Discover an efficient solution to improve your workflow. Explore the benefits and get step-by-step guidance on implementation.
Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing
Presented by David Godlove at MAGIC meeting on February 7, 2018
HPC COMPATIBLE SECURITY MODEL
• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even
in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own
Join Our Mailing List
Optimize Your containerized OCI workflows with the latest Singularity Enterprise release. Dive into the enhancements today.
Pyro: A Comprehensive Pipeline for Eukaryotic Genome Assembly introduces a groundbreaking tool that can significantly advance our understanding of genetics and contribute to vital scientific discoveries. Pyro offers a comprehensive pipeline for assembling eukaryotic...