Register training material
2 materials found

Authors: Coddington, Paul (orcid: 00...  or Churches, Tim 


WEBINAR: Where to go when your bioinformatics outgrows your compute

This record includes training materials associated with the Australian BioCommons webinar ‘Where to go when your bioinformatics outgrows your compute’. This webinar took place on 19 August 2021.

Bioinformatics analyses are often complex, requiring multiple software tools and specialised compute...

Keywords: Computational Biology, Bioinformatics, High performance computing, HPC, Galaxy Australia, Nectar Research Cloud, Pawsey Supercomputing Centre, NCI, NCMAS, Cloud computing

WEBINAR: Where to go when your bioinformatics outgrows your compute https://dresa.org.au/materials/webinar-where-to-go-when-your-bioinformatics-outgrows-your-compute-7a5a0ff8-8f4f-4fd0-af20-a88d515a6554 This record includes training materials associated with the Australian BioCommons webinar ‘Where to go when your bioinformatics outgrows your compute’. This webinar took place on 19 August 2021. Bioinformatics analyses are often complex, requiring multiple software tools and specialised compute resources. “I don’t know what compute resources I will need”, “My analysis won’t run and I don’t know why” and "Just getting it to work" are common pain points for researchers. In this webinar, you will learn how to understand the compute requirements for your bioinformatics workflows. You will also hear about ways of accessing compute that suits your needs as an Australian researcher, including Galaxy Australia, cloud and high-performance computing services offered by the Australian Research Data Commons, the National Compute Infrastructure (NCI) and Pawsey.  We also describe bioinformatics and computing support services available to Australian researchers.  This webinar was jointly organised with the Sydney Informatics Hub at the University of Sydney. Materials are shared under a Creative Commons Attribution 4.0 International agreement unless otherwise specified and were current at the time of the event. Files and materials included in this record: Event metadata (PDF): Information about the event including, description, event URL, learning objectives, prerequisites, technical requirements etc. Index of training materials (PDF): List and description of all materials associated with this event including the name, format, location and a brief description of each file. Where to go when your bioinformatics outgrows your compute - slides (PDF and PPTX): Slides presented during the webinar Australian research computing resources cheat sheet (PDF): A list of resources and useful links mentioned during the webinar. Materials shared elsewhere: A recording of the webinar is available on the Australian BioCommons YouTube Channel: https://youtu.be/hNTbngSc-W0 Melissa Burke (melissa@biocommons.org.au) Computational Biology, Bioinformatics, High performance computing, HPC, Galaxy Australia, Nectar Research Cloud, Pawsey Supercomputing Centre, NCI, NCMAS, Cloud computing
Locking the front door without leaving the windows open: positioning authentication technologies within the "Five Safes" framework for effective use of sensitive research data

This project explores the options for access to sensitive data sets; what authentication technologies (e.g. multi-factor authentication) are needed to access sensitive data and secure compute environments.  This project seeks to position choices around authentication technologies within the Five...

Keywords: ARDC, Storage and Compute Summit, FAIR, Infrastructure, NCRIS, eResearch, training material

Locking the front door without leaving the windows open: positioning authentication technologies within the "Five Safes" framework for effective use of sensitive research data https://dresa.org.au/materials/locking-the-front-door-without-leaving-the-windows-open-positioning-authentication-technologies-within-the-five-safes-framework-for-effective-use-of-sensitive-research-data-b83124f8-2add-41c6-b194-d5dd50d098f6 This project explores the options for access to sensitive data sets; what authentication technologies (e.g. multi-factor authentication) are needed to access sensitive data and secure compute environments.  This project seeks to position choices around authentication technologies within the Five Safes framework for research use of sensitive data, proposed in 2003 by Felix Ritchie of the UK Office of National Statistics: • Safe Projects: is the proposed research use of the data appropriate?  • Safe People: can the users be trusted to use the data in an appropriate manner?  • Safe Settings: does the access facility limit unauthorised use? • Safe Data: is there a disclosure risk in the data itself? • Safe Outputs: are the research results non-disclosive i.e. they do not compromise privacy or breach confidentiality? contact@ardc.edu.au ARDC, Storage and Compute Summit, FAIR, Infrastructure, NCRIS, eResearch, training material