Translator Disclaimer
Presentation + Paper
10 May 2019 Building a high performance, secure, reliable and compliant heterogeneous computing capability through the integration of core and edge processing
Author Affiliations +
Abstract
Heterogeneous computing and heterogeneous clouds refer to emerging architectures to build a variety of processors including CPUs, GPUs, FPGAs, and more specialized processing elements into an interconnected mesh environment to provide an ideal processing capability for a variety of complex tasks and data types. The concept expands to cover edge computing enabling preprocessing, data selection, and data conditioning/labeling to enhance the overall outcome. The combination of processors will be augmented by a variety of interconnect and memory architectures and configurations leading to customizable settings and flows meeting the changing needs of data and customers. This variety of environments, tasks, and interconnects creates a new landscape that greatly varies from our standard computing infrastructure therefore reducing our expertise in identifying threats based on network, memory, and processing based on trends resulting in an unknown trust level. The goal is to build and operate a heterogeneous platform that provides dynamic resource assignments and capability elasticity to meet standard and surge needs in an environment that provides data security, isolation and attribution. Access control also becomes an essential element of the new environment.
Conference Presentation
© (2019) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
B. S. Farroha and D. L. Farroha "Building a high performance, secure, reliable and compliant heterogeneous computing capability through the integration of core and edge processing", Proc. SPIE 11013, Disruptive Technologies in Information Sciences II, 110130C (10 May 2019); https://doi.org/10.1117/12.2518267
PROCEEDINGS
18 PAGES + PRESENTATION

SHARE
Advertisement
Advertisement
RELATED CONTENT

Mobile code security
Proceedings of SPIE (November 08 2001)
A study on fuzzy intrusion detection
Proceedings of SPIE (March 28 2005)
Analysis on the security of cloud computing
Proceedings of SPIE (February 04 2011)

Back to Top