Text this: Fast security constraint optimal power flow using parallel and heterogenous computing