Skip to content
Snippets Groups Projects
Commit 6c979406 authored by Lukáš Krupčík's avatar Lukáš Krupčík
Browse files

oprava internich linku test

parent 5450f0e9
No related branches found
No related tags found
No related merge requests found
...@@ -9,4 +9,4 @@ Anyone is welcomed to apply via the [Directors Discretion.](http://www.it4i.cz/o ...@@ -9,4 +9,4 @@ Anyone is welcomed to apply via the [Directors Discretion.](http://www.it4i.cz/o
Foreign (mostly European) users can obtain computational resources via the [PRACE (DECI) program](http://www.prace-ri.eu/DECI-Projects). Foreign (mostly European) users can obtain computational resources via the [PRACE (DECI) program](http://www.prace-ri.eu/DECI-Projects).
In all cases, IT4Innovations’ access mechanisms are aimed at distributing computational resources while taking into account the development and application of supercomputing methods and their benefits and usefulness for society. The applicants are expected to submit a proposal. In the proposal, the applicants **apply for a particular amount of core-hours** of computational resources. The requested core-hours should be substantiated by scientific excellence of the proposal, its computational maturity and expected impacts. Proposals do undergo a scientific, technical and economic evaluation. The allocation decisions are based on this evaluation. More information at [Computing resources allocation](http://www.it4i.cz/computing-resources-allocation/?lang=en) and [Obtaining Login Credentials](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/) page. In all cases, IT4Innovations’ access mechanisms are aimed at distributing computational resources while taking into account the development and application of supercomputing methods and their benefits and usefulness for society. The applicants are expected to submit a proposal. In the proposal, the applicants **apply for a particular amount of core-hours** of computational resources. The requested core-hours should be substantiated by scientific excellence of the proposal, its computational maturity and expected impacts. Proposals do undergo a scientific, technical and economic evaluation. The allocation decisions are based on this evaluation. More information at [Computing resources allocation](http://www.it4i.cz/computing-resources-allocation/?lang=en) and [Obtaining Login Credentials](obtaining-login-credentials/obtaining-login-credentials/) page.
\ No newline at end of file \ No newline at end of file
...@@ -7,7 +7,7 @@ The computational resources of IT4I  are allocated by the Allocation Committee ...@@ -7,7 +7,7 @@ The computational resources of IT4I  are allocated by the Allocation Committee
![](Authorization_chain.png) ![](Authorization_chain.png)
You need to either [become the PI](get-started-with-it4innovations/applying-for-resources/) or [be named as a collaborator](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#authorization-of-collaborator-by-pi) by a PI in order to access and use the clusters. You need to either [become the PI](applying-for-resources/) or [be named as a collaborator](obtaining-login-credentials/#authorization-of-collaborator-by-pi) by a PI in order to access and use the clusters.
Head of Supercomputing Services acts as a PI of a project DD-13-5. Joining this project, you may **access and explore the clusters**, use software, development environment and computers via the qexp and qfree queues. You may use these resources for own education/research, no paperwork is required. All IT4I employees may contact the Head of Supercomputing Services in order to obtain **free access to the clusters**. Head of Supercomputing Services acts as a PI of a project DD-13-5. Joining this project, you may **access and explore the clusters**, use software, development environment and computers via the qexp and qfree queues. You may use these resources for own education/research, no paperwork is required. All IT4I employees may contact the Head of Supercomputing Services in order to obtain **free access to the clusters**.
...@@ -61,7 +61,7 @@ Once authorized by PI, every person (PI or Collaborator) wishing to access the c ...@@ -61,7 +61,7 @@ Once authorized by PI, every person (PI or Collaborator) wishing to access the c
3. Statement that you have read and accepted the [Acceptable use policy document](http://www.it4i.cz/acceptable-use-policy.pdf) (AUP). 3. Statement that you have read and accepted the [Acceptable use policy document](http://www.it4i.cz/acceptable-use-policy.pdf) (AUP).
4. Attach the AUP file. 4. Attach the AUP file.
5. Your preferred username, max 8 characters long. The preferred username must associate your surname and name or be otherwise derived from it. Only alphanumeric sequences, dash and underscore signs are allowed. 5. Your preferred username, max 8 characters long. The preferred username must associate your surname and name or be otherwise derived from it. Only alphanumeric sequences, dash and underscore signs are allowed.
6. In case you choose [Alternative way to personal certificate](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#alternative-way-of-getting-personal-certificate), 6. In case you choose [Alternative way to personal certificate](obtaining-login-credentials/#alternative-way-of-getting-personal-certificate),
a **scan of photo ID** (personal ID or passport or driver license) is required a **scan of photo ID** (personal ID or passport or driver license) is required
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us): Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
...@@ -82,7 +82,7 @@ Example (except the subject line which must be in English, you may use Czech or ...@@ -82,7 +82,7 @@ Example (except the subject line which must be in English, you may use Czech or
(Digitally signed) (Digitally signed)
``` ```
Should the above information be provided by e-mail, the e-mail **must be** digitally signed. To sign an e-mail, you need digital certificate. Read more on [digital signatures](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#the-certificates-for-digital-signatures) below. Should the above information be provided by e-mail, the e-mail **must be** digitally signed. To sign an e-mail, you need digital certificate. Read more on [digital signatures](obtaining-login-credentials/#the-certificates-for-digital-signatures) below.
Digital signature allows us to confirm your identity in remote electronic communication and provides an encrypted channel to exchange sensitive information such as login credentials. After receiving your signed e-mail with the requested information, we will send you your login credentials (user name, key, passphrase and password) to access the IT4I systems. Digital signature allows us to confirm your identity in remote electronic communication and provides an encrypted channel to exchange sensitive information such as login credentials. After receiving your signed e-mail with the requested information, we will send you your login credentials (user name, key, passphrase and password) to access the IT4I systems.
...@@ -96,7 +96,7 @@ You will receive your personal login credentials by protected e-mail. The login ...@@ -96,7 +96,7 @@ You will receive your personal login credentials by protected e-mail. The login
2. ssh private key and private key passphrase 2. ssh private key and private key passphrase
3. system password 3. system password
The clusters are accessed by the [private key](get-started-with-it4innovations/accessing-the-clusters/shell-access-and-data-transfer/ssh-keys/) and username. Username and password is used for login to the information systems listed on <http://support.it4i.cz/>. The clusters are accessed by the [private key](shell-access-and-data-transfer/ssh-keys/) and username. Username and password is used for login to the information systems listed on <http://support.it4i.cz/>.
### Change Passphrase ### Change Passphrase
...@@ -106,7 +106,7 @@ On Linux, use ...@@ -106,7 +106,7 @@ On Linux, use
local $ ssh-keygen -f id_rsa -p local $ ssh-keygen -f id_rsa -p
``` ```
On Windows, use [PuTTY Key Generator](get-started-with-it4innovations/accessing-the-clusters/shell-access-and-data-transfer/puttygen/). On Windows, use [PuTTY Key Generator](shell-access-and-data-transfer/puttygen/).
### Change Password ### Change Password
...@@ -120,11 +120,11 @@ Certificate generation process is well-described here: ...@@ -120,11 +120,11 @@ Certificate generation process is well-described here:
- [How to generate a personal TCS certificate in Mozilla Firefox web browser (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen) - [How to generate a personal TCS certificate in Mozilla Firefox web browser (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen)
A FAQ about certificates can be found here: [Certificates FAQ](get-started-with-it4innovations/obtaining-login-credentials/certificates-faq/). A FAQ about certificates can be found here: [Certificates FAQ](certificates-faq/).
Alternative Way to Personal Certificate Alternative Way to Personal Certificate
------------------------------------------- -------------------------------------------
Follow these steps **only** if you can not obtain your certificate in a standard way. In case you choose this procedure, please attach a **scan of photo ID** (personal ID or passport or drivers license) when applying for [login credentials](get-started-with-it4innovations/obtaining-login-credentials/obtaining-login-credentials/#the-login-credentials). Follow these steps **only** if you can not obtain your certificate in a standard way. In case you choose this procedure, please attach a **scan of photo ID** (personal ID or passport or drivers license) when applying for [login credentials](obtaining-login-credentials/#the-login-credentials).
1. Go to <https://www.cacert.org/>. 1. Go to <https://www.cacert.org/>.
- If there's a security warning, just acknowledge it. - If there's a security warning, just acknowledge it.
......
Documentation Documentation
============= =============
Welcome to IT4Innovations documentation pages. The IT4Innovations national supercomputing center operates supercomputers [Salomon](/salomon/introduction/) and [Anselm](/anselm-cluster-documentation/introduction/). The supercomputers are [ available](get-started-with-it4innovations/applying-for-resources.html) to academic community within the Czech Republic and Europe and industrial community worldwide. The purpose of these pages is to provide a comprehensive documentation on hardware, software and usage of the computers. Welcome to IT4Innovations documentation pages. The IT4Innovations national supercomputing center operates supercomputers [Salomon](/salomon/introduction/) and [Anselm](/anselm-cluster-documentation/introduction/). The supercomputers are [ available](get-started-with-it4innovations/applying-for-resources/) to academic community within the Czech Republic and Europe and industrial community worldwide. The purpose of these pages is to provide a comprehensive documentation on hardware, software and usage of the computers.
How to read the documentation How to read the documentation
----------------------------------------- -----------------------------------------
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment