Sponsored Content
Special Forums UNIX and Linux Applications High Performance Computing How can an EE major looking to get into HPC bolster their CS foundation? Post 302896194 by drl on Saturday 5th of April 2014 07:08:30 AM
Old 04-05-2014
Hi.

As a student, you can join IEEE for a small cost. The periodicals and magazines are generally 1/2 price. There may be local IEEE groups you can join. For example, there have been many meetings that I have attended, usually luncheon discussions, but often full-day seminars on specific topics arranged by the local IEEE group. I am a member of a local IEEE Innovation Study Group.

The costs will go up after you are no longer a student, but then the membership is great for continuing education and contacts.

At one time, I also belonged to the Welcome and the Homepage | Mathematical Association of America , but the IEEE had more practical use in my career ... cheers, drl

IEEE - The world's largest professional association for the advancement of technology

https://www.ieee.org/membership-cata...c_mem_computer

IEEE Computer Society - Premier Organization of Computer Professionals

http://www.google.com/search?hl=&q=h...rformance+ieee
 

6 More Discussions You Might Find Interesting

1. High Performance Computing

HPC Related Links

Our directory of HPC related links is growing: Virtualization, Grid and Cloud Computing - Links Please contribute! (0 Replies)
Discussion started by: Neo
0 Replies

2. High Performance Computing

Guides for new HPC admins

In my company, it's fallen on me to serve as the admin of our new HPC cluster, a task that's very new to me. It's very important to me to lay a solid foundation and avoid any unnecessary pitfalls. So, can anyone recommend a succinct guide or list of do's-and-don'ts for adiminstering an HPC cluster?... (0 Replies)
Discussion started by: DBryan
0 Replies

3. High Performance Computing

How to check performance of your HPC cluster?

Hello Everybody, I have few queries : Do you have any idea how to check the performance of HPC cluster having mpich on top of centos 6.2? Are there any standard programs (like FFT, graphics rendering etc) to check the performance of mpi cluster with single node and multiple nodes? Can we... (4 Replies)
Discussion started by: albertspade
4 Replies

4. High Performance Computing

HPC Linpack test

Hi, I compiled Linpack with ATLAS for test. What other libraries except ATLAS can be used to test? (2 Replies)
Discussion started by: PtaQ
2 Replies

5. Homework & Coursework Questions

Class hpc project

My high school started a tech lab where students like myself can take apart computers, build circuit boards, learn to program and lots more. I got the job of building a cluster with 4 old work stations we have. This is just a trial if it works well we can get more work stations. We have one... (3 Replies)
Discussion started by: PC-2011
3 Replies

6. High Performance Computing

Helpful Ressources for HPC Admin

Hi Everyone I am new to this valuable forum and would like to ask members for some helpful resources to learn HPC administration and monitoring resources such as webinars, websites, forums, books, and moocs as I need them to get more competencies to my career. Thanks (0 Replies)
Discussion started by: akchired
0 Replies
MUNGE(7)						    MUNGE Uid 'N' Gid Emporium							  MUNGE(7)

NAME
munge - MUNGE overview INTRODUCTION
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scal- able for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods. RATIONALE
The need for MUNGE arose out of the HPC cluster environment. Consider the scenario in which a local daemon running on a login node receives a client request and forwards it on to remote daemons running on compute nodes within the cluster. Since the user has already logged on to the login node, the local daemon just needs a reliable means of ascertaining the UID and GID of the client process. Further- more, the remote daemons need a mechanism to ensure the forwarded authentication data has not been subsequently altered. A common solution to this problem is to use Unix domain sockets to determine the identity of the local client, and then forward this infor- mation on to remote hosts via trusted rsh connections. But this presents several new problems. First, there is no portable API for deter- mining the identity of a client over a Unix domain socket. Second, rsh connections must originate from a reserved port; the limited number of reserved ports available on a given host directly limits scalability. Third, root privileges are required in order to bind to a reserved port. Finally, the remote daemons have no means of determining whether the client identity is authentic. USAGE
A process creates a credential by requesting one from the local MUNGE service, either via the munge_encode() C library call or the munge executable. The encoded credential contains the UID and GID of the originating process. This process sends the credential to another process within the security realm as a means of proving its identity. The receiving process validates the credential with the use of its local MUNGE service, either via the munge_decode() C library call or the unmunge executable. The decoded credential provides the receiving process with a reliable means of ascertaining the UID and GID of the originating process. This information can be used for accounting or access control decisions. DETAILS
The contents of the credential (including any optional payload data) are encrypted with a key shared by all munged daemons within the secu- rity realm. The integrity of the credential is ensured by a message authentication code (MAC). The credential is valid for a limited time defined by its time-to-live (TTL); this presumes clocks within a security realm are in sync. Unexpired credentials are tracked by the local munged daemon in order to prevent replay attacks on a given host. Decoding of a credential can be restricted to a particular user and/or group ID. The payload data can be used for purposes such as embedding the destination's address to ensure the credential is only valid on a specific host. The internal format of the credential is encoded in a platform-independent manner. And the credential itself is base64 encoded to allow it to be transmitted over virtually any transport. AUTHOR
Chris Dunlap <cdunlap@llnl.gov> COPYRIGHT
Copyright (C) 2007-2011 Lawrence Livermore National Security, LLC. Copyright (C) 2002-2007 The Regents of the University of California. MUNGE is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Additionally for the MUNGE library (libmunge), you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. SEE ALSO
munge(1), remunge(1), unmunge(1), munge(3), munge_ctx(3), munge_enum(3), munged(8). http://munge.googlecode.com/ munge-0.5.10 2011-02-25 MUNGE(7)
All times are GMT -4. The time now is 10:50 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy