Secure Networked Computing

Author(s):  
Vijay Varadharajan
Keyword(s):  
Author(s):  
Murray Goulden

The internet of things (IoT)—the embedding of networked computing into the material world around us—seeks to reshape our everyday lives. To address the IoT is to address the material interface between the global digital networks of the twenty-first-century economy and the mundane doings, affects, and experiences which occupy the great majority of our existence. Taking domestic IoT, the so-called smart home, as a focus, the author argues that the IoT is more than simply an intensification of existing trends, the ongoing extension of computing connectivity which has already jumped from desktop to laptop to smartphone. In breaking out of the constraints of any single personal device, no matter how mobile, the IoT not only further dissolves the spatial and temporal distance between different social domains but also profoundly implicates social life within those domains, between the members of the setting. The IoT is constitutionally social in a way in which no type of social media is. The chapter provides a consideration of the political economy at play in the smart home, before addressing everyday life and the IoT in terms of information management, control, domestic labor, and resistance. In concluding, two key features of the IoT are highlighted: world folding, whereby incommensurate social domains are layered through one another with often problematic—even absurd—results and its misconceived efforts to erase the social frictions of everyday life, which fails to recognize that it is in these frictions that so much of what is socially valuable resides.


Author(s):  
Wolfgang Gentzsch

A Grid enables remote, secure access to a set of distributed, networked computing and data resources. Clouds are a natural complement to Grids towards the provisioning of IT as a service. To “Grid-enable” applications, users have to cope with: complexity of Grid infrastructure; heterogeneous compute and data nodes; wide spectrum of Grid middleware tools and services; the e-science application architectures, algorithms and programs. For clouds, on the other hand, users don’t have many possibilities to adjust their application to an underlying cloud architecture, because of its transparency to the user. Therefore, the aim of this chapter is to guide users through the important stages of implementing HPC applications on Grid and cloud infrastructures, together with a discussion of important challenges and their potential solutions. As a case study for Grids, we present the Distributed European Infrastructure for Supercomputing Applications (DEISA) and describe the DEISA Extreme Computing Initiative (DECI) for porting and running scientific grand challenge applications on the DEISA Grid. For clouds, we present several case studies of HPC applications running on Amazon’s Elastic Compute Cloud EC2 and its recent Cluster Compute Instances for HPC. This chapter concludes with the author’s top ten rules of building sustainable Grid and cloud e-infrastructures.


2011 ◽  
Vol 14 (5) ◽  
pp. 798-814 ◽  
Author(s):  
Sandra Braman

Discourse analysis of the technical document series that records the internet design history, the RFCs, shows that those involved during the first decade saw privacy as a multi-dimensional and interactive problem requiring use of a suite of solutions at the network, individual, and data levels that had to take into account the need to balance privacy against experimentation and innovation. Internet designers were sophisticated in their pragmatic thinking about privacy when evaluated vis-a-vis theoretical developments since that time, viewing privacy as a contextual matter involving boundary setting, and using information architecture and metadata as tools for privacy protection. Those in the social science and legal communities think about the privacy effects of communication on humans, while those in the technical design community must focus on privacy as a set of logistical problems. Bringing these diverse communities into a single conversation can considerably enrich and strengthen the work of all.


2005 ◽  
Vol 43 (10) ◽  
pp. 69-75 ◽  
Author(s):  
D. Agrawal ◽  
Kang-Won Lee ◽  
J. Lobo

Sign in / Sign up

Export Citation Format

Share Document