- Optimizing Research Workflows - A Documentation of Snakemake0Snakemake is a powerful and versatile workflow management system that simplifies the creation, execution, and management of data analysis pipelines. It uses a user-friendly, Python-based language to define workflows, making it particularly valuable for automating and reproducibly managing complex computational tasks in research and data analysis.
- Singularity/Apptainer User Manuals0Singularity/Apptainer is a free and open-source container platform that allows users to build and run containers on high performance computing resources. SingularityCE is the community edition of Singularity maintained by Sylabs, a company that also offers commercial Singularity products and services. Apptainer is a fork of Singularity, maintained by the Linux foundation, a community of developers and users who are passionate about open source software.
- United Nations Mentor Handbook0The United Nations (UN) is an international organization comprising 193 Member States, including the United States. As a global organization, the UN is the one place on Earth where the world's nations can gather to discuss common problems and find shared solutions that benefit all humanity. This handbook has been produced for UN staff of all backgrounds and levels and provides an overview of how to approach your participation in a mentorship program. This resource is quickly digestible and provides a basic structure that will be helpful to review before the first meeting with your mentee.
- OnShape Documentation0This contains documentation for getting started with using OnShape for CAD. OnShape cloud-hosted CAD software that lets you work with others like on a Google Doc, with the power and capabilities of any other software like Solidworks or Inventor.
- Beautiful Soup - Simple Python Web Scraping0This package lets you easily scrape websites and extract information based on html tags and various other metadata found in the page. It can be useful for large-scale web analysis and other tasks requiring automated data gathering.
- ACCESS Campus Champion Example Allocation0ACCESS requests proposals to be written following NSF proposal guidelines. The link provides an example of an ACCESS proposal using an NSF LaTeX template. The request is at the DISCOVER level appropriate for Campus Champions. The file is 2 pages: the first page details the motivation, approach, and resources requested; and the second page is a 1-page bio.
- Discover Data Science0Discover Data Science is all about making connections between prospective students and educational opportunities in an exciting new, hot, and growing field – data science.
- Wiki for Onboarding onto the C3DDB Cluster at MGHPCC0This is a resource for researchers and students looking to on-board onto the c3ddb cluster at MGHPCC. In the code section, there are example job submission scripts for the different queues on c3ddb.
- R for Data Science0R for Data Science is a comprehensive resource for individuals looking to harness the power of the R programming language for data analysis, visualization, and statistical modeling. Whether you're a beginner or an experienced data scientist, this guide will help you unlock the full potential of R in the realm of data science.
- Termius - Modern ssh platform0**Termius: The Modern SSH Client for 2023** Termius is the future-facing SSH client that's redefining remote server access in 2023. Designed for ease and efficiency, Termius offers a seamless connection experience across all devices, be it mobile or desktop. Gone are the days of re-inputting IP addresses, ports, and passwords; with Termius, one-click connectivity is the new norm. **How Termius Elevates Remote Server Access:** 1. **One-Click Connectivity:** Save the hassle of remembering and re-entering connection details. Termius provides an immediate connection to your infrastructure with a single click. 2. **Synchronized Across Devices:** Termius ensures that your data, connection settings, and preferences are consistent across all your devices, from mobile to desktop. 3. **Unparalleled Security:** With the Cloud Vault feature, users can securely store their data in an encrypted environment, accessible only from their specific devices. Shared vaults allow for safe connection sharing within teams. 4. **AI-Powered Terminal Experience:** Advanced AI-driven autocomplete means users can input command descriptions, and Termius will swiftly convert them into accurate bash commands, simplifying and enhancing the terminal interaction. 5. **Collaborative Troubleshooting:** Share terminal sessions with teammates, facilitating cooperative problem-solving or knowledge sharing. No additional server-side installations needed. 6. **Automation and Snippets:** Streamline routine processes with the ability to save and run frequently used shell scripts. Sharing these Snippets with your team can lead to increased productivity and fewer manual errors. 7. **All-Device Compatibility:** Whether on iPad, iPhone, Android, macOS, Windows, or Linux, Termius ensures a consistent and fluid experience. The platform's synchronization capability means you're always ready to respond swiftly, irrespective of the device in use. For professionals and businesses aiming for top-notch server access efficiency, Termius is the gold standard in 2023. Experience the revolution in SSH connectivity and optimize your workflow with Termius.
- Paraview UArizona HPC links (advanced)0These links take you to visualization resources supported by the University of Arizona's HPC visualization consultant ([rtdatavis.github.io](http://rtdatavis.github.io/)). The following links are specific to the Paraview program and the workflows that have been used my researchers at the U of Arizona. These links are distinct from the others posted in the beginner paraview access ci links from the University of Arizona in that they are for more complex workflows. The links included explain how to use the terminal with paraview (pvpython), and the steps to leverage HPC resources for headless batch rendering. The batch rendering tutorial is significantly more complex than the others so if you find yourself stuck please post on the https://ask.cyberinfrastructure.org/ and I will try to troubleshoot with you.
- ACCESS KB Guide - Expanse0Expanse at SDSC is a cluster designed by Dell and SDSC delivering 5.16 peak petaflops, and offers Composable Systems and Cloud Bursting. This documentation describes how to use the Expanse cluster with some specific information for people with ACCESS accounts.
- What is VPN? How It Works, Types of VPN0A VPN, or Virtual Private Network, is a technology that creates a secure tunnel between your device and a VPN server. This tunnel encrypts all of your traffic, making it unreadable to anyone who tries to intercept it.
- Vulkan Support Survey across Systems0It's not uncommon to see beautiful visualizations in HPC center galleries, but the majority of these are either rendered off the HPC or created using programs that run on OpenGL or custom rasterization techniques. To put it simply the next generation of graphics provided by OpenGL's successor Vulkan is strangely absent in the super computing world. The aim of this survey of available resources is to determine the systems that can support Vulkan workflows and programs. This will assist users in getting past some of the first hurdles in using Vulkan in HPC contexts.
- ACCESS Getting Started Quick-Guide0A step-by-step guide to getting your first allocation for Access computing and storage resources.
- Network Science Textbook0
"Network Science" by Albert-László Barabási is a textbook that introduces the interdisciplinary field of network science. This field explores the connections and relationships between different entities, which can be anything from people in a social network to computers on the internet.
Description of the Textbook
The book is designed for a broad audience, including students and professionals in physics, computer science, engineering, economics, and social sciences. It covers a wide range of topics, from the "six degrees of separation" concept to the spread of viruses like Ebola. The textbook is structured to be accessible to both undergraduate and graduate students, with more complex mathematical details separated into "Advanced Topics" sections. It also offers extensive online resources, including films and software for network analysis.
The core idea of the book is that networks are everywhere, and understanding their structure and dynamics can provide valuable insights into a variety of complex systems. It uses real-world examples to illustrate key concepts and emphasizes the analysis of real network data.
Role in AI and Machine Learning
Network science plays a significant role in AI and machine learning by providing a framework for analyzing and understanding complex, interconnected data. Here's how it helps:
- Data Representation: Many real-world datasets can be represented as networks, such as social networks, transaction networks, and biological networks. Network science provides the tools to model and analyze this data, which can then be used to train machine learning models.
- Feature Engineering: Network properties, such as a node's centrality or the structure of its local neighborhood, can be used as features in machine learning models. This can help improve the performance of tasks like fraud detection, recommendation systems, and churn prediction.
- Graph Neural Networks (GNNs): GNNs are a class of deep learning models that are specifically designed to work with graph-structured data. They are heavily influenced by concepts from network science, such as message passing and neighborhood aggregation. GNNs have achieved state-of-the-art results on a variety of tasks, including node classification, link prediction, and graph classification.
- Understanding Complex Systems: Network science can be used to understand the behavior of complex systems, such as the spread of information or disease. This understanding can then be used to build more accurate AI and machine learning models.
Who Can Benefit and How?
A wide range of people can benefit from reading "Network Science," including:
- Data Scientists and Machine Learning Engineers: This book provides a strong foundation in network science, which is becoming increasingly important for working with graph-structured data. It can help them develop new features, build more accurate models, and gain a deeper understanding of their data.
- Computer Scientists and Software Engineers: The book can help them design more robust and efficient networked systems, such as communication networks and distributed systems.
- Social Scientists and Economists: The book can help them understand the structure and dynamics of social and economic networks, which can be used to study a variety of phenomena, such as the spread of fads and the stability of financial markets.
- Biologists and Medical Researchers: The book can help them understand the structure and function of biological networks, such as gene regulatory networks and protein-protein interaction networks. This can lead to new insights into diseases and the development of new drugs.
In short, anyone who is interested in understanding the interconnectedness of the world around them can benefit from reading "Network Science." It provides a powerful set of tools and concepts that can be applied to a wide variety of problems.
- Handwritten Digits Tutorial in PyTorch0This tutorial is essentially the "hello world" of image recognition and feed-forward neural network (using PyTorch). Using the MNIST database (filled within images of handwritten digits), the tutorial will instruct how to build a feed-forward neural network that can recognize handwritten digits. A solid understanding of feed-forward and back-propagation is recommended.
- Jetstream2 Docs Site0Jetstream2 makes cutting-edge high-performance computing and software easy to use for your research regardless of your project’s scale—even if you have limited experience with supercomputing systems.Cloud-based and on-demand, the 24/7 system includes discipline-specific apps. You can even create virtual machines that look and feel like your lab workstation or home machine, with thousands of times the computing power.
- Application Fundamentals (Android)0The provided text discusses various aspects of Android app development fundamentals. It covers key concepts related to app components, the AndroidManifest.xml file, and app resources. Android apps are built using various components, including Activities, Services, Broadcast Receivers, and Content Providers. These components serve different purposes and have distinct lifecycles. Activities are used for user interaction, services for background tasks, broadcast receivers for system-wide event handling, and content providers for managing shared data.The AndroidManifest.xml file is essential for declaring app components, permissions, and other settings. It informs the Android system about the app's components and capabilities. For instance, it specifies the minimum API level, declares hardware and software requirements, and defines intent filters to enable components to respond to specific actions.It's crucial to declare app requirements, such as device features and minimum Android API levels, to ensure compatibility with different devices and configurations. These declarations help in filtering the app's availability on Google Play for users with compatible devices.Android apps rely on resources separate from code, including images, layouts, strings, and more. These resources are stored in various directories and can be tailored for different device configurations. Providing alternative resources allows for optimization across different languages, screen sizes, orientations, and other factors. Understanding these fundamentals is essential for developing Android applications effectively, ensuring compatibility, and providing a consistent user experience across a wide range of devices and configurations.
- QGIS Processing Executor0Running QGIS tools from the command line
- Master’s in Cybersecurity Degree Essentials0Offers comprehensive information on various master's degree options in cybersecurity, including program details, admission requirements, and career opportunities, helping students make informed decisions about pursuing an advanced degree in cybersecurity.
- Long Tales of Science: A podcast about women in HPC0A series of interviews with women in the HPC community
- CMake Tutorials0CMake is an open-source tool used to manage the build process in operating systems. This tutorial takes you through how to use CMake from the very basics with example projects.