SciServer Compute enables users to create and use Jupyter Notebooks on servers that are close to the data stored on the SciServer system. SciServer provides two networked locations to store user data that are connected to a user’s Compute container: Persistent and Scratch storage.
- Persistent storage is permanent, and is backed up.
Scratch space allows users to temporarily store large datasets, but
- is shared between users,
- is not backed up, and
- should not be used for permanent storage.
To ensure that Persistent and Scratch storage do not become full, SciServer has introduced the following rules governing reclamation of Persistent and Scratch space.
SciServer currently allocates 10 GB of Persistent storage for each user.
- Attempts by users to exceed their Persistent data storage allocation may fail.
- SciServer reserves the right to delete a user’s Persistent data that is in excess of their allocation.
- User requests for additional Persistent storage will be considered on a per user basis.
SciServer provides 80 TB total of shared Scratch storage space for all users.
- SciServer reserves the right to delete Scratch data after a Grace Period of 72 hours.
- The Grace Period begins at the creation of the file or database schema.
- Modifying a file or database schema does not reset the grace period.
- The oldest data files or schemas will be deleted first.
- User requests for additional Scratch storage or time will be considered on a per user basis.
- Users will be notified by email 24 hours before their Persistent or Scratch data is deleted.
SciServer’s Data Storage Policy is subject to change. However, SciServer will not delete user data as a result of a policy change that decreases users’ storage allocation.
Use of SciServer Compute implies acknowledgement and acceptance of the SciServer Data Storage Policy.
SciServer tools and services may only be used for non-commercial purposes. Logging in and using the SciServer system implies your acknowledgement and acceptance of this policy.
User Policies: Use of IT Resources
- Acceptable Use
Acceptable use of IT Resources is use that is consistent with Johns Hopkins’ missions of education, research, service, and patient care, and is legal, ethical, and honest. Acceptable use must respect intellectual property, ownership of data, system security mechanisms, and individuals’ rights to privacy and freedom from intimidation, harassment, and annoyance. Further, it must show consideration in the consumption and utilization of IT Resources, and it must not jeopardize Johns Hopkins’ not-for-profit status. Incidental personal use of IT Resources is permitted if consistent with applicable JH and divisional policy, and if such use is reasonable, not excessive, and does not impair work performance or productivity.
- Unacceptable Use
- Unacceptable use of IT Resources includes, but is not limited to:
- Unauthorized access to or unauthorized use of JH IT Resources.
- Use of IT Resources in violation of any applicable law.
- Harassing others by sending annoying, abusive, profane, threatening, defamatory, offensive, or unnecessarily repetitive messages or web-site postings, or by sending messages or web-site postings that appear to come from someone other than the sender.
- Any activity designed to hinder another person’s or institution’s use of its own information technology resources.
- Privacy violations (e.g., disclosure or misuse of private information of others).
- Installation of inappropriate software or hardware on IT Resources (e.g., network or password “sniffing” software, offensive applications, and malicious software).
- Any use of copyrighted materials in violation of copyright laws or of vendor licensing agreements (e.g. illegal downloading and/or sharing of media files or computer software).
- Intentional, non-incidental acquisition, storage, and/or display of sexually explicit images, except for acknowledged, legitimate medical, scholarly, educational, or forensic purposes. Exposure and/or display of such material may be offensive, constitute sexual harassment or create a hostile work environment.
- Security breaches, intentional or otherwise, including, as examples, improper disclosure of a password, use of another user’s account, or negligent management of a server resulting in its unauthorized use or compromise.
- Commercial use of IT Resources for business purposes not related to Johns Hopkins.
- Use (e.g. e-mail, social media, blogs), without specific authorization, to imply JH support (as opposed to personal support) for any position or proposition.
- Use to engage in activities, including for example certain political activities, prohibited to tax exempt 501 (c) (3) organizations or that otherwise may result in a hostile work environment.