Browse Definitions :
Definition

desktop supercomputer (personal supercomputer)

Desktop supercomputer (or personal supercomputer) is a term used to describe any exceptionally powerful computer that can be placed at a single workstation. Currently available desktop supercomputers include the Cray CX1, the Nvidia Tesla and the Asus ECS 1000.

The most common approach to desktop supercomputing is the combination of multiple microprocessors into a single machine. This approach is called multiprocessing, coprocessing, or parallel processing. In one method, numerous microprocessors are connected in a manner similar to the way the individual computers are connected in a local area network (LAN). This arrangement allows each processor to work on a different part of a large task.

According to some experts, cloud computing will make it possible to turn any system into a supercomputer by allowing the user to purchase as much processing power as desired.

As it becomes possible to fit more processing power into even more compact spaces, smaller devices may be considered supercomputers. According to Google CEO Eric Schmidt, current mobile phones could qualify:

"A billion people on the planet are carrying supercomputers in their hands. Now you think of them as mobile phones, but that's not what they really are. They're video cameras. They're GPS devices. They're powerful computers. They have powerful screens. They can do many many different things, and oh, by the way, you can talk on them too. That's what the mobile phone of today is."
This was last updated in May 2010

Continue Reading About desktop supercomputer (personal supercomputer)

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close