Requesting An Account
The cluster is accessible to authorized users and can only be accessed from department computers, TAMU VPN, TAMU WiFi and eduroam via SSH with a Yubikey. Requesting an account is simple, and once approved the applicant will be issued a Yubikey (personal Yubikeys can also be used). An admin will aid the applicant in the process of setting up the Yubikey and installing the applicant's public key in their account.
- Mathematics Faculty
Send an email to artsci-help@tamu.edu including the following information:
- SUBJECT: Whistler Account Request
- Full Name
- Email (@tamu.edu)
- Short description of the research to be performed on the system
- List of the software you need / expect to use on the system
- Students and Collaborators
All students, post-docs, external and internal collaborators must be sponsored by an existing stakeholder or affiliated faculty member within the Mathematics Department. Also, note that the system can only be accessed via the campus VPN and other campus networks. Any external collaborator will first need to apply for a NetID and access to the VPN.
Send an email to artsci-help@tamu.edu including the following information:- SUBJECT: Whistler Account Request
- Sponsoring Faculty: Full Name
- Applicant: Full Name
- Applicant Email: (@tamu.edu)
- Short description of the research to be performed on the system
- List of the software you need / expect to use on the system
Acceptable Use Policy
All users of the cluster must agree to the following policy. Violation of any part of the policy will result in account removal.
WHISTLER / BLADES COMPUTING RESOURCE
ACCEPTABLE USE POLICY
This computer system and data herein are available only for authorized purposes by authorized users in accordance with TAMU SAP 29.01.03.M0.02, Rules for Responsible Computing. Use for any other purpose may result in administrative/disciplinary actions and/or criminal prosecution against the user. Usage may be subject to security testing and monitoring. Users have no expectation of privacy except as otherwise provided by applicable privacy laws.
By using this computer system you acknowledge and affirm that all data stored/used is only public data (DC-3) or university-internal data (DC-4) as defined in the Texas A&M Information Security Controls Catalog:
https://it.tamu.edu/policy/it-policy/controls-catalog/index.php#controls-DC
No data categorized as confidential (DC-5) or critical (DC-6) may be used, stored, or transmitted by this computer system.
This computer system is a shared resource and we ask that users request only as much resources (cores and memory) that are necessary for their computation. Users that repeatedly request more resources than necessary will find their jobs cancelled. Additionally, this computer resource is not intended to be an ssh jump-host, and we ask that users do not initiate ssh connections from the computer resource to other systems with the exception version control systems (git/github) or for using scp/sftp to move data.