Free

Berkeley Open Infrastructure for Network Computing (BOINC) - Essay Example

Comments (0) Cite this document
Summary
BOINC has made it possible for researchers to harvest the massive processing capability of personal computers globally. The BOINC client-server technology is necessary for the BOINC platform to operate. The BIONIC structure integrates two layers that function under the client-server structural design. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Berkeley Open Infrastructure for Network Computing (BOINC)
Read TextPreview

Extract of sample "Berkeley Open Infrastructure for Network Computing (BOINC)"

Berkeley Open Infrastructure for Network Computing (BOINC) When I installed BOINC, that was an open source middleware system for grid computing and volunteering, I learned that it works in a number of ways. Since it has a high number of participants and active computer hosts who generate a worldwide data processing capability, it is being applied in diverse fields, such as medicine, Mathematics, Climatic, Astrophysics, and Environmental Science.
BOINC has made it possible for researchers to harvest the massive processing capability of personal computers globally. The BOINC client-server technology is necessary for the BOINC platform to operate. The BIONIC structure integrates two layers that function under the client-server structural design. In addition, numerous installations of BOINC are currently supported across all of the applications. I have learned that various operating systems, such as Linux, Microsoft Windows, and Mac OS support the framework (Ries and Christian 10).
Firms, such as IBM have tapped into the numerous unused processors to speed up significant scientific research. For example, I screen and conduct experiments on cancer drug candidates daily. When I am not helping cancer patients, I am busy trying to solve other global problems, such as clean energy, world hunger, and AIDS. This is a breathtaking portfolio for me, especially considering that I did not take a single biology or chemistry class in college. I am among the increasing number of innovators who have joined IBM’s World Community Grid (González et al. 49).
This effort by IBM draws citizen researchers from the public who use the ordinary people’s computers to create open and free-source lab for global researchers. Since I installed BOINC, I have learned that substantial computational research is broken down into isolated problems and then installed across the vast network. I have also learned that more than a million volunteers in 220 countries have offered 1.5 million desktops and laptops since IBM launched the service in 2004. The grid’s raw computing power is comparable to a top-10 supercomputer. It would take the average personal computer more than 320,000 years to collect the data and complete the calculations performed by the grid so far (González et al. 22)
Joining and installing BOINC was more gratifying than writing a check to fund the research. It has provided me with an opportunity to participate and feel part of the scientific journey towards life-changing solutions. The project names that include Clean Energy Project, Help Conquer Cancer, and FightAids@Home are very inspiring and deeply personal for me since I have relatives and friends with cancer. The application makes me feels that I am contributing and doing something on behalf of these friends. It makes me feel good that I am giving back to the community and that I am giving some meaning to the loss in the world (Ries and Christian 10).
Works Cited
González, Daniel Lombrana, et al. "Interpreted applications within boinc infrastructure." Ibergrid 2008. 2nd Iberian Grid Infrastructure Conference Proceedings. 2008. Print.
Ries, Christian Benjamin, and Christian Schröder. "ComsolGrid–A framework for performing large-scale parameter studies using COMSOL Multiphysics and the Berkeley Open Infrastructure for Network Computing (BOINC)." Proc. COMSOL Conf. 2010. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Berkeley Open Infrastructure for Network Computing (BOINC) Essay”, n.d.)
Berkeley Open Infrastructure for Network Computing (BOINC) Essay. Retrieved from https://studentshare.org/information-technology/1693874-berkeley-open-infrastructure-for-network-computing-boinc
(Berkeley Open Infrastructure for Network Computing (BOINC) Essay)
Berkeley Open Infrastructure for Network Computing (BOINC) Essay. https://studentshare.org/information-technology/1693874-berkeley-open-infrastructure-for-network-computing-boinc.
“Berkeley Open Infrastructure for Network Computing (BOINC) Essay”, n.d. https://studentshare.org/information-technology/1693874-berkeley-open-infrastructure-for-network-computing-boinc.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Berkeley Open Infrastructure for Network Computing (BOINC)

Network Infrastructure and Design

...? Network Infrastructure and Design Network Infrastructure and Design The IPv6 Implementation and its Configuration Plan Being the latest version of the Internet Protocol, the implementation of the IPv6 has been proposed. The implementation is hoped to serve as the protocol for primary communication and it is upon this protocol that the entire internet infrastructure will be founded. The implementation of the IPv6 will allow for the assignment of extra addresses, a situation which would be difficult with IPv4. Moreover, the choice of IPv6 has been arrived at following the realization that there are a number of compatibility issues while transiting from the IPv4. Thus, the choice has been made for the purpose of eliminating future... or...
18 Pages(4500 words)Term Paper

Network Infrastructure Term Paper

...? Full Paper Executive Overview Our organization’s network proposal assures significant cost savings by deploying the appropriate technology extracted by a solid risk assessment and cost benefit analysis for the network. For this reason, stakeholders will trust data and their investments, as the network proposal is strategically aligned with current and potentially planned new business objectives, seeking for future expansions of the computer network. Moreover, for addressing security, a comprehensive information security risk assessment is conducted that identifies critical assets and vulnerable points of the computer network. Likewise, adequate security controls that are considered within the network proposal are also justified... domain...
5 Pages(1250 words)Term Paper

Network Infrastructure Planning

...? Network Infrastructure Planning Network Infrastructure Planning Permissions are the core component of server security architecture that can be applied to manage the process of authenticating groups, users and computers to have access to files in a network (Bruce & Smith, 2011). Permission software are the most helpful infrastructure to help the fashion-ware company control the operations of the satellite branches at different times of the 24 hours in a day and still share the same resources at the central server at the head office. In a bid to reduce the cost of setting up new systems for each of the satellite branches,...
3 Pages(750 words)Research Paper

Network Infrastructure Planning

...? Network Infrastructure Planning Lecturer: Introduction Microsoft has developed a powerful public cloud that can be used to achieve some computing objectives in various methods. For example. Windows Azure can be used to create web applications whose data is kept in a windows Azure datacenters. The application runs o site while the data that is worked on is stored in windows Azure. Windows azure can be used to build machines which are virtual where development and test runs SharePoint. Windows azure can assist in solving the storage issues since it offers unlimited space that can be used by very many users. One of the key computer features of windows SharePoint is its...
5 Pages(1250 words)Research Paper

Network Infrastructure Assignment

...and should be seen as a basis for your creativity. The existing network infrastructure consists of standalone LANs in both headquarters and not networked computer systems in other locations. The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both headquarters have an urge in establishing reliable and cost-effective printing...
12 Pages(3000 words)Assignment

Cloud Computing

...and controls the infrastructure, network, servers, storage and application capabilities. (2) Platform as a Service (PaaS) allows the consumer to deploy an in-house created application to the cloud infrastructure but still does not control or manage the cloud network environment, servers, operating systems or storage (Mell and Grance, 2009, p.2). The consumer has control over the applications and possibly some environment configurations where the application is hosted. (3) Infrastructure as a Service (IaaS) allows the consumer to rent the computing resources necessary to deploy and run operating systems and applications without having...
7 Pages(1750 words)Essay

WalMart's profile of computing and network infrastructure

...=131473&path=0:5436:127843:131473#null Wal-Mart Computing and Network Infrastructure The goal of Wal-Mart Stores, Inc., was not to be dependent on one computer supplier when selecting processors for its almost 1,600 stores. According to Mark Schmidt, senior director for information services at Wal-Mart, the installation of NCR System 3000 processors -- which began last month in the Springfield, Mo., stores -- is the second phase of a systems upgrade at the chain that began in August 1990 with the installation of Hewlett-Packard's HP 9000 Model 375 system. The retailer chose to purchase both systems so that "we have two vendor partners to bank on," said Schmidt....
5 Pages(1250 words)Essay

Network Infrastructure

...of choice and should be seen as a basis for your creativity. The existing network infrastructure consists of standalone LANs in both headquarters and not networked computer systems in other locations. The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both headquarters have an urge in establishing reliable and cost-effective printing...
12 Pages(3000 words)Assignment

Network Infrastructure Basics

...with the white sleeve is on the left (this is the B connector in the LC connector). Connect the B connector on the other end to the Rx port on the computer. The switch receives from the port on the right. When the cable is connected, the connector with the yellow sleeve is on the right (this is the A connector in the LC connector). Connect the A connector on the other end to the Tx port on the computer. In the LAB color of the connector that was connected in the RX of the Adapter was Black and another one that was inserted in the TX was Red (Saha, Mukherjee. & Bandyopadhyay, 2003). References Habraken, J. W. (2003). Absolute Beginner's Guide to Networking, 4th ed. Que...
2 Pages(500 words)Assignment

Network security infrastructure

...NETWORK SECURITY INFRASTRUCTURE By: Network Security Infrastructure Recently, theuse of the Internet has continued to grow exponentially. Individual, business, and government applications have multiplied on the internet. This development has an immediate benefit to the users. However, these internet-based services and applications sometimes pose security threats to the internet users. Information is a delicate asset that must be properly protected. Without proper network security measures, many individual, government agencies and business enterprises risk losing their data. Network security is basically a process by whbyich digital data assets are protected. On the other hand, Internet Security Infrastructure is the arrangement... of...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Berkeley Open Infrastructure for Network Computing (BOINC) for FREE!

Contact Us