SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
RamiroRamiroRamiroRamiro CidCidCidCid |||| @@@@ramirocidramirocidramirocidramirocid
Space computing
+
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Index
2
1. What is Space Computing? Page 3
2. Advantages of “Space Computing” Page 4
3. Disadvantages of “Space Computing” Page 5
4. Sources used and webs to expand knowledge Page 6
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
What is Space Computing?
Until now, when people talk about cloud computing, it’s usually understood that the cloud is a
metaphor for groups of remote, networked servers.
When Lance Parker (CEO of company ConnectX) talks about “space computing” he means it
literally: physical servers operating in outer space.
ConnectX is a startup company based in Los Angeles, USA working on a way to take corporations’
data out of the cloud and into the final frontier. If this company succeeds, it could revolutionize the
way we store, transmit, and analyze information.
We can think “Cloud computing” evolution is
“Cloud in the space” or simple “Space Computing”
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Advantages of “Space Computing”
1. Save energy problems, data centers use up 10% of the world’s electricity
Putting servers in space could potentially remedy the energy problem, since they could be powered by free, plentiful solar
radiation, so a real IT Green solution.
2. No need to freeze the servers
In the space, the weather is -180°C so no need to have refrigeration systems running 7 day x 24 hours. In addition in the space
there are not humidity, so no need to control this too.
3. Fast processing because the space environment
Space environment would be advantageous for spinning disk drives. Zero-gravity allows the drives to spin with less resistance,
and the extreme cold in space means the servers could process faster without overheating.
4. A very good cost-effective to launch a server into space
Nowadays the cost of put satellite up into space is not expensive (for small satellites is less than U$S 100,000)
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Disadvantages of “Space Computing”
1. There are no need of be compliance or to follow legal topics because satellites are not inside
nations legislation area
A big risk about privacy data use because no need to have legal compliance, no national legislation apply in the space.
2. Storing large amounts of data in space is not feasible with the actual transmission rates
Beam information using electromagnetic waves, this method of transmission is much slower than using wire
3. Space waste or small meteorites could destroy our satellites
In the space there are more and more waste (satellites out of service, small pieces, etc.) which could damage or destroy the
satellites where the servers are.
4. Shadow problems about coverage
To solve coverage problems because of the "shadow", it will be necessary to have 2 or more satellites working together as a
“cluster” so more expensive solution.
5. Uplink & Downlink are not symmetric
After download the data, it is necessary to transfer in the ground.
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Disadvantages of “Space Computing”
6. Extremely expensive maintenance
To repair a server in a satellite would be obviously extremely expensive. A very difficult issue to solve. Can the potential reduction
in long-term maintenance costs really offset the massive expense of actually getting their servers into orbit? And what about
upgrading capacity?
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Sources used and webs to expand knowledge
“Big Data company proposes servers in space, we have no idea why”- ExtremeTech
URL: http://www.extremetech.com/computing/198690-big-data-company-proposes-servers-in-space-we-have-no-idea-why
“ConnectX wants to put server farms in space - Geek
URL: http://www.geek.com/chips/connectx-wants-to-put-server-farms-in-space-1614728/
“ Can we put servers in space?” – The Space Reporter
URL: http://thespacereporter.com/2015/01/can-we-put-servers-in-space/
“ What if we put servers in space?” - Fortune
URL: http://fortune.com/2015/01/29/connectx-space-data/
ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid
Questions ?
ramiro@ramirocid.com
@ramirocid
http://www.linkedin.com/in/ramirocid
http://ramirocid.com http://es.slideshare.net/ramirocid
http://www.youtube.com/user/cidramiro
Ramiro Cid
CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL
Many thanks !

Más contenido relacionado

La actualidad más candente

Introduction to internet of everything
Introduction to internet of everythingIntroduction to internet of everything
Introduction to internet of everythingRishabh Sharma
 
Tech Trends Impacting your ITAM Program
Tech Trends Impacting your ITAM ProgramTech Trends Impacting your ITAM Program
Tech Trends Impacting your ITAM ProgramIvanti
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...Amazon Web Services
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Microsoft
 
Integris software ppt
Integris software pptIntegris software ppt
Integris software pptintegrisus
 
Cybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.coCybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.coIndustrial Cyber
 
Developer Report 2021 (Published: January 2021)
Developer Report 2021 (Published: January 2021)Developer Report 2021 (Published: January 2021)
Developer Report 2021 (Published: January 2021)Maria Xinhe Shen
 
Educational Agility
Educational Agility Educational Agility
Educational Agility Neus Lorenzo
 

La actualidad más candente (9)

Introduction to internet of everything
Introduction to internet of everythingIntroduction to internet of everything
Introduction to internet of everything
 
Tech Trends Impacting your ITAM Program
Tech Trends Impacting your ITAM ProgramTech Trends Impacting your ITAM Program
Tech Trends Impacting your ITAM Program
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
Automating Event Driven Security in the AWS Cloud - AWS Public Sector Summit ...
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Integris software ppt
Integris software pptIntegris software ppt
Integris software ppt
 
Cybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.coCybersecurity Management Programs - Industrialcyber.co
Cybersecurity Management Programs - Industrialcyber.co
 
Developer Report 2021 (Published: January 2021)
Developer Report 2021 (Published: January 2021)Developer Report 2021 (Published: January 2021)
Developer Report 2021 (Published: January 2021)
 
Educational Agility
Educational Agility Educational Agility
Educational Agility
 

Similar a Space computing

Astricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the CloudAstricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the CloudCory von Wallenstein
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
Billion Node Cloud
Billion Node CloudBillion Node Cloud
Billion Node CloudPaul Morse
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Kb12012011 amitava cloud_computing
Kb12012011 amitava cloud_computingKb12012011 amitava cloud_computing
Kb12012011 amitava cloud_computingAmitava Kumar
 
Big Data and Space Travel
Big Data and Space TravelBig Data and Space Travel
Big Data and Space Travelcityfan
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET Journal
 
Approaching real-time-hadoop
Approaching real-time-hadoopApproaching real-time-hadoop
Approaching real-time-hadoopChris Huang
 
VRStorm_CIPS_03Nov2010
VRStorm_CIPS_03Nov2010VRStorm_CIPS_03Nov2010
VRStorm_CIPS_03Nov2010VRstorm
 
Bigdataspacetravel4x3 130525201708-phpapp02
Bigdataspacetravel4x3 130525201708-phpapp02Bigdataspacetravel4x3 130525201708-phpapp02
Bigdataspacetravel4x3 130525201708-phpapp02rahul4567567
 
Cloud Programming Simplified: A Berkeley View on Serverless Computing
Cloud Programming Simplified: A Berkeley View on Serverless ComputingCloud Programming Simplified: A Berkeley View on Serverless Computing
Cloud Programming Simplified: A Berkeley View on Serverless Computingmustafa sarac
 
Clouds, Grids and Data
Clouds, Grids and DataClouds, Grids and Data
Clouds, Grids and DataGuy Coates
 
The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data CentersGina Buck
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum CollectionsKacy Clarke
 
SHOULD BUSINESS MOVE TO THE CLOUD
SHOULD BUSINESS MOVE TO THE CLOUDSHOULD BUSINESS MOVE TO THE CLOUD
SHOULD BUSINESS MOVE TO THE CLOUDmyteratak
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Cartesian (formerly CSMG)
 

Similar a Space computing (20)

Astricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the CloudAstricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the Cloud
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Billion Node Cloud
Billion Node CloudBillion Node Cloud
Billion Node Cloud
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Kb12012011 amitava cloud_computing
Kb12012011 amitava cloud_computingKb12012011 amitava cloud_computing
Kb12012011 amitava cloud_computing
 
Big data business case
Big data   business caseBig data   business case
Big data business case
 
Big Data and Space Travel
Big Data and Space TravelBig Data and Space Travel
Big Data and Space Travel
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
Approaching real-time-hadoop
Approaching real-time-hadoopApproaching real-time-hadoop
Approaching real-time-hadoop
 
VRStorm_CIPS_03Nov2010
VRStorm_CIPS_03Nov2010VRStorm_CIPS_03Nov2010
VRStorm_CIPS_03Nov2010
 
Bigdataspacetravel4x3 130525201708-phpapp02
Bigdataspacetravel4x3 130525201708-phpapp02Bigdataspacetravel4x3 130525201708-phpapp02
Bigdataspacetravel4x3 130525201708-phpapp02
 
Cloud Programming Simplified: A Berkeley View on Serverless Computing
Cloud Programming Simplified: A Berkeley View on Serverless ComputingCloud Programming Simplified: A Berkeley View on Serverless Computing
Cloud Programming Simplified: A Berkeley View on Serverless Computing
 
Clouds, Grids and Data
Clouds, Grids and DataClouds, Grids and Data
Clouds, Grids and Data
 
The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data Centers
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum Collections
 
SHOULD BUSINESS MOVE TO THE CLOUD
SHOULD BUSINESS MOVE TO THE CLOUDSHOULD BUSINESS MOVE TO THE CLOUD
SHOULD BUSINESS MOVE TO THE CLOUD
 
London hug
London hugLondon hug
London hug
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?
 
basics of cloud computing
basics of cloud computingbasics of cloud computing
basics of cloud computing
 

Más de Ramiro Cid

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridadRamiro Cid
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenRamiro Cid
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?Ramiro Cid
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Ramiro Cid
 
Lean Six Sigma methodology
Lean Six Sigma methodologyLean Six Sigma methodology
Lean Six Sigma methodologyRamiro Cid
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationRamiro Cid
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Thinking on risk analysis
Thinking on risk analysisThinking on risk analysis
Thinking on risk analysisRamiro Cid
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructureRamiro Cid
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 
Internet of things
Internet of thingsInternet of things
Internet of thingsRamiro Cid
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governanceRamiro Cid
 
Summit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceSummit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceRamiro Cid
 

Más de Ramiro Cid (20)

Seminario sobre ciberseguridad
Seminario sobre ciberseguridadSeminario sobre ciberseguridad
Seminario sobre ciberseguridad
 
Captación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagenCaptación y registro de comunicaciones orales y de imagen
Captación y registro de comunicaciones orales y de imagen
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?¿Cuáles son los peligros a los que se enfrenta su sistema informático?
¿Cuáles son los peligros a los que se enfrenta su sistema informático?
 
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
Cloud Computing, IoT, BYOD Ha muerto el perímetro corporativo. ¿y ahora qué?
 
Lean Six Sigma methodology
Lean Six Sigma methodologyLean Six Sigma methodology
Lean Six Sigma methodology
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 
Cyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk AggregationCyber Security Resilience & Risk Aggregation
Cyber Security Resilience & Risk Aggregation
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Thinking on risk analysis
Thinking on risk analysisThinking on risk analysis
Thinking on risk analysis
 
Drones and their use on critical infrastructure
Drones and their use on critical infrastructureDrones and their use on critical infrastructure
Drones and their use on critical infrastructure
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Risk optimization management inside it governance
Risk optimization management inside it governanceRisk optimization management inside it governance
Risk optimization management inside it governance
 
Summit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governanceSummit itSMF - Risk optimization management inside it governance
Summit itSMF - Risk optimization management inside it governance
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Space computing

  • 1. RamiroRamiroRamiroRamiro CidCidCidCid |||| @@@@ramirocidramirocidramirocidramirocid Space computing +
  • 2. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Index 2 1. What is Space Computing? Page 3 2. Advantages of “Space Computing” Page 4 3. Disadvantages of “Space Computing” Page 5 4. Sources used and webs to expand knowledge Page 6
  • 3. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid What is Space Computing? Until now, when people talk about cloud computing, it’s usually understood that the cloud is a metaphor for groups of remote, networked servers. When Lance Parker (CEO of company ConnectX) talks about “space computing” he means it literally: physical servers operating in outer space. ConnectX is a startup company based in Los Angeles, USA working on a way to take corporations’ data out of the cloud and into the final frontier. If this company succeeds, it could revolutionize the way we store, transmit, and analyze information. We can think “Cloud computing” evolution is “Cloud in the space” or simple “Space Computing”
  • 4. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Advantages of “Space Computing” 1. Save energy problems, data centers use up 10% of the world’s electricity Putting servers in space could potentially remedy the energy problem, since they could be powered by free, plentiful solar radiation, so a real IT Green solution. 2. No need to freeze the servers In the space, the weather is -180°C so no need to have refrigeration systems running 7 day x 24 hours. In addition in the space there are not humidity, so no need to control this too. 3. Fast processing because the space environment Space environment would be advantageous for spinning disk drives. Zero-gravity allows the drives to spin with less resistance, and the extreme cold in space means the servers could process faster without overheating. 4. A very good cost-effective to launch a server into space Nowadays the cost of put satellite up into space is not expensive (for small satellites is less than U$S 100,000)
  • 5. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Disadvantages of “Space Computing” 1. There are no need of be compliance or to follow legal topics because satellites are not inside nations legislation area A big risk about privacy data use because no need to have legal compliance, no national legislation apply in the space. 2. Storing large amounts of data in space is not feasible with the actual transmission rates Beam information using electromagnetic waves, this method of transmission is much slower than using wire 3. Space waste or small meteorites could destroy our satellites In the space there are more and more waste (satellites out of service, small pieces, etc.) which could damage or destroy the satellites where the servers are. 4. Shadow problems about coverage To solve coverage problems because of the "shadow", it will be necessary to have 2 or more satellites working together as a “cluster” so more expensive solution. 5. Uplink & Downlink are not symmetric After download the data, it is necessary to transfer in the ground.
  • 6. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Disadvantages of “Space Computing” 6. Extremely expensive maintenance To repair a server in a satellite would be obviously extremely expensive. A very difficult issue to solve. Can the potential reduction in long-term maintenance costs really offset the massive expense of actually getting their servers into orbit? And what about upgrading capacity?
  • 7. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Sources used and webs to expand knowledge “Big Data company proposes servers in space, we have no idea why”- ExtremeTech URL: http://www.extremetech.com/computing/198690-big-data-company-proposes-servers-in-space-we-have-no-idea-why “ConnectX wants to put server farms in space - Geek URL: http://www.geek.com/chips/connectx-wants-to-put-server-farms-in-space-1614728/ “ Can we put servers in space?” – The Space Reporter URL: http://thespacereporter.com/2015/01/can-we-put-servers-in-space/ “ What if we put servers in space?” - Fortune URL: http://fortune.com/2015/01/29/connectx-space-data/
  • 8. ramirocid.com ramiro@ramirocid.com Twitter: @ramirocid Questions ? ramiro@ramirocid.com @ramirocid http://www.linkedin.com/in/ramirocid http://ramirocid.com http://es.slideshare.net/ramirocid http://www.youtube.com/user/cidramiro Ramiro Cid CISM, CGEIT, ISO 27001 LA, ISO 22301 LA, ITIL Many thanks !