Recently Updated Pages
Data Structure
NEW implementation name : Software name version : version of the software name contact : c...
Architecture
AlphaFold
Introduction Environment Data Base Location run_udocker.py How to Run Example on Par...
Cloud Tutorials
Openstack Tutorials An Openstack Horizon/Dashboard tutorial can be found in these slides The O...
Interactive Sessions
Slurm allow interactive sessions into the workernodes, using ssh, but within a valid job allocati...
UDocker Containers
Availability of udocker containers directly on CVMFS read-only filesystem in order to speedup the...
How to transfer files between INCD and a local machine
NOTE Please note that INCD Lustre storage is not designed for small files. Attempting to store ...
Slurm
Slurm's architecture Slurm is made of a slurmd daemon running on each compute node and a central...
udocker
Seminar Lightweight Virtualization, Seminar at IFT, Madrid, Spain materials UIMP School Inte...
Introduction
Introductory materials to digital infrastructures and e-infrastrctures. "e-infrastructures an...
Tools
"EOSC-Synergy Jenkins Pipeline Library demonstration @ EGI conference 2020" Video: demo ...
WorSiCa
Tutorials related to the WorSiCa thematic service "Integration of WORSICA's thematic service i...
GBIF
Tutorials related to the GBIF thematic service "Global Biodiversity Information Facility (GBIF...
OPENCoastS
Tutorials related to the OPENCoastS thematic service "2nd OPENCoastS e-Tutorial: build your f...
Principles
"Software Development in modern days: DevOps methodology" Presentation: slides
Workflow using git
Install git on your machine: See Git installation guide. Create and setup your gitlab account: ...
Conda
Another example of conda environment setup. Login on the submit node Login on the cluster submi...
Intel MKL
Intel Math Kernel Library (Intel MKL) is a library of optimized math routines for science, engine...
How to check resource accounting
In the Openstack dashboard, select "Overview" on the left panel: Scroll down to see the "Usage...
Using SSH tunnels
In some cases you may need to access remote hosts that have private IP addresses or are protected...