My main question however, is this. Will it exploit a cluster without any extra help from me? Or are we talking some major hardcore code input from the user?
I'm talking about clustering under Linux, btw. Oh, and any input on the possibilty of doing the same thing with different software, would be a plus.