The HPC community has always considered the training of new and existing HPC practitioners to be of high importance to its growth. The significance of training will increase even further in the era of Exascale when HPC encompasses even more scientic disciplines. This diversification of HPC practitioners challenges the traditional training approaches, which are not able to satisfy the specific needs of users, often coming from non-traditionally HPC disciplines and only interested in learning a particular set of skills.
The PDF file format can be efficiently manipulated in Linux and other free software that may not be easy in proprietary operating systems or applications.
MrTrix is "a set of tools to perform various types of diffusion MRI analyses, from various forms of tractography through to next-generation group-level analyses". It is mostly designed with post-processing visualisation in mind, but for intensive computational tasks it can make use of high-performance computing systems. It is not designed with messing-passing in mind, but it can be useful for job arrays.
A number of organisations use a customer service metric known as "Net Promoter", first suggested in the Harvard Business Review. Indeed, it is so common that apparently two-thirds of Fortune 500 companies are using the metric. It simply asks a single question: "How likely is it that you would recommend [company X] to a friend or colleague?".
It happens rarely enough, but on occasion (such as an upgrade to a database system (e.g., MySQL, MariaDB) or system version of a web-scripting language (e.g., PHP), you can end up with one's Drupal site failing to load, displaying only the error message similar to:
PDOException: SQLSTATE[HY000]  Access denied for user 'username'@'localhost' to database 'database' in lock_may_be_available() (line 167 of /website/includes/lock.inc).
This year the International Supercomputing Conference and TERATEC were held in close proximity, the former in Frankfurt from June 17-21 and the latter in Paris from June 27-28. Whilst the two conferences differ greatly in scope (one international, one national) and language (one Anglophone, the other Francophone), the dominance of Linux as the operating system of
choice at both was overwhelming.
The following is a short tutorial on using BLAST with Slurm using fasta nucleic acid (fna) FASTA formatted sequence files for Rattus Norvegicus. It assumes that BLAST (Basic Local Alignment Search Tool) is already installed.
First, create a database directory, download the datafile, extract, and load the environment variables for BLAST.
mkdir -r ~/applicationtests/BLAST/dbs
module load BLAST/2.2.26-Linux_x86_64
Having extracted the file, there will be a fna formatted sequence file,
rat.1.rna.fna. An example header line for a sequence:
>NM_175581.3 Rattus norvegicus cathepsin R (Ctsr), mRNA
High Performance Computing systems offer excellent metrics for speed and efficiency when using bare metal hardware, a high speed interconnect, and parallel applications. This however does not represent a significant portion of scientific computational tasks. In contrast cloud computing has provided management and implementation flexibility at a cost of performance. We therefore suggest two approaches to make HPC resources available in a dynamically reconfigurable hybrid HPC/Cloud architecture. Both can can be achieved with few modifications to existing HPC/Cloud environments.
The importance of High Throughput Computing (HTC), whether through high performance or cloud-enabled, is a critical issue for research institutions as data metrics are increasing at a rate greater than the capacity of user systems . As a result nascent evidence suggests higher research output from institutions that provide access to HTC facilities. However the necessary skills to operate HTC systems is lacking from the very research communities that would benefit from them.
SSH (Secure Shell) is secure means, mainly used on Linux and other UNIX-like systems, to access remote systems, designed as a replacement for a variety of insecure protocols (e.g., telnet, rlogin etc). This presentation will cover the core useage of the protocol, its development (SSH-1 and SSH-2), the architecture (client-server, public key authentication), installation and implementation, and some handy elaborations and enhancements, and real and imagined vulnerabilities.
Plenty of examples will be provided throughout along with the opportunity to test the protocol.