On 3/1/2010 8:29 AM, Jonathan Dursi wrote:

Are there good discussions of this somewhere? What resources do you
point users to when they have such requirements, and what sorts of
things can we put in place on our end to make life easier for such users
without imposing new requirements on the rest of our user base?

My suggestion is to follow the wit and wisdom of
Nancy Reagan, and "just say no". That is getting
intimate knowledge of all the cracks and crevices
of sensitive/confidential data rules will be a huge
time sink, and will probably take your attention
away from the presumably more enjoyable benefits
of a modern HPC cluster.

Everytime I read about some embarrassing break-in
to a confidential data storage environment, I count
my lucky stars that I don't have any such data.
I know that I couldn't do any better than the
people whose names are now on the front page of
the paper.

Cordially,

--
Jon Forrest
Research Computing Support
College of Chemistry
173 Tan Hall
University of California Berkeley
Berkeley, CA
94720-1460
510-643-1032
jlforr...@berkeley.edu
_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org sponsored by Penguin Computing
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to