You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »


NSF has a new requirement that all students (undergraduate, graduate, and postdoctoral) must have had training in Responsible Conduct in Research (RCR) *before* being supported (i.e., paid) by NSF. 

Furthermore, an on-line RCR certification system has been set up for this purpose.  It is found here:

Please note the following requirements as they apply to all VSoE students:

  • all currently NSF-supported students (undergraduate, graduate, and postdoctoral) *must* complete the on-line course this spring, as per the Provost's memo;
  • all new incoming PhD students and postdocs *must* complete the on-line course before being set up on payroll;
  • all undergraduates being put on an NSF support *must* complete the on-line course before being set up on payroll;
  • PIs who have or hope to have NSF funding are urged to have all their PhD students and postdocs complete the on-line course in any case, to avoid possible future delays in student payroll if students/postdocs are moved from one grant to another.

Papers to Read

Before the students start reading any papers, especially the Globus paper spend 45 minutes with the students

  • giving a high level overview of Grids
  • explaining the various Globus components
  • terminology of grid sites / grid site layout / submit hosts etc
  • security in grid. certificates etc

List of papers to read:

Setting up of credentials

Help the students set up their ssh keys so that they can log on to ISI machines from their laptops / home computers

  • log on to your linux box using action provided username and password
  • mkdir ~/.ssh
  • ssh-keygen -t dsa

    Enter passphrase (empty for no passphrase): ********
    Enter same passphrase again: ********
    Your identification has been saved in /nfs/asd2/username/.ssh/id_dsa.
    Your public key has been saved in /nfs/asd2/username/.ssh/
    The key fingerprint is:
    14:f9:31:1a:2d:e0:11:86:cd:3a:3d:9f:35:73:24:8c user isi key
    93.340u 0.070s 4:55.37 31.6%    0+0k 0+0io 363pf+0w
  • Make sure you enter a passphrase
  • Now you have a private key/public key pair generated.
  • cat id_dsa > authorized_keys
  • No labels