Until recently, many enterprises stood back and watched rather than investing in Grid computing technology. While few managers argued that tapping idle computing power can be beneficial, and that important applications can be built over a grid infrastructure, to many the . . .
Until recently, many enterprises stood back and watched rather than investing in Grid computing technology. While few managers argued that tapping idle computing power can be beneficial, and that important applications can be built over a grid infrastructure, to many the potential for harm seemed greater still.

In recent times, however, this has begun to change. As researchers and corporate administrators get their hands dirty with large-scale grid implementations, they're developing a new generation of grid computing security approaches that stand to meet enterprise needs.

"So far, in general, most grid standards that have evolved have not done an extensive job of addressing security at all," says Chris Crafford, vice president of engineering for Austin, TX-based commercial grid computing firm United Devices. "But I think as we go forward they will start doing so, because it's a critical requirement for business."

The link for this article located at IBM is no longer available.