May 11, 2011
This week a number of documents emerged that revealed a few key spending projects for the National Security Agency, the clandestine intelligence division the in the United States.
Although most of the NSA’s budget is closed to public scrutiny, Department of Defense budget documents revealed that the agency will be home to an $895.6 million supercomputing center by the close of 2015. This center will be housed in Fort Meade, Maryland, where the agency is headquartered.
Reports indicate that the scale of this new center will rival the gargantuan data center Microsoft just constructed in Chicago with around 700,000 square feet. The center will employ some of the latest developments in data center efficiency design, including a raised floor with water cooling and extensive emergency preparedness features to prevent damage from fire and natural disasters.
J. Nicholas Hoover reported that, not surprisingly, this center will use top of the line security tools with around $15.1 million of the budget being allocated to secure building design and internal security and another $21.7 million being poured into perimeter control, which will include massive surveillance and intrusion detection systems.
Information Week provided some background on the story, noting that the NSA has been on the cutting edge of HPC use since the mid-1970s with its first purchase of a Cray machine, which now sits on display at the National Cryptologic Museum along a wide array of dated spy tools.
The report also indicates that in addition to the new supercomputing facility, there is an additional “$944 million 2012 request for the NSA’s new cybersecurity data center under construction at Camp Williams, Utah.” This new facility will be dedicated to “continuing development of more advanced cryptography for nuclear command and control systems and building partnerships with the IT and communications sectors on mobile applications and cloud security.”
The fact that cloud and mobile security are on the agenda should come as no surprise. Undoubtedly, the NSA relies extensively on a broad range of devices and cloud-delivered data sources (and cloud-bound information transmissions). While there are few details about what types of devices and portals the NSA uses, it also stands to reason that they will be making use of the increasingly available pools of both public and classified information—this “big data” that is on the tip of everyone’s tongue these days—to find innovative ways to track and understand activity. At the root of all of this information access and mobility is the cloud and for an agency with security in its name, discovering they are making inroads in this area is no surprise.
Full story at Information Week
Researchers from the Suddhananda Engineering and Research Centre in Bhubaneswar, India developed a job scheduling system, which they call Service Level Agreement (SLA) scheduling, that is meant to achieve acceptable methods of resource provisioning similar to that of potential in-house systems. They combined that with an on-demand resource provisioner to ensure utilization optimization of virtual machines.
Experimental scientific HPC applications are continually being moved to the cloud, as covered here in several capacities over the last couple of weeks. Included in that rundown, Co-founder and CEO of CloudSigma Robert Jenkins penned an article for HPC in the Cloud where he discussed the emergence of cloud technologies to supplement research capabilities of big scientific initiatives like CERN and ESA (the European Space Agency)...
When considering moving excess or experimental HPC applications to a cloud environment, there will always be obstacles. Were that not the case, the cost effectiveness of cloud-based HPC would rule the high performance landscape. Jonathan Stewart Ward and Adam Barker of the University of St. Andrews produced an intriguing report on the state of cloud computing, paying a significant amount of attention to the problems facing cloud computing.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.