It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Use the idle time on your computer (Windows, Mac, or Linux) to cure diseases, study global warming, discover pulsars, and do many other types of scientific research. It's safe, secure, and easy
Active: 328,641 volunteers, 568,472 computers. 24-hour average: 2,128.59 TeraFLOPS.
* Scientists: use BOINC to create a volunteer computing project, giving you the computing power of thousands of CPUs.
* Universities: use BOINC to create a Virtual Campus Supercomputing Center.
* Companies: use BOINC for desktop Grid computing.
Volunteer computing is an arrangement in which people (volunteers) provide computing resources to projects, which use the resources to do distributed computing and/or storage. * Volunteers are typically members of the general public who own Internet-connected PCs. Organizations such as schools and businesses may also volunteer the use of their computers. * Projects are typically academic (university-based) and do scientific research. But there are exceptions; for example, GIMPS and distributed.net (two major projects) are not academic. Several aspects of the project/volunteer relationship are worth noting: * Volunteers are effectively anonymous; although they may be required to register and supply email address or other information, they are not linked to a real-world identity. * Because of their anonymity, volunteers are not accountable to projects. If a volunteer misbehaves in some way (for example, by intentionally returning incorrect computational results) the project cannot prosecute or discipline the volunteer. * Volunteers must trust projects in several ways: o The volunteer trusts the project to provide applications that don't damage their computer or invade their privacy. o The volunteer trusts that the project is truthful about what work is being done by its applications, and how the resulting intellectual property will be used. o The volunteer trusts the project to follow proper security practices, so that hackers cannot use the project as a vehicle for malicious activities. The first volunteer computing project was GIMPS (Great Internet Mersenne Prime Search), which started in 1995. Other early projects include distributed.net, SETI@home, and Folding@home. Today there are over 50 active projects.
Originally posted by warrenb
great in principle
I just don't like the unmentioned potential that it could be used to snoop your PC
watch out with alot of "Free" software out there
there usually is no free lunch