SlideShare a Scribd company logo
Grids, Clouds and
Computation:
Getting to Ground Truth under Mostly Cloudy
Conditions

Presented by:
Steven Armentrout, PhD
President & CEO




                               © 2008 Parabon Computation, Inc. All rights reserved. | 1
History: Parabon Computation

 Founded in 1999
 Launched the first COTS grid platform –
 Frontier®
 Operate the only brokered computation service
 Customers in the government, academic,
 non-profit, and private sectors
 Sponsor of Compute Against Cancer®
 Privately-held small business based in Reston,
 VA
                                © 2008 Parabon Computation, Inc. All rights reserved. | 2
Overview

 Motivation and History
 How Parabon does ―cloud‖
 Applications
 Considerations




                            © 2008 Parabon Computation, Inc. All rights reserved. | 3
Is Cloud Computing Different than Grid
Computing?




                          © 2008 Parabon Computation, Inc. All rights reserved. | 4
Is Cloud Computing Different than Grid
Computing?




                 No




                          © 2008 Parabon Computation, Inc. All rights reserved. | 5
Cloud Computing’s Pedigree
                  (Syllables - Letters)

   Distributed    (4     - 11)
   Utility        (3     - 7)
   Internet       (3     - 8)
   Peer-to-Peer   (3     - 3) “P2P”
   Cluster        (2     - 7)
   Grid           (1     - 4)
   Cloud          (1     - 5)
   Net            (1     - 3)<- Prediction

                                   © 2008 Parabon Computation, Inc. All rights reserved. | 6
Is Cloud Computing Different than Grid
Computing?
 Distinguish Requirements and Implementation
 Key User Requirement:
 Resources delivered as on-demand utility
 services
     Applications
     Information
     Computation
 Implementation:
 Driven by other requirements
     Security
     Economics
     Technical constraints     © 2008 Parabon Computation, Inc. All rights reserved. | 7
Computation as a Utility

  “If computers of the kind I have
  advocated become the computers of
  the future, then computing may
  someday be organized
  as a public utility just as the telephone
  system is a public utility... The computer
  utility could become the basis of a new
  and important industry.”
     —John McCarthy, MIT Centennial in 1961
                               © 2008 Parabon Computation, Inc. All rights reserved. | 8
The Big Switch

 Recall the world before the Internet
 Imagine the world before electricity
 ―The Big Switch,‖ by Nicholas Carr
 (Jan 2008) draws strong parallels
 between the maturation of the
 electricity and computing industries

 The implications for IT are profound


                                 © 2008 Parabon Computation, Inc. All rights reserved. | 9
The Big Switch

  IT is racing toward a new paradigm:
  Computing delivered as an on-demand
  service
  The transformation is like that of the electric
  industry during the 20th century
  It’s the biggest IT transformation since
  the introduction of the World Wide Web



                                  © 2008 Parabon Computation, Inc. All rights reserved. | 10
Within the DoD, why now?
 Consumer market successes Awareness
 Unprecedented capability      Potential
 Technical advances            Feasibility
    Virtualization
    Security
 Economic pressures              Necessity
 Adoption by adversaries     Competition
 ―Retirement of the Boomers‖ Openness to
 change

                             © 2008 Parabon Computation, Inc. All rights reserved. | 11
Frontier Online Service




                          © 2008 Parabon Computation, Inc. All rights reserved. | 12
Frontier Online Service




                1. Security
                              © 2008 Parabon Computation, Inc. All rights reserved. | 13
Frontier Online Service




               4. Scalability
                            © 2008 Parabon Computation, Inc. All rights reserved. | 14
Frontier Online Service




                5. Usability
                               © 2008 Parabon Computation, Inc. All rights reserved. | 15
Frontier Enterprise




                      © 2008 Parabon Computation, Inc. All rights reserved. | 16
Frontier Enterprise




            6. Unobtrusiveness

                          © 2008 Parabon Computation, Inc. All rights reserved. | 17
Frontier Enterprise




              7. Ease of Admin.

                            © 2008 Parabon Computation, Inc. All rights reserved. | 18
Considerations: Locality

 1. Remote or Local
     Security
     Cost
     Data




                           © 2008 Parabon Computation, Inc. All rights reserved. | 19
Locksmith Decryption Service
NIJ          An online decryption service
NATIONAL
INSTITUTE
             to serve law enforcement
of JUSTICE   developed with AccessData®

             DNA Frontier




                                       Qu i ckTi me ™ an d a
                             TIFF (Un co mp re s se d) de co mp re s so r
                               a re ne ed ed to se e thi s p i ctu re .




    Only file headers need to be transmitted
    so Locksmith is suitable for a public grid.

                                                                            © 2008 Parabon Computation, Inc. All rights reserved. | 20
Considerations: User Interface

 Who are the end users?
     Unix wizards
     Support staff
     Warfighter




                          © 2008 Parabon Computation, Inc. All rights reserved. | 21
Frontier Dashboard




                     © 2008 Parabon Computation, Inc. All rights reserved. | 22
Frontier Dashboard




                     © 2008 Parabon Computation, Inc. All rights reserved. | 23
Watchman™




                   QuickTime™ and a
               TIFF (LZW) decompressor
            are neede d to see this picture.




                                               © 2008 Parabon Computation, Inc. All rights reserved. | 24
Watchman™




                   QuickTime™ and a
               TIFF (LZW) decompressor
            are neede d to see this picture.




                                               © 2008 Parabon Computation, Inc. All rights reserved. | 25
Watchman™




                   QuickTime™ and a
               TIFF (LZW) decompressor
            are neede d to see this picture.




                                               © 2008 Parabon Computation, Inc. All rights reserved. | 26
Watchman™




                   QuickTime™ and a
               TIFF (LZW) decompressor
            are neede d to see this picture.




                                               © 2008 Parabon Computation, Inc. All rights reserved. | 27
Watchman™




                   QuickTime™ and a
               TIFF (LZW) decompressor
            are neede d to see this picture.




                                               © 2008 Parabon Computation, Inc. All rights reserved. | 28
Considerations: Types of Applications

 What are the computational demands
 of the applications?

 Web apps    load = transactions / s
 Grid apps   load = calculations / s
 Data apps   load = throughput / s




                               © 2008 Parabon Computation, Inc. All rights reserved. | 29
NASA Origin
                     The Ultimate Source
                    from Which to Evolve   TM




   Automated design of spacecraft antenna




   Non-branching:                               Branching:
     ST5-4W-03                                   ST5-3-10

                                                © 2008 Parabon Computation, Inc. All rights reserved. | 30
NASA Origin
                    The Ultimate Source
                   from Which to Evolve   TM




   Automated design of spacecraft antenna
  Evolved antenna flew
  on three nanosats (20‖)
  for ST5 mission




                                               © 2008 Parabon Computation, Inc. All rights reserved. | 31
InSēquio™

  Synthetic DNA can be used as a nanoscale
  construction material and woven into designs




                            QuickTime™ and a
                        TIFF (LZW) decompressor
                     are neede d to see this picture.


                See CAD View of DNA




                                                        © 2008 Parabon Computation, Inc. All rights reserved. | 32
InSēquio™

      Using its complementary binding properties, DNA can
      be ―programmed‖ to self-assemble into target designs

9 DNA strands
    9 strands




                1 DNA motif         4x4 grid                                  8x8 grid




                                               © 2008 Parabon Computation, Inc. All rights reserved. | 33
The limit of microtechnology:
 1 micron box shown in blue
   on a smooth muscle cell




                                            100 nm



                            © 2008 Parabon Computation, Inc. All rights reserved. | 34
Using theof microtechnology:of DNA,
        The limit binding properties
         1 micron box shown in blue to be
         inSēquio enables molecules
           on a smooth muscle cell
            engineered at the nanoscale.


                        QuickTime™ and a
                    TIFF (LZW) decompressor
                 are neede d to see this picture.



80 nm




                                                                    100 nm



                                                    © 2008 Parabon Computation, Inc. All rights reserved. | 35
InSēquio™

  The resultant structures have the important property
  of being uniquely addressable.




                                        © 2008 Parabon Computation, Inc. All rights reserved. | 36
Applicable Domains for the D0D
Does your organization do any of the following?

Assembly planning          Evolutionary computation   Optimization
Biodefense                 Financial forecasting      Parameter studies
Bioinformatics             Genomic sequencing         Photorealistic Rendering
Biometrics (multi-modal)   Logistical planning        Proteomics
Combinatorial opt.         Machine learning           Psychometric profiling
Data mining                Modeling and               Robotic motion planning
Decision support           simulation                 Search
Decryption                 Molecular modeling         Statistical analysis
Drug discovery             Monte Carlo simulations    Steganography
Environmental modeling     Nanotechnology             Weather Prediction
                           Operations research




                                                  © 2008 Parabon Computation, Inc. All rights reserved. | 37
Considerations: Feature Set

 Business reporting capabilities
 Ease of administration
 Fault tolerance (―How many 9s?‖)




                               © 2008 Parabon Computation, Inc. All rights reserved. | 38
Considerations: Cost of Dedicated
Hardware
 100 node (200-400 core) cluster ~ $200,000 /
 yr
 (includes cost of power, space, cooling, labor &
 support)


 Frontier Online
     $0.10 - $0.30 / cap-hour (Ch)
     100 C @ $0.15 / Ch for 10 hrs = $150


 Frontier Enterprise
     A 10 : 1 price-performance advantage
                                      © 2008 Parabon Computation, Inc. All rights reserved. | 39
Final Considerations
 The DoD has ~5M desktops
 At 20% utilization, rougly $10B of capacity
 is wasted annually
 At the same time, there are few examples
 of high-value SOA mashups that demonstrate
 the value of this latent capacity
 This ―Mashup Gap‖ has resulted in
 requirements
 that may not live up to the demands of the
 applications that will ultimately create the most
 value for the DoD
                                  © 2008 Parabon Computation, Inc. All rights reserved. | 40
Q&A




      © 2008 Parabon Computation, Inc. All rights reserved. | 41

More Related Content

Viewers also liked

NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" Presentation
GovCloud Network
 
Dataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry LynnDataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry Lynn
GovCloud Network
 
Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02
GovCloud Network
 
Appistry How Google Overcame Wp
Appistry How Google Overcame WpAppistry How Google Overcame Wp
Appistry How Google Overcame Wp
GovCloud Network
 
Control Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateControl Implementation Summary (CIS) Template
Control Implementation Summary (CIS) Template
GovCloud Network
 

Viewers also liked (6)

Team Thunder Cloud
Team Thunder CloudTeam Thunder Cloud
Team Thunder Cloud
 
NVTC "Cool Tech" Presentation
NVTC "Cool Tech" PresentationNVTC "Cool Tech" Presentation
NVTC "Cool Tech" Presentation
 
Dataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry LynnDataline Tysons Corner 100808 Barry Lynn
Dataline Tysons Corner 100808 Barry Lynn
 
Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02Iaas Demonstration San Francisco Wildfire V.02
Iaas Demonstration San Francisco Wildfire V.02
 
Appistry How Google Overcame Wp
Appistry How Google Overcame WpAppistry How Google Overcame Wp
Appistry How Google Overcame Wp
 
Control Implementation Summary (CIS) Template
Control Implementation Summary (CIS) TemplateControl Implementation Summary (CIS) Template
Control Implementation Summary (CIS) Template
 

Similar to Grids Clouds Computation Steven Armentrout

Evento Startup Essential Barcelona
Evento Startup Essential BarcelonaEvento Startup Essential Barcelona
Evento Startup Essential Barcelona
Manuel Jaffrin
 
Proven and Emerging Use Cases of Software Defined Network
Proven and Emerging Use Cases of Software Defined NetworkProven and Emerging Use Cases of Software Defined Network
Proven and Emerging Use Cases of Software Defined Network
Open Networking Summits
 
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...
Continuous Computing
 
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdfAI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
Object Automation
 
A trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M networkA trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M network
Mocke Tech
 
A Trial Investigation System for Vulnerability on M2M Network
A Trial Investigation System for Vulnerability on M2M NetworkA Trial Investigation System for Vulnerability on M2M Network
A Trial Investigation System for Vulnerability on M2M Network
Kiyotaka Atsumi
 
Evolution des datacenters et des attentes du marché : La stratégie EMC
Evolution des datacenters et des attentes du marché : La stratégie EMCEvolution des datacenters et des attentes du marché : La stratégie EMC
Evolution des datacenters et des attentes du marché : La stratégie EMC
RSD
 
Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...
Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...
Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...
Charles Sonigo
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Anne Nicolas
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
confluent
 
E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015
Advantec Distribution
 
Performance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIOPerformance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIO
RSD
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
DataWorks Summit
 
Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...
Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...
Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...
Amazon Web Services
 
Your Flight is Boarding Now!
Your Flight is Boarding Now!Your Flight is Boarding Now!
Your Flight is Boarding Now!
MeetupDataScienceRoma
 
Machine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use casesMachine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use cases
ADVA
 
IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
 IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a... IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
HelpSystems
 
04122016 web rtc_globalsummit
04122016 web rtc_globalsummit04122016 web rtc_globalsummit
04122016 web rtc_globalsummit
Kensaku Komatsu
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
ThomasGraf40
 

Similar to Grids Clouds Computation Steven Armentrout (20)

Evento Startup Essential Barcelona
Evento Startup Essential BarcelonaEvento Startup Essential Barcelona
Evento Startup Essential Barcelona
 
Proven and Emerging Use Cases of Software Defined Network
Proven and Emerging Use Cases of Software Defined NetworkProven and Emerging Use Cases of Software Defined Network
Proven and Emerging Use Cases of Software Defined Network
 
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...
Evaluating Approaches to Building DPI into an LTE Network at the PDN Gateway ...
 
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdfAI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
 
A trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M networkA trial investigation system for vulnerability on M2M network
A trial investigation system for vulnerability on M2M network
 
A Trial Investigation System for Vulnerability on M2M Network
A Trial Investigation System for Vulnerability on M2M NetworkA Trial Investigation System for Vulnerability on M2M Network
A Trial Investigation System for Vulnerability on M2M Network
 
Evolution des datacenters et des attentes du marché : La stratégie EMC
Evolution des datacenters et des attentes du marché : La stratégie EMCEvolution des datacenters et des attentes du marché : La stratégie EMC
Evolution des datacenters et des attentes du marché : La stratégie EMC
 
Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...
Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...
Charles sonigo - Demuxed 2018 - How to be data-driven when you aren't Netflix...
 
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
Kernel Recipes 2018 - Mitigating Spectre and Meltdown (and L1TF) - David Wood...
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 
Arcati Mainframe Year Book 2011
Arcati Mainframe Year Book 2011Arcati Mainframe Year Book 2011
Arcati Mainframe Year Book 2011
 
E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015E pmp for public presentation feb 27 2015
E pmp for public presentation feb 27 2015
 
Performance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIOPerformance & agilité les atouts du datacenter électronique selon XtremIO
Performance & agilité les atouts du datacenter électronique selon XtremIO
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...
Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...
Amazon Prime Video: Delivering the Amazing Video Experience (CTD203-R1) - AWS...
 
Your Flight is Boarding Now!
Your Flight is Boarding Now!Your Flight is Boarding Now!
Your Flight is Boarding Now!
 
Machine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use casesMachine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use cases
 
IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
 IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a... IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
IBM i Development: Increase Accuracy and Efficiency with SEQUEL's ABSTRACT a...
 
04122016 web rtc_globalsummit
04122016 web rtc_globalsummit04122016 web rtc_globalsummit
04122016 web rtc_globalsummit
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 

More from GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
GovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
GovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
GovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
GovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
GovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
GovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
GovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
GovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
GovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
GovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
GovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
GovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

More from GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Grids Clouds Computation Steven Armentrout

  • 1. Grids, Clouds and Computation: Getting to Ground Truth under Mostly Cloudy Conditions Presented by: Steven Armentrout, PhD President & CEO © 2008 Parabon Computation, Inc. All rights reserved. | 1
  • 2. History: Parabon Computation Founded in 1999 Launched the first COTS grid platform – Frontier® Operate the only brokered computation service Customers in the government, academic, non-profit, and private sectors Sponsor of Compute Against Cancer® Privately-held small business based in Reston, VA © 2008 Parabon Computation, Inc. All rights reserved. | 2
  • 3. Overview Motivation and History How Parabon does ―cloud‖ Applications Considerations © 2008 Parabon Computation, Inc. All rights reserved. | 3
  • 4. Is Cloud Computing Different than Grid Computing? © 2008 Parabon Computation, Inc. All rights reserved. | 4
  • 5. Is Cloud Computing Different than Grid Computing? No © 2008 Parabon Computation, Inc. All rights reserved. | 5
  • 6. Cloud Computing’s Pedigree (Syllables - Letters) Distributed (4 - 11) Utility (3 - 7) Internet (3 - 8) Peer-to-Peer (3 - 3) “P2P” Cluster (2 - 7) Grid (1 - 4) Cloud (1 - 5) Net (1 - 3)<- Prediction © 2008 Parabon Computation, Inc. All rights reserved. | 6
  • 7. Is Cloud Computing Different than Grid Computing? Distinguish Requirements and Implementation Key User Requirement: Resources delivered as on-demand utility services  Applications  Information  Computation Implementation: Driven by other requirements  Security  Economics  Technical constraints © 2008 Parabon Computation, Inc. All rights reserved. | 7
  • 8. Computation as a Utility “If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility... The computer utility could become the basis of a new and important industry.” —John McCarthy, MIT Centennial in 1961 © 2008 Parabon Computation, Inc. All rights reserved. | 8
  • 9. The Big Switch Recall the world before the Internet Imagine the world before electricity ―The Big Switch,‖ by Nicholas Carr (Jan 2008) draws strong parallels between the maturation of the electricity and computing industries The implications for IT are profound © 2008 Parabon Computation, Inc. All rights reserved. | 9
  • 10. The Big Switch IT is racing toward a new paradigm: Computing delivered as an on-demand service The transformation is like that of the electric industry during the 20th century It’s the biggest IT transformation since the introduction of the World Wide Web © 2008 Parabon Computation, Inc. All rights reserved. | 10
  • 11. Within the DoD, why now? Consumer market successes Awareness Unprecedented capability Potential Technical advances Feasibility  Virtualization  Security Economic pressures Necessity Adoption by adversaries Competition ―Retirement of the Boomers‖ Openness to change © 2008 Parabon Computation, Inc. All rights reserved. | 11
  • 12. Frontier Online Service © 2008 Parabon Computation, Inc. All rights reserved. | 12
  • 13. Frontier Online Service 1. Security © 2008 Parabon Computation, Inc. All rights reserved. | 13
  • 14. Frontier Online Service 4. Scalability © 2008 Parabon Computation, Inc. All rights reserved. | 14
  • 15. Frontier Online Service 5. Usability © 2008 Parabon Computation, Inc. All rights reserved. | 15
  • 16. Frontier Enterprise © 2008 Parabon Computation, Inc. All rights reserved. | 16
  • 17. Frontier Enterprise 6. Unobtrusiveness © 2008 Parabon Computation, Inc. All rights reserved. | 17
  • 18. Frontier Enterprise 7. Ease of Admin. © 2008 Parabon Computation, Inc. All rights reserved. | 18
  • 19. Considerations: Locality 1. Remote or Local  Security  Cost  Data © 2008 Parabon Computation, Inc. All rights reserved. | 19
  • 20. Locksmith Decryption Service NIJ An online decryption service NATIONAL INSTITUTE to serve law enforcement of JUSTICE developed with AccessData® DNA Frontier Qu i ckTi me ™ an d a TIFF (Un co mp re s se d) de co mp re s so r a re ne ed ed to se e thi s p i ctu re . Only file headers need to be transmitted so Locksmith is suitable for a public grid. © 2008 Parabon Computation, Inc. All rights reserved. | 20
  • 21. Considerations: User Interface Who are the end users?  Unix wizards  Support staff  Warfighter © 2008 Parabon Computation, Inc. All rights reserved. | 21
  • 22. Frontier Dashboard © 2008 Parabon Computation, Inc. All rights reserved. | 22
  • 23. Frontier Dashboard © 2008 Parabon Computation, Inc. All rights reserved. | 23
  • 24. Watchman™ QuickTime™ and a TIFF (LZW) decompressor are neede d to see this picture. © 2008 Parabon Computation, Inc. All rights reserved. | 24
  • 25. Watchman™ QuickTime™ and a TIFF (LZW) decompressor are neede d to see this picture. © 2008 Parabon Computation, Inc. All rights reserved. | 25
  • 26. Watchman™ QuickTime™ and a TIFF (LZW) decompressor are neede d to see this picture. © 2008 Parabon Computation, Inc. All rights reserved. | 26
  • 27. Watchman™ QuickTime™ and a TIFF (LZW) decompressor are neede d to see this picture. © 2008 Parabon Computation, Inc. All rights reserved. | 27
  • 28. Watchman™ QuickTime™ and a TIFF (LZW) decompressor are neede d to see this picture. © 2008 Parabon Computation, Inc. All rights reserved. | 28
  • 29. Considerations: Types of Applications What are the computational demands of the applications? Web apps load = transactions / s Grid apps load = calculations / s Data apps load = throughput / s © 2008 Parabon Computation, Inc. All rights reserved. | 29
  • 30. NASA Origin The Ultimate Source from Which to Evolve TM Automated design of spacecraft antenna Non-branching: Branching: ST5-4W-03 ST5-3-10 © 2008 Parabon Computation, Inc. All rights reserved. | 30
  • 31. NASA Origin The Ultimate Source from Which to Evolve TM Automated design of spacecraft antenna Evolved antenna flew on three nanosats (20‖) for ST5 mission © 2008 Parabon Computation, Inc. All rights reserved. | 31
  • 32. InSēquio™ Synthetic DNA can be used as a nanoscale construction material and woven into designs QuickTime™ and a TIFF (LZW) decompressor are neede d to see this picture. See CAD View of DNA © 2008 Parabon Computation, Inc. All rights reserved. | 32
  • 33. InSēquio™ Using its complementary binding properties, DNA can be ―programmed‖ to self-assemble into target designs 9 DNA strands 9 strands 1 DNA motif 4x4 grid 8x8 grid © 2008 Parabon Computation, Inc. All rights reserved. | 33
  • 34. The limit of microtechnology: 1 micron box shown in blue on a smooth muscle cell 100 nm © 2008 Parabon Computation, Inc. All rights reserved. | 34
  • 35. Using theof microtechnology:of DNA, The limit binding properties 1 micron box shown in blue to be inSēquio enables molecules on a smooth muscle cell engineered at the nanoscale. QuickTime™ and a TIFF (LZW) decompressor are neede d to see this picture. 80 nm 100 nm © 2008 Parabon Computation, Inc. All rights reserved. | 35
  • 36. InSēquio™ The resultant structures have the important property of being uniquely addressable. © 2008 Parabon Computation, Inc. All rights reserved. | 36
  • 37. Applicable Domains for the D0D Does your organization do any of the following? Assembly planning Evolutionary computation Optimization Biodefense Financial forecasting Parameter studies Bioinformatics Genomic sequencing Photorealistic Rendering Biometrics (multi-modal) Logistical planning Proteomics Combinatorial opt. Machine learning Psychometric profiling Data mining Modeling and Robotic motion planning Decision support simulation Search Decryption Molecular modeling Statistical analysis Drug discovery Monte Carlo simulations Steganography Environmental modeling Nanotechnology Weather Prediction Operations research © 2008 Parabon Computation, Inc. All rights reserved. | 37
  • 38. Considerations: Feature Set Business reporting capabilities Ease of administration Fault tolerance (―How many 9s?‖) © 2008 Parabon Computation, Inc. All rights reserved. | 38
  • 39. Considerations: Cost of Dedicated Hardware 100 node (200-400 core) cluster ~ $200,000 / yr (includes cost of power, space, cooling, labor & support) Frontier Online  $0.10 - $0.30 / cap-hour (Ch)  100 C @ $0.15 / Ch for 10 hrs = $150 Frontier Enterprise  A 10 : 1 price-performance advantage © 2008 Parabon Computation, Inc. All rights reserved. | 39
  • 40. Final Considerations The DoD has ~5M desktops At 20% utilization, rougly $10B of capacity is wasted annually At the same time, there are few examples of high-value SOA mashups that demonstrate the value of this latent capacity This ―Mashup Gap‖ has resulted in requirements that may not live up to the demands of the applications that will ultimately create the most value for the DoD © 2008 Parabon Computation, Inc. All rights reserved. | 40
  • 41. Q&A © 2008 Parabon Computation, Inc. All rights reserved. | 41