Cloud Computing To Join The Search For The God Particle

Cloud Computing To Join The Search For The God Particle

The God Particle

Ever since the Large Hadron Collider (LHC), the world’s largest and highest-energy particle accelerator, went active in 2008, speculation has been rife that the elusive Higgs boson, a hypothetical elementary particle that should explain why fundamental particles have mass, will finally be discovered. The Higgs boson has earned the sobriquet the “God Particle” and European Organization for Nuclear Research (CERN) effort to discover it has gained worldwide attention. Now, cloud computing is expected to do its part.ource: Wikipedia

A new pan-European initiative involving 18 companies and research organizations has been launched to develop a cloud computing platform to tackle Man’s biggest scientific challenges, including the search for the God Particle. This platform will be called the “Helix Nebula – the Science Cloud”, after the large planetary nebula sometimes referred to as the Eye of God.

The ability to process large amounts of data at low cost is what makes cloud computing an attractive proposition for CERN. This feature has enabled Amazon to make a supercomputer using that is much cheaper to operate than its peers and allowed Dell to contribute to cancer research.

CERN’s computing capacity needs to keep up with the enormous amount of data coming from the Large Hadron Collider and we see Helix Nebula – the Science Cloud as a great way of working with industry to meet this challenge,” said Frédéric Hemmer, head of CERN’s IT department.

This initiative was first outlined by European Commission vice-president Neelie Kroes in January 2012, who had remarked on the growing cloud computing industry, “The cloud market will grow, bringing opportunities for existing suppliers and new entrants, and cloud buyers, including the public sector, will buy more with less and become more efficient.” In some way, this is a return home for cloud computing. CERN played a major role in the development of the Internet, and as we all know, the Internet played a major role in the development of cloud computing.

Particle physics is not the only field that the Helix Nebula will demonstrate its capability – the European Molecular Biology Laboratory (EMBL) is also one of the three test cases where it will play a significant role. “The quantities of genomic sequence data are vast and the needs for high performance computing infrastructures and bioinformatics expertise to analyze these data pose a challenge for many laboratories,” said Rupert Lueck, head of IT services at EMBL.

Finally, the Helix Nebula will also be used to create an Earth observation platform focusing on earthquake and volcano research. The European Space Agency (ESA), the Centre National d’Etudes Spatiales in France, the German Aerospace Center and the National Research Council in Italy will work together on this project.

In addition to the aforementioned government agencies and scientific organizations, Helix Nebula’s commercial partners include Atos, Capgemini, CloudSigma, Interoute, Logica, Orange Business Services, SAP, SixSq, Telefonica, Terradue, Thales, The Server Labs and T Systems, along with the Cloud Security Alliance, the OpenNebula Project and the European Grid Infrastructure.

(Image Source: Wikipedia)

By Sourya Biswas

Sorry, comments are closed for this post.

Comics
Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls systems, retail terminals and scanners, and kiosks to medical devices, heating and lighting systems, connected homes, and smart cars. Identity…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw in 2014 to a whopping $84 billion global market by 2019. Hybrid cloud environments offer companies the resilience and scalability…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken availability far beyond the simple act of voice-to-voice communication, allowing businesses to untether employees from their desks and give them…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that companies should first identify and classify data before deploying DLP. Unfortunately, we are just now seeing companies execute this approach.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully select migration vendors to help you get there. All that remains is following the plan, right? Everything going well, your…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They are so easy to start using that consumers rarely think twice about setting up an account or downloading a new…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything across back-end networks causes headaches for the end-users who try to access the systems over VPN and other private links. Many strategies…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this question: how in the world do you eat cloud software? Cybersecurity today seems to have an unfortunate Catch-22. You want…