Recherche avancée
Résultats de recherche
179 résultats trouvés au total
MFA Configuration
Consult and immediately configure new authe ... your phone using the links for Android and iOS, or directly via the QR cod ...es Keep your phone nearby and return to the setup page to con ... choose Work or school account, and Scan the QR code You may allow...
Research - Introduction to using the HPC clusters
... applications require computing and or storage resources that go be ... provide the necessary hardware and software infrastructure to effi ...ciently run computing and data intensive applications. Th ...to efficiently use UNIL compute and storage infrastructure, and als...
Migrating from SWITCHdrive to OneDrive
... Identify Shared Folders First and foremost, you need to identify ...ich folders are shared with you and which folders you have shared w ... of the folders shared with you and those you share with others; th ...SWITCHdrive icon in the top bar and select Open the local 'SWITCHdr...
SSH connection to DCSR cluster
...ord, just run the following command: ssh username@curnagl.dcsr.unil ...se, replace username in the command line with your UNIL login, and use your UNIL password. Note: I ...password fields. This is normal and a security measure to prevent l ...Just type your password blindly and validate with Enter. The first...
Urblauna
...a. The differences between Jura and Urblauna are described here Sup ...t the DCSR via helpdesk@unil.ch and start the mail subject with "DC ...he processing of sensitive data and as such comes with a number of ...prompted to enter your username and password followed by the 2FA co...
Dask on curnagl
...uster: this mode is very simple and can be used to easily paralleli ...point SlurmCluster: this mode handle more parallelisim by distribu ...rk on several machines. It can handle load and submit automatically new jobs f ... def compute(x): ""CPU demanding code" if __name__ == ...
How do I use Tresorit?
...n with your UNIL e-mail address and your Tresorit password. Extern ...d for your Tresorit appointment and your Tresorit password. If you ...l including the installation of Android or iOS applications, as wel ...en click on the "Import" button and select the folder or files you ...
Multifactor Authentication With edu-ID
... of multifactor authentication, and its activation is easy. To read ...ial SWITCH documentation on MFA and edu-ID, visit the following pag ...-ID account at https://eduid.ch and click on the Security tab, and then click the On button next t ...cator, BitWarden Authenticator, and OTP Auth. (Other applications t...
FAQ Tresorit
...it? Tresorit is a file storage and sharing service. It is a specif ...through advanced access control and data encryption. More details o ...se definition (Art. 4, paras. 1 and 2 of the LPrD) that applies to ...cal state; individual measures and assistance arising from social ...
Machine Learning
...d as tools for data exploration and visualisation (dimension reduct ...ion and clustering), - Supervised mach ...tion We can help you to understand how a particular machine learni ...ng method works and how it may be used in your rese ...logy We can help you to choose and apply the appropriate machine l...
High Performance Computing
...t able to perform your research and run computations on your local ...rnessing the DCSR clusters (CPU and GPU) scaling your codes to lar ...eanvoine - HPC programming (CPU and GPU), code optimisation, scient ...ic software stack Mainly HEC and GSE faculties Flavio Calvo - H...
How to configure a USB-C monitor / screen
...wer computers, UNIL is adapting and getting new screens compatible ...with the USB-C connector standard. Those new screens present ...receiving input from a keyboard and mouse connected to the screen, and all this whilst receiving an AC ...on for a superior image clarity and more and more comfort for your ...
Messagerie
...artphones) macOS Le CI recommande l'utilisation d'Outlook plutôt ...de connexion s'ouvre et vous demande de saisir votre mot de passe U ...re Informatique de l'Unil recommande l'utilisation d'Outlook sur vo ...e/iPad/iPod Touch) Le Ci recommande d'utiliser les logiciels livré...
How to run a job on Curnagl
...ython code called <my_code.py>, and you want to run it on the clust ... number of CPUs you want to use and the amount of RAM memory you wi ...tware installed on the cluster) and your code will be executed. The ...pu - this is the main partition and includes the majority of the co...
Running the MPAS framework on the cluster
...or developing atmosphere, ocean and other earth-system simulation c ...se in climate, regional climate and weather studies. Compilation ... present instructions is v8.1.0 and future versions might need some ... adjustments to compile and run. Patch the MPAS Makefile: ...
General information
...k Attached Storage) storage yet and you would like one, the PI (Pri ...e DCSR has accepted the request and the access has been granted to ...data) What are the /D1c, /D2c, and /LTS subdirectories? In your p ...ory you will see at least a D2c and a LTS directory, with the follo...
First steps in MyUNIL
...iew of your university activity and quick access to the most freque ... courses, documents, timetables and academic results Work Salary ...data and certificates Campus Informati ...on and services related to campus life ... News & Events Events, news and university calendar Elements i...
Filetransfer from the cluster
... allow you to transfer files to and from external collaborators. Th ...alternative to SWITCHFileSender and the space available is 6TB with ...service is based on LiquidFiles and the user guide is available at ...l In order to transfer files to and from the DCSR clusters without ...
Database support for humanities
...al watch to provide researchers and research groups in the humaniti ...esearchers to organise, exploit and expose research databases onlin ... The DCSR relies on tools used and supported by a strong community ... (individuals and institutions). These tools are ...
Sandbox containers
...y/r_python_singularity.html Sandboxes A container image (the .s ...if file) is read only and its contents cannot be changed ...nteractively modify a container and this is what sandboxes are for. Please be aware ...that anything done by hand is not reproducible so all step...