techstaff:introduction
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
techstaff:phd_orientation_2017 [2017/09/19 11:08] – [CSIL] kauffman | techstaff:phd_orientation_2017 [2017/09/19 11:16] – [Hadoop] kauffman | ||
---|---|---|---|
Line 28: | Line 28: | ||
=====Services===== | =====Services===== | ||
====Interactive login servers==== | ====Interactive login servers==== | ||
- | Techstaff has 3 servers (linux1, linux2, and linux3) that serve as interactive login systems for instructional use. These systems are reachable either by the canonical address or by a cname (linux.cs.uchicago.edu). | + | [[techstaff: |
These systems are configured similarly to the desktops and lab machines and can be used interchangeably with them. They are configured with 16 hyperthreads, | These systems are configured similarly to the desktops and lab machines and can be used interchangeably with them. They are configured with 16 hyperthreads, | ||
The purpose of these systems is to support instructional computing. | The purpose of these systems is to support instructional computing. | ||
Line 58: | Line 58: | ||
* a place for general computing that will not compromise the performance of the lab machines | * a place for general computing that will not compromise the performance of the lab machines | ||
The systems support many users and should be respected. Please follow the following guidelines: | The systems support many users and should be respected. Please follow the following guidelines: | ||
- | Resource intensive activities (utilize large amounts of RAM, excessive disk I/O, multiple CPUs, or long execution times) should be directed to your desktop or elsewhere (see [[techstaff: | + | Resource intensive activities (utilize large amounts of RAM, excessive disk I/O, multiple CPUs, or long execution times) should be directed to your desktop or elsewhere (see [[techstaff: |
Programs requiring significant disk I/O should not use your home directory as a data repository. | Programs requiring significant disk I/O should not use your home directory as a data repository. | ||
Line 64: | Line 64: | ||
=====Course specific===== | =====Course specific===== | ||
- | Some courses have course specific machines. | + | Some courses have course specific machines. |
- | (Information is available at https:// | + | |
+ | The [[vm: | ||
+ | |||
+ | The other type of virtual system is a customized VM that is running on one of Techstaff’s hypervisors and is managed by Techstaff. | ||
=====SLURM===== | =====SLURM===== | ||
- | The SLURM cluster was originally constructed to support Hank Hoffmann’s OS course. | + | The [[techstaff: |
- | The cluster | + | The cluster |
=====Hadoop===== | =====Hadoop===== | ||
- | We are experimenting with an Apache Hadoop cluster for use by several big data courses. | + | We are experimenting with an [[bigdataetc|Apache Hadoop cluster]]] for use by several big data courses. |
======Labs====== | ======Labs====== | ||
The department supports two computer labs. | The department supports two computer labs. | ||
Line 100: | Line 101: | ||
Create a directory within /local on the system that you are using for data files that are large or will be accessed regularly by a program. | Create a directory within /local on the system that you are using for data files that are large or will be accessed regularly by a program. | ||
- | To do so: | ||
< | < | ||
cd /local | cd /local | ||
Line 123: | Line 123: | ||
* Techstaff does not maintain updates to your system. | * Techstaff does not maintain updates to your system. | ||
* Techstaff will assist as we can if there are questions or problems, but the amount of time that can be spent is limited. | * Techstaff will assist as we can if there are questions or problems, but the amount of time that can be spent is limited. | ||
- | * The reported hacked systems that we have had have all been student-run systems. Therefore, it is very important to note the following: | + | * You will have to use other systems to perform TA duties. |
- | * Make sure that your root and user passwords are not guessable, are not used elsewhere, and that you connect from trusted sources and always use encryption. | + | |
- | * The system will be immediately pulled from the network by ITS Security and cannot be restored without a complete reformat and reinstall of the OS. | + | The reported hacked systems that we have had have all been student-run systems. Therefore, it is very important to note the following: |
- | * Make sure that you are backing up important files regularly. | + | * Make sure that your root and user passwords are not guessable, are not used elsewhere, and that you connect from trusted sources and always use encryption. |
- | * Make sure that your system is current with all patches. | + | * The system will be immediately pulled from the network by ITS Security and cannot be restored without a complete reformat and reinstall of the OS. |
- | * Be careful about what you install and to whom you give access. | + | * Make sure that you are backing up important files regularly. |
- | * You will have to use other systems to perform TA duties. | + | * Make sure that your system is current with all patches. |
+ | * Be careful about what you install and to whom you give access. |
/var/lib/dokuwiki/data/pages/techstaff/introduction.txt · Last modified: 2023/09/07 14:28 by adahler