Defence seeks supercomputing cluster

 

To spend $250,000 on engineering modelling machine.

The Defence Science and Technology Organisation (DSTO) has issued tender documents seeking supercomputer hardware to run its engineering modelling software suites.

It offered up to $250,000 for a “medium-scale high performance computing cluster” capable of performing large-scale, memory-intensive calculations in parallel.

The cluster would be used to model radiation and fluid dynamics using iterative Monte-Carlo simulations, ANSYS Fluent and OpenFOAM software.

As part of the tender process, tenderers were required to run two benchmark cases using ANSYS and OpenFOAM software.

Tender documents stated that the new cluster would “substantially increase the modelling capability of DSTO by significantly reducing the computation time required to model and simulate increasingly complex physics”.

The cluster was expected to be scalable and able to be rack-mounted on DSTO’s full-depth, 19-inch iPAMM server rack with two power distribution units and rack cooling solutions.

DSTO required it to use quad data rate InfiniBand links and high-performance processors – at minimum, 2.66 GHz Intel processors or 2.0 GHz AMD processors.

Tenderers were required to perform all on-site installation and integration work and provide a three-year warranty for all hardware, as well as software support and maintenance for that period.

The contractor would maintain DSTO’s Red Hat Enterprise Linux operating system, cluster software environments and management tools, job queuing and messaging systems, and hardware fault diagnostic tools.

DSTO called for the tenderer to have a Melbourne-based office or other means of providing next business day, on-site technical support and scheduled maintenance.

Tender applications were invited until 14 October. DSTO expected to sign the contract by early December.

Copyright © iTnews.com.au . All rights reserved.


Defence seeks supercomputing cluster
 
 
 
Top Stories
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1008

Vote