Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing
Presented by David Godlove at MAGIC meeting on February 7, 2018
HPC COMPATIBLE SECURITY MODEL
• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even
in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own
Join Our Mailing List
Introduction The Acorn RISC Machine, or ARM as it is now known, and later processor architecture has become a cornerstone in the landscape of Information Technology (IT) and modern computing. Initially designed for Acorn Computers in the 1980s, ARM processors have...
Performance portability should be a major concern to those who wish to effectively implement AI and MLIn the ever-evolving landscape of artificial intelligence (AI) and machine learning (ML), performance portability has emerged as a critical factor influencing the...
Overview With CentOS 7 reaching end of life on June 30th, 2024 and CentOS 8 already discontinued in favor of CentOS Stream, users of open source SingularityCE might find themselves in a situation where a migration to another open source operating system is necessary....