Joint Center for Satellite Data Assimilation (JCSDA) successfully demonstrated software “supercontainers” for its next-generation Joint Effort for Data assimilation Integration (JEDI) system: Demonstration results were presented at the virtual 101st Annual...
Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing
Presented by David Godlove at MAGIC meeting on February 7, 2018
HPC COMPATIBLE SECURITY MODEL
• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even
in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own
Sylabs is proud to announce that the world’s fastest supercomputer, RIKEN’s Fugaku, has selected SingularityPRO: SingularityPRO offers the team at RIKEN the widest range of supported scenarios for their researchers to secure applications via Singularity Image...
The generally available release of Singularity 3.4.0 places emphasis on a single feature: The ability to build and run encrypted containers. We appreciate that some might object to our propensity towards hyperbole, given that seemingly sweeping statement. And...