December 13, 2004
Cyber Security Industry Alliance (CSIA), the only CEO-led public policy and advocacy group exclusively focused on cyber security policy, called on federal agencies and the Bush administration to strengthen the cyber infrastructure and protect end users from cyber attacks. CSIA urges the White House to ensure federal agencies follow through on the President's National Strategy to Secure Cyberspace by acting on 12 important recommendations identified by the cyber security industry and adopting a concrete agenda to further protect the nation against cyber threats.
The U.S. economy is faced with losses of billions of dollars due to increased cyber attacks. To help stop this hemorrhaging, protect the critical infrastructure and enable the next round of innovation on the Internet, the administration must assert greater leadership in addressing cyber security. The 12 steps outlined by CSIA represent concrete actions the Federal government can take that will raise the profile of cyber security, promote information sharing, threat analysis and contingency planning, as well as boost efforts in research and development, and security education. In addition, they will serve to strengthen the collaboration between federal agencies and the private sector on information security issues.
"The Bush administration has made significant improvements to cyber security but there is still more that must be done to harden our economy and critical infrastructure against potential cyber attacks," said Paul Kurtz, executive director of Cyber Security Industry Alliance and one of the original developers of the President's National Strategy to Secure Cyberspace. "CSIA believes that the time for action is now. We have moved beyond the discussion and planning phase and have identified concrete actions that can be taken by the administration to immediately improve the security of our nation's cyber systems."
CSIA calls on federal agencies and the White House to lead by example from a cyber security perspective by implementing the following 12 recommendations:
"CSIA is committed to working with the administration to act on the President's National Strategy to Secure Cyberspace in a collaborative effort to improve cyber security across the public and private sectors," said John W. Thompson, chairman and chief executive officer of Symantec and chairman of the CSIA. "We face serious threats and vulnerabilities to the national information infrastructure that must be met head on with strong leadership by our administration."
Large-scale, worldwide scientific initiatives rely on some cloud-based system to both coordinate efforts and manage computational efforts at peak times that cannot be contained within the combined in-house HPC resources. Last week at Google I/O, Brookhaven National Lab’s Sergey Panitkin discussed the role of the Google Compute Engine in providing computational support to ATLAS, a detector of high-energy particles at the Large Hadron Collider (LHC).
Frank Ding, engineering analysis & technical computing manager at Simpson Strong-Tie, discussed the advantages of utilizing the cloud for occasional scientific computing, identified the obstacles to doing so, and proposed workarounds to some of those obstacles.
The private industry least likely to adopt public cloud services for data storage are financial institutions. Holding the most sensitive and heavily-regulated of data types, personal financial information, banks and similar institutions are mostly moving towards private cloud services – and doing so at great cost.
May 16, 2013 |
When it comes to cloud, long distances mean unacceptably high latencies. Researchers from the University of Bonn in Germany examined those latency issues of doing CFD modeling in the cloud by utilizing a common CFD and its utilization in HPC instance types including both CPU and GPU cores of Amazon EC2.
May 10, 2013 |
Australian visual effects company, Animal Logic, is considering a move to the public cloud.
May 10, 2013 |
Program provides cash awards up to $10,000 for the best open-source end-user applications deployed on 100G network.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.