User Tools

Site Tools


techstaff:introduction

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
techstaff:phd_orientation_2017 [2017/09/19 11:08] – [MPCS] kauffmantechstaff:phd_orientation_2017 [2017/09/19 11:10] – [Best practices] kauffman
Line 77: Line 77:
 The department supports two computer labs. The department supports two computer labs.
  
-====CSIL====+=====CSIL=====
 CSIL is located in Crerar Library and is composed of 4 pods of computers along with additional Macs external to the pods and a staff of student aids known as “tutors”. The pods have collapsing walls that allow them to be reconfigured into larger spaces.  Two of the pods each contain Linux boxes that are configured and managed by Techstaff.  They are configured using a template similar to  linux.cs.uchicago.edu or student desktops. The linux systems are rebooted each morning at 4:00 AM in order to clean up processes and to make them less desirable platforms for long term execution which would impact performance for the seated user. The other two pods each contain 20 Macs which are configured and maintained by CSIL tutors. CSIL is located in Crerar Library and is composed of 4 pods of computers along with additional Macs external to the pods and a staff of student aids known as “tutors”. The pods have collapsing walls that allow them to be reconfigured into larger spaces.  Two of the pods each contain Linux boxes that are configured and managed by Techstaff.  They are configured using a template similar to  linux.cs.uchicago.edu or student desktops. The linux systems are rebooted each morning at 4:00 AM in order to clean up processes and to make them less desirable platforms for long term execution which would impact performance for the seated user. The other two pods each contain 20 Macs which are configured and maintained by CSIL tutors.
 These pods are reserved for a number of courses for labs, class, or TA sessions. The software on both architectures supports the needs of many courses allowing students to have access to reliable systems that will work consistently for course assignments. (Information at http://csil.cs.uchicago.edu.) These pods are reserved for a number of courses for labs, class, or TA sessions. The software on both architectures supports the needs of many courses allowing students to have access to reliable systems that will work consistently for course assignments. (Information at http://csil.cs.uchicago.edu.)
Line 100: Line 100:
 Create a directory within /local on the system that you are using for data files that are large or will be accessed regularly by a program.  Doing so will improve performance (local disk is much faster than network disk) and will bypass home directory quotas. Create a directory within /local on the system that you are using for data files that are large or will be accessed regularly by a program.  Doing so will improve performance (local disk is much faster than network disk) and will bypass home directory quotas.
  
-To do so: 
 <code> <code>
 cd /local cd /local
Line 123: Line 122:
   * Techstaff does not maintain updates to your system.   * Techstaff does not maintain updates to your system.
   * Techstaff will assist as we can if there are questions or problems, but the amount of time that can be spent is limited.   * Techstaff will assist as we can if there are questions or problems, but the amount of time that can be spent is limited.
-  * The reported hacked systems that we have had have all been student-run systems. Therefore, it is very important to note the following: +  * You will have to use other systems to perform TA duties. 
-    * Make sure that your root and user passwords are not guessable, are not used elsewhere, and that you connect from trusted sources and always use encryption. + 
-    * The system will be immediately pulled from the network by ITS Security and cannot be restored without a complete reformat and reinstall of the OS. +The reported hacked systems that we have had have all been student-run systems. Therefore, it is very important to note the following: 
-    * Make sure that you are backing up important files regularly. +  * Make sure that your root and user passwords are not guessable, are not used elsewhere, and that you connect from trusted sources and always use encryption. 
-    * Make sure that your system is current with all patches. +  * The system will be immediately pulled from the network by ITS Security and cannot be restored without a complete reformat and reinstall of the OS. 
-    * Be careful about what you install and to whom you give access. +  * Make sure that you are backing up important files regularly. 
-    * You will have to use other systems to perform TA duties.+  * Make sure that your system is current with all patches. 
 +  * Be careful about what you install and to whom you give access. 
/var/lib/dokuwiki/data/pages/techstaff/introduction.txt · Last modified: 2023/09/07 14:28 by adahler

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki