Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Start-up transforms unused desktop cycles into fast server clusters

November 29 2010

When you consider technologies that make corporate IT more efficient by improving utilization of computing resources, VMware and its x86 virtualization software may be what that comes to mind.
But there's a newer, much smaller vendor on the scene that has attracted numerous Fortune 500 customers with grid and cloud management technology that reuses wasted compute cycles and automates the process of building HPC clusters.
Microsoft turns Windows Azure into cloud-based supercomputer
Cycle Computing, founded five years ago primarily to help customers use Condor, a workload management system that can run compute-intensive jobs on idle PCs, has grown to manage numerous job scheduling systems, help customers reuse wasted capacity in VMware installations, and support cloud services such as Amazon's Elastic Compute Cloud.
At the recent SC10 supercomputing conference in New Orleans, founder and CEO Jason Stowe ticked off an impressive list of customers, including JP Morgan Chase, Pacific Life, Lockheed Martin, Eli Lilly, Pfizer, Bank of America, Electronic Arts, Johnson & Johnson, and ConocoPhillips. JP Morgan Chase, for example, uses Cycle Computing technology to run large calculations on desktop cycles that would otherwise go to waste, according to Stowe.
Cycle is bootstrapped with no external investors, and pulls in "a couple million dollars" in revenue from fewer than 100 customers, according to Stowe. Cycle has fewer than 20 employees and has been growing revenue 50 percent a year for the last four years, he says.
Just as VMware borrowed technology from IBM's mainframe and applied it to the modern data center composed of x86 servers, Cycle Computing has taken strategies based on decades-old research and adapted them to the age of cloud computing and virtualization.
The idea of harnessing unused cycles from desktops to build a computing cluster has "been around for 20 years at this point," IDC analyst Steve Conway says. (Condor itself was started nearly 25 years ago). Cycle Computing has succeeded because it automates the difficult tasks that have to be performed by IT administrators, Conway notes, saying "Everyone's looking for ease of use."
But Conway says what he's most excited about regarding Cycle Computing is the vendor's long-term plan for making clustering technology viable in cloud computing services like Amazon EC2. While Conway believes the technology is not quite there today, over the next few years "it could be possible to replicate in public clouds the corporate, on-premise computing environment, with all the policies, directives, and all the rest of that intact. It truly can be an elastic extension of the corporate environment."

View more news

 
  Most Popular
 
 
  Popular Searches
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html