[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: idle CPU markets

> Date: Fri, 27 Oct 1995 06:25:34 -0700
> To: [email protected]
> From: Jay Campbell <[email protected]>
> Subject: Re: idle CPU markets
> Sender: [email protected]

> A graphic-arts chum of mine is really hyper about cycle sales - it will
> allow him to produce broadcast-quality commercials on a project-by-project
> basis without a huge initial hardware upgrade investment. Is anyone working
> on a Java libarary/demo/whatnot that allows plug-in algorithms, work
> completion 'fetch next batch' code, and some rudimentary authentication
> scheme? If not, I may tinker with this - if so, I'd like to chat :)

At USC/Information Sciences Institute, we are developing a system that will
enable computer owners to sell or barter processor-cycles on the Internet.
This is in some ways similar to what you talk about, in that it allows
the execution of plug-in applications, and the policies for allocation
and deallocation of remote resources are decided by the owners and are 
transparent to the end user. However, unlike Java, our applications are 
compiled C programs that execute on *compute servers* rather than on
client machines. The application could in turn be an interpreter for 
some other language (e.g. Java). We also support parallel applications 
that use the Parallel Virtual Machine (PVM) libraries for interprocess 

We have implemented a prototype known as the Prospero Resource Manager 
(PRM); a parallel version of POVRAY raytracing program is one of the 
applications we've run using PRM. We are currently working on integrating 
PRM with authentication and payment products (including kerberos, netcheque
and netcash) developed as part of our other projects on security and 
electronic commerce. If you are interested in further information about 
any of these products, or are interested in participating in any aspect 
PRM's development we'd be happy to talk to you. More information is also 
available on our web pages: http://nii-server.isi.edu/info/prm and

We also believe that one of the parallel applications for which PRM is 
useful is showing the weakness of certain encryption methods with limited
key size. If anyone has suggestions for algorithms or software that might
be included as a demo application in the next release of PRM, please contact

Santosh Rao.