recommended reading

These Two Guys Tried to Rebuild a Cray Supercomputer

UCAR

There was a time when the word "supercomputer" inspired the same sort of giddy awe that infuses Superman or Superconducting Supercollider. Asupercomputer could leap tall buildings in a single bound and peer into the secrets of the universe. 

And chief among this race of almost mythical machines was the Cray. His first computer, the Cray 1, debuted in 1976, and was the embodiment of all the power that crackled around the supercomputer. It weighed 10,500 pounds. Thirty humans were necessary to help install it. And its first users built nuclear weapons: Model No. 1 went to Los Alamos National Laboratory. Eventually Cray sold 80. 

I love this description of its capabilities and style from the National Center for Atmospheric Research (which got Cray's third machine):

With the help of newly designed integrated silicon chips, the Cray-1 boasted more memory (one megabyte) and more speed (80 million computations per second) than any other computer in the world. The Cray’s bold look also set the machine apart. Its orange-and-black tower, curved to maximize cooling, was surrounded by a semicircle of padded seats—dubbed an "inverse conversation pit" by one observer—that hid the computer’s power supplies.

One megabyte of memory! 80 million computations per second! Current smartphones blow away that kind of performance.

But still, there's something to the Cray.

And so, as GigaOm reports, two hobbyists,  Chris Fenton and Andras Tantos, decided to try to recreate the machine, but at desktop scale.

The physical form was relatively easy to put together. They used a CNC machine, painted the wood model, and covered the "semicircle" with pleather. The hardware was easy to get a hold of, too.

"It wasn’t difficult to find a board option that could handle emulating the original Cray computational architecture. Fenton settled on the $225 Spartan 3E-1600, which is tiny enough to fit in a drawer built into the bench," GigaOm writes. "Considering the first Crays cost between $5 and 8 million, that’s a pretty impressive bargain."

Fenton and Tantos

The thing that turned out to be tricky, actually, was the software. No one had preserved a copy of the Cray operating system. Not the Computer History Museum. Not the U.S. government. It was just gone. 

Fenton searched high and low, eventually finding an old disc pack that contained a later version of the Cray OS. Restoring the software to usable condition proved a ridiculously ornate task, which Tantos, a Microsoft engineer took over. And, after a year of work, they're finally getting somewhere:

[Tantos] rewrote the recovery tools, plus a simulator for the software and supporting equipment like printers, monitors, keyboards and more. For the greater part of the last year, he arduously reverse engineered the OS from the image. Despite a few remaining bugs, the Cray OS now works.

For them and for us, this should serve as a reminder that computing eats its own history. The Cray was the supercomputer, and not a single historian or archivist can show you the working object itself.

Luckily, the world has nerds like Chris Fenton and Andras Tantos. Thanks.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.