recommended reading

Congress Tells Energy Dept. to Develop 'Exascale' Computers in 10 Years

Denis Tabler/Shutterstock.com

Congress is directing the Energy Department to take the next decade to develop a new class of supercomputers capable of a quintillion operations per second to model nuclear weapons explosions, according to language in the 2014 National Defense Authorization Act passed by the House last week, with a Senate vote expected this week.

Department officials believe they could develop exascale supercomputers within 10 years, according to estimates offered at an Advanced Scientific Computing Advisory Committee meeting in Denver last month.

The exascale supercomputers will operate at a speed 1,000 times faster than the current record holder,  a machine developed by China’s National University of Defense Technology that performs just under 34 quadrillion calculations per second, William Harrod, an ASCR division director told the conference.

Besides weapons research and simulation, Harrod said exascale computers would help support processing of complex “big data” sets, including climate modeling and genomics, with the first system slated to go into operation in 2023.

Energy jump-started exascale computer development with contracts valued at $62.4 million awarded to AMD, IBM, Intel and NVIDIA in 2012 and followed up with $25.4 million in contracts to the same companies along with Cray in the fall of 2013.

These contracts cover system interconnect architectures, open network protocol standards, “massively threaded” multiple processors and energy efficient systems, Harrod said.

New architectures and algorithms need to be developed to support exascale computing, Rick Stevens, a lab director at Argonne National Laboratory, told a hearing of the Energy subcommittee of the House Science, Space and Technology Committee in May.

Exascale research also will need to significantly reduce electric power requirements, Stevens said. Today’s most powerful computers require a few megawatts at a cost of about $1 million per megawatt per year, he said. Even though exascale computers will operate 1,000 times faster, Stevens said, Argonne wants to hold power consumption down to 20 megawatts.

Harrod agreed, saying Energy plans to develop exascale computers that consume the same amount of energy as today’s supercomputers.

(Image via Denis Tabler/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.