiting factor, but you're located on the show floor and running your system for 36 hours straight in front of the conference attendees. Moreover, all hardware must be in production and unmodified and fit within a single rack. The Taiwanese team lucked out in this regard as they were using the (then new) 45nm Intel Xeons that were announced the day before the competition started. The only thing you can modify is the code for the programs you have to run (except for the HPC benchmarks).

Some of you might be thinking "pfff...I can stay awake for 36 hours, no problem". That's true, but you're not allowed to be in your booth for more than 12 hours straight and after you leave you must take an 8 hour break. Furthermore, the machines are firewalled from all incoming connections and do not share the same internet connection that the rest of the conference uses.

At SC07, there was a significant power failure on the second day of the competition which brought most teams to their knees. The applications we were running (GAMESS, POP, POV-RAY) are not designed to pick up from a power failure. While the Taiwanese had by far the most powerful system, they couldn't recover from the power failure that had corrupted their SAN in time to win.

To your point, I'm not sure you could get 158 Atoms in a set of off-the-shelf servers that would fit in a single rack to equal a cluster running the latest E series Xeons that perform at top clock but have a lower TDP.

Comment Re:Depth of Field (Score 1) 255

Call me back when they fix the depth of field issue. The whole scene needs to be in focus so that when my eyes aren't looking at precisely what the director wants, my eyes don't try to focus on something that can't be focused on.

Unfortunately, I'm not sure if optical technology is capable of this. Each "eye" of a 3D camera has to focus on something by its very nature. Where this doesn't apply is with CGI. The only movie I've ever seen in 3D was Toy Story 3. While it wasn't worth the extra cost to see the 3D, 3D meant everything was in focus so you could look anywhere on screen and not just where the director wanted you to look.

Comment Re:in after 3000 "HURR it would bankrupt them" jok (Score 1) 148

I agree, but my first thought was that Microsoft produces more software than Google and Mozilla combined, which creates a much larger footprint for vulnerability. This, combined with the fact that some of their software is supported for up to 13 years after it's released (Windows XP), means that it very well would cost them a fortune. And by the time they stop supporting their software, attacks which never existed in anyone's wildest wet dreams have appeared, and the 12-year-old software wasn't designed and can't be significantly rearchitected to handle such attacks. A few examples that come to mind are Windows XP and ASLR or IE 6 and ActiveX.

I also think your point that Microsoft wants people doing this for the right reasons holds significant water. Paying someone a bounty provides the wrong motivation because, instead of Microsoft and the researcher being aligned in a common goal to make software safer, the researcher and Microsoft sit at opposite ends of the table because one side wants to maximize, while the other side wants to minimize, the bounty. If the researcher goes in knowing they aren't going to get paid then there's less incentive for viewing Microsoft as a rich organization to be fleeced and more incentive to work together. Unfortunately, it seems that the researchers think they hold more cards than they do and want to get paid a bounty because "everyone else does" and it would be easy money.

The Internet

Over a Third of the Internet Is Pornographic 247

Th'Inquisitor writes "Pornography makes up 37% of the total number of web pages online, according to a new study published by Optenet, a SaaS provider. According to the report, which looked at a representative sample of around four million extracted URLs, adult content on the Internet increased by 17% in the first quarter of 2010, as compared to the same period in 2009."

Slashdot Top Deals

Life is a whim of several billion cells to be you for a while.

Working...