The Crunch: ANU supercomputer and Gartner ITxpo

Powered by SC Magazine
 

Beastly boxes spin up in Canberra as Gartner's talking heads hit Sydney.

Gartner held its annual ITxpo in Sydney this week and The Crunch was there to chat with CIOs and hear what the "mastermind keynote" speaker, Telstra CEO David Thodey, had to say.

Thodey was under the spotlight on Tuesday, where he ruled out expanding the carrier's operations into the provision of IT services, telling analysts that he would rather the company stick to its knitting.

iTnews is running a caption competition related to Thodey's appearance at the ITxpo. Best caption wins an 8GB iPod Nano.

Other highlights from ITxpo included Andy Kyte, vice president of Gartner research, who said that orphaned applications were one of the biggest issues facing IT administrators.

Munir Kotadia also discovered he has something in common with Gartner analyst Robin Simpson - neither of them have any sympathy for iPhone owners who were infected by the rickrolling virus.

Click for a photo gallery from Gartner ITxpo.

In Canberra, meanwhile, Australia re-entered the big league of global supercomputing this week when a 140 teraflop beast was unveiled at the Australian National University.

The new system is the most powerful supercomputer in Australia. It was supplied by Sun Microsystems and contains 3,000 quad-core Intel Nehalem processors with 36TB of memory and a petabyte filesystem.

Kotadia was there with his camera.


The Crunch: ANU supercomputer and Gartner ITxpo
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 650

Vote