skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Data-centric computing with the Netezza architecture.

;  [1];  [2];  [3];
  1. (New Mexico State University, Las Cruces, NM)
  2. (New Mexico State University, Las Cruces, NM)
  3. (New Mexico State University, Las Cruces, NM)
Publication Date:
Research Org.:
Sandia National Laboratories
Sponsoring Org.:
OSTI Identifier:
Report Number(s):
DOE Contract Number:
Resource Type:
Technical Report
Country of Publication:
United States
Computer architecture.; Biology-Mathematical models.; Relational databases.

Citation Formats

Davidson, George S., Cowie, Jim R., Helmreich, Stephen C., Zacharski, Ron A., and Boyack, Kevin W. Data-centric computing with the Netezza architecture.. United States: N. p., 2006. Web. doi:10.2172/883131.
Davidson, George S., Cowie, Jim R., Helmreich, Stephen C., Zacharski, Ron A., & Boyack, Kevin W. Data-centric computing with the Netezza architecture.. United States. doi:10.2172/883131.
Davidson, George S., Cowie, Jim R., Helmreich, Stephen C., Zacharski, Ron A., and Boyack, Kevin W. Sat . "Data-centric computing with the Netezza architecture.". United States. doi:10.2172/883131.
title = {Data-centric computing with the Netezza architecture.},
author = {Davidson, George S. and Cowie, Jim R. and Helmreich, Stephen C. and Zacharski, Ron A. and Boyack, Kevin W.},
abstractNote = {},
doi = {10.2172/883131},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Sat Apr 01 00:00:00 EST 2006},
month = {Sat Apr 01 00:00:00 EST 2006}

Technical Report:

Save / Share:
  • High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less
  • This third volume of the Information Management Architecture for an Integrated Computing Environment for the Environmental Restoration Program--the Interim Technical Architecture (TA) (referred to throughout the remainder of this document as the ER TA)--represents a key milestone in establishing a coordinated information management environment in which information initiatives can be pursued with the confidence that redundancy and inconsistencies will be held to a minimum. This architecture is intended to be used as a reference by anyone whose responsibilities include the acquisition or development of information technology for use by the ER Program. The interim ER TA provides technical guidance atmore » three levels. At the highest level, the technical architecture provides an overall computing philosophy or direction. At this level, the guidance does not address specific technologies or products but addresses more general concepts, such as the use of open systems, modular architectures, graphical user interfaces, and architecture-based development. At the next level, the technical architecture provides specific information technology recommendations regarding a wide variety of specific technologies. These technologies include computing hardware, operating systems, communications software, database management software, application development software, and personal productivity software, among others. These recommendations range from the adoption of specific industry or Martin Marietta Energy Systems, Inc. (Energy Systems) standards to the specification of individual products. At the third level, the architecture provides guidance regarding implementation strategies for the recommended technologies that can be applied to individual projects and to the ER Program as a whole.« less
  • This document summarizes the results from a level 3 milestone study within the CASL VUQ effort. We compare the adjoint-based a posteriori error estimation approach with a recent variant of a data-centric verification technique. We provide a brief overview of each technique and then we discuss their relative advantages and disadvantages. We use Drekar::CFD to produce numerical results for steady-state Navier Stokes and SARANS approximations. 3