Skip to main content

What you can do with idle Computing Power?

This time we are going to see how to use idle computing power to do something good or make profit

1.Volunteer computing :
        It is an arrangement in which people (volunteers) provide computing resources to projects, which use the resources to do distributed computing and/or storage.

Simply donating the idle computing power to someone,Sounds cool right

 where it is used and what you can do with that ?
     Scientist have many problems to deal with such as finding a New planet,analyzing outer space,finding cure for cancer or other disease. They need lot of computational power to do this kind of project. Many scientist cannot spent their Funds entirely in computational power. So

                     BONIC - Berkeley Open Infrastructure for Network Computing

BONIC is created to address this problem anyone with computer connected to the internet can donate the computing power.It use the idle time on your computer to cure diseases, study global warming, discover pulsars, and do many other types of scientific research.

If you want to know about the projects under BIONIC you can check the below link

       " https://boinc.berkeley.edu/projects.php

And other cool thing about this project is you can also donate your Mobile power (Android,IOS )

Official Site: https://boinc.berkeley.edu/

2. Rendering Animation
      First we need to know what is rendering ?
          When you create animation in the software it is just store the details as equation,relations of objects ( Mathematical stuff ) in order to make it into 2D or 3D we will render it which is done automatically by the software but it takes huge amount of time.

well we have a solution for that -> Donate the computing power 

Here we are going to discuss donating power for Blender animation software ( It is free and open-source 3D computer graphics software toolset used for creating animated films, visual effects, art, 3D printed models, interactive 3D applications and video games ) 

It can done through a program called Sheep it
people can upload their project to their site and the person can share his username and password which can used to login with sheep it client and we can set the number of cores and memory which can used by the process and press the start 


Official Site: https://www.sheepit-renderfarm.com/


3. Mining cryptocurrency
    Everyone know about this topic. Cryptocurrency uses computational power to blockchain integrity and Security.Mining currency is big trend right now you can earn lot if you use your computational power But it have lot of pros and cons.

If you want to know more about mining cryptocurrency you can refer the site below

https://www.lifewire.com/cryptocoin-mining-for-beginners-2483064




Comments

Popular posts from this blog

Docker

Docker is used to run software packages called "containers". Containers are isolated from each other and bundle their own tools, libraries and configuration files; they can communicate with each other through well-defined channels                                                                                                --Wikipedia  I have already written a article about the containers you can check out in here https://thangaayyanar.blogspot.com/2018/06/containers.html This time, let's learn more about docker engine how we can use this. The important things we need to know in docker are Docker Image:  The container can be created with the help of Image. The Image file consists of code, libraries, environment variable...

BlockChain

As the name says chain of block Now what is a block?       A block typically contains a  cryptographic hash of the previous block,  a timestamp transaction data    Where it is used?      It is the backbone of cryptocurrency i.e it ensure the security and integrity of data. The usage doesn't stop here well blockchain are resistant to modification of the data. so it can used in Bank Identity verification Hospital records and much more   How it ensures security and integrity of data? Block added to the chain, contain the hash ( result obtained from hash algorithm such as MD5,SHA) of the previous block so changes in one block lead to mismatch. Proof of work algorithm - Adding a node in the block chain require validation whether the new block is valid or not which is done my miner if they find the valid hash they will be rewarded How to do one?      The most interesting part ...

My experience in iOS Hackathon

This is my second hackathon, my first hackathon was on machine learning if you want to check out that article by following the below link https://thangaayyanar.blogspot.com/2018/02/what-i-learned-from-machine-learning.html So let's get started First let us discuss about the idea of what we are trying to achieve in this hackathon. From the above image you can able to know that we are going to recognize text from the image and use it to do find which field it is.  we separated this idea into three modules Identify the region Recognize the text  Field classification Module I : Identify the region To identify the selected region we used Vision framework ( ML framework provided by apple to detect the object ). The vision framework give us the boundary of the text region ( i.e frame - x,y,width,height ).  Then using the above region we crop the selected region and pass it to the next module. Module II : Recognize the text To recognize the text we ...