The following presentation was given at the monthly HASK ( http://www.thehask.com/ ) meeting in May-2012. Topics discussed involve a brief review of "traditional HPC"; some 'modern enhancements' to allow 'personal HPC' type of performance and implications for security; audits; and best practices.

For reference, slides have been posted here for download.