On 3/1/2010 8:29 AM, Jonathan Dursi wrote:
Are there good discussions of this somewhere? What resources do you point users to when they have such requirements, and what sorts of things can we put in place on our end to make life easier for such users without imposing new requirements on the rest of our user base?
My suggestion is to follow the wit and wisdom of Nancy Reagan, and "just say no". That is getting intimate knowledge of all the cracks and crevices of sensitive/confidential data rules will be a huge time sink, and will probably take your attention away from the presumably more enjoyable benefits of a modern HPC cluster. Everytime I read about some embarrassing break-in to a confidential data storage environment, I count my lucky stars that I don't have any such data. I know that I couldn't do any better than the people whose names are now on the front page of the paper. Cordially, -- Jon Forrest Research Computing Support College of Chemistry 173 Tan Hall University of California Berkeley Berkeley, CA 94720-1460 510-643-1032 jlforr...@berkeley.edu _______________________________________________ Beowulf mailing list, Beowulf@beowulf.org sponsored by Penguin Computing To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf