How to cite SciServer
We at SciServer request that the following be added to the acknowledgement section of any paper or presentation using SciServer Resources, Tools, or Components:
SciServer is a collaborative research environment for large-scale data-driven science. It is being developed at, and administered by, the Institute for Data Intensive Engineering and Science at Johns Hopkins University. SciServer is funded by the National Science Foundation through the Data Infrastructure Building Blocks (DIBBs) program and others, as well as by the Alfred P. Sloan Foundation and the Gordon and Betty Moore Foundation.
When discussing the SciServer platform within the body of a paper, please cite “SciServer: a Science Platform for Astronomy and Beyond” (Taghizadeh-Popp et al., 2020, arXiv:2001.08619).
SciServer Data Storage Policy
SciServer provides two networked storage pools to store user data that can be accessed and used by all SciServer applications, in particular SciServer Compute: Storage and Temporary. Within each of these, users can create top level “User Volumes” within which they write data (folders and files), and which can be shared with other users.
- Storage pool (10 GB) is permanent, is backed up, and is Quota’d
- Temporary pool allows users to temporarily store large datasets, but
- is shared between users
- is not backed up
- is not Quota’d
- should not be used for permanent storage.
To ensure that Storage and Temporary storage do not become full, SciServer has introduced the following rules governing the allocation and reclamation of user space:
- SciServer currently allocates 10 GB of permanent space for each user, known as Storage.
- Attempts by users to exceed this allowance will fail.
- SciServer provides a large (measured in TB) shared Temporary storage space for all users.
- SciServer reserves the right to delete data – without prior notification – in the Temporary pool after a grace period of 72 hours in order to maintain acceptable free space for all users.
- The grace period begins at the creation of the file or folder.
- Modifying a file or folder does not reset the grace period.
- The oldest data files or folders will be deleted first.
- User requests for additional Temporary storage or retention time will be considered on a per-user basis.
SciServer provide two storage options for databases that can be used with the SciServer CASJobs application. This follows a similar pattern to the File Storage allocation:
- MyDB: This is a private database for each user to store the results of CASJobs queries.
- These databases are backed up
- They are permanent
- Tables can be shared with other users
- MyScratch: This is a shared temporary database to support the creation of ‘intermediate’ datasets results from long or large queries, too big to fit into the MyDB.
- This database is temporary and not backed up
- The data will be deleted after a short retention period
To ensure that MyDB and MyScratch storage do not become full, SciServer has introduced the following rules governing the allocation and reclamation of user space:
- SciServer currently allocates 0.5 GB of MyDB storage for each user.
- Attempts by users to exceed this allowance will fail.
- User requests for additional allocation of MyDB will be considered on a per user basis.
- SciServer provides 80 TB total of shared MyScratch storage space for all users.
- SciServer reserves the right to delete data in the MyScratch database after a grace period of 72 hours.
- The grace period begins at the creation of the database table.
- Modifying a table does not reset the grace period.
- Users will be notified by email 24 hours before their MyScratch data is deleted.
SciServer’s Data Storage Policy is subject to change. However, SciServer will not delete user data as a result of a policy change that decreases a user’s allocation in the Storage pool.
Users are permitted only one SciServer account. Please do not create multiple accounts to circumvent storage limits. If you need more storage, please request by contacting the SciServer helpdesk. Violation of this policy may result in your account being suspended or deleted.
SciServer Compute Container Use Policy
SciServer Compute Containers that have not been accessed recently will be permanently removed. At the time of writing, those containers that have not been accessed (by clicking on the container name in the SciServer Compute application) for 90 days are candidates for removal.
Users are permitted only one SciServer account. Please do not create multiple accounts to circumvent computation limits. Violation of this policy may result in your account being suspended or deleted.
SciServer Non-Commercial Use Policy
SciServer tools and services may only be used for non-commercial purposes. Logging in and using the SciServer system implies your acknowledgement and acceptance of this policy.
Johns Hopkins Information Technology Use Policies
User Policies: Use of IT Resources
- Acceptable Use
Acceptable use of IT Resources is use that is consistent with Johns Hopkins’ missions of education, research, service, and patient care, and is legal, ethical, and honest. Acceptable use must respect intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and freedom from intimidation, harassment, and annoyance. Further, it must show consideration in the consumption and utilization of IT Resources, and it must not jeopardize Johns Hopkins’ not-for-profit status. Incidental personal use of IT Resources is permitted if consistent with applicable JH and divisional policy, and if such use is reasonable, not excessive, and does not impair work performance or productivity.
- Unacceptable Use
- Unacceptable use of IT Resources includes, but is not limited to:
- Unauthorized access to or unauthorized use of JH IT Resources.
- Use of IT Resources in violation of any applicable law.
- Harassing others by sending annoying, abusive, profane, threatening, defamatory, offensive, or unnecessarily repetitive messages or web-site postings, or by sending messages or web-site postings that appear to come from someone other than the sender.
- Any activity designed to hinder another person’s or institution’s use of its own information technology resources.
- Privacy violations (e.g., disclosure or misuse of private information of others).
- Installation of inappropriate software or hardware on IT Resources (e.g., network or password “sniffing” software, offensive applications, and malicious software).
- Any use of copyrighted materials in violation of copyright laws or of vendor licensing agreements (e.g. illegal downloading and/or sharing of media files or computer software).
- Intentional, non-incidental acquisition, storage, and/or display of sexually explicit images, except for acknowledged, legitimate medical, scholarly, educational, or forensic purposes. Exposure and/or display of such material may be offensive, constitute sexual harassment or create a hostile work environment.
- Security breaches, intentional or otherwise, including, as examples, improper disclosure of a password, use of another user’s account, or negligent management of a server resulting in its unauthorized use or compromise.
- Commercial use of IT Resources for business purposes not related to Johns Hopkins.
- Use (e.g. e-mail, social media, blogs), without specific authorization, to imply JH support (as opposed to personal support) for any position or proposition.
- Use to engage in activities, including for example certain political activities, prohibited to tax exempt 501 (c) (3) organizations or that otherwise may result in a hostile work environment.