Difference between revisions of "CyberShake Training"
Line 43: | Line 43: | ||
In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above. These videos are available below. | In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above. These videos are available below. | ||
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_1_2017-11-02T12_11.mp4 CyberShake training, part 1] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_1_2017-11-02T12_11.mp4 CyberShake training, part 1] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_2_2017-11-09T12_11.mp4 CyberShake training, part 2] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_2_2017-11-09T12_11.mp4 CyberShake training, part 2] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_3_2018-01-18T15_01.mp4 CyberShake training, part 3] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_3_2018-01-18T15_01.mp4 CyberShake training, part 3] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_4_2018-02-01T14_02.mp4 CyberShake training, part 4] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_4_2018-02-01T14_02.mp4 CyberShake training, part 4] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_5_2018-02-08T14_02.mp4 CyberShake training, part 5] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_5_2018-02-08T14_02.mp4 CyberShake training, part 5] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_6_2018-02-14T15_02.mp4 CyberShake training, part 6] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_6_2018-02-14T15_02.mp4 CyberShake training, part 6] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_7_2018-03-02T14_03.mp4 CyberShake training, part 7] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_7_2018-03-02T14_03.mp4 CyberShake training, part 7] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_8_2018-04-06T15_04.mp4 CyberShake training, part 8] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_8_2018-04-06T15_04.mp4 CyberShake training, part 8] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_9_2018-04-13T12_04.mp4 CyberShake training, part 9] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_9_2018-04-13T12_04.mp4 CyberShake training, part 9] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_10_2018-05-09T13_05.mp4 CyberShake training, part 10] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_10_2018-05-09T13_05.mp4 CyberShake training, part 10] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_11_2018-09-27T16_09.mp4 CyberShake training, part 11] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_11_2018-09-27T16_09.mp4 CyberShake training, part 11] |
− | *[https://hypocenter.usc.edu/research/cybershake/CyberShake_training_part_12_2018-10-04T13_10.mp4 CyberShake training, part 12] | + | *[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_12_2018-10-04T13_10.mp4 CyberShake training, part 12] |
== Related Entries == | == Related Entries == | ||
*[[CyberShake]] | *[[CyberShake]] | ||
*[[CME Project]] | *[[CME Project]] |
Revision as of 19:15, 14 February 2020
This page is the entry point to documentation on the CyberShake software platform.
We divide CyberShake training into the following elements:
- CyberShake data overview
- CyberShake code base
- CyberShake rupture file set
- CyberShake workflow middleware
- CyberShake utilities
Contents
CyberShake data
CyberShake produces a variety of output data products. A description of each kind of data product, and how to access them, is available at CyberShake Data.
CyberShake code base
A detailed description of all the pieces of the CyberShake scientific simulation codes is available at CyberShake Code Base.
CyberShake rupture files
Rupture files serve as a key input to CyberShake simulations. More information on their role, location, and format is available at CyberShake Rupture Files.
Workflow Framework
CyberShake relies on Pegasus-WMS, HTCondor, and the Globus Toolkit running on shock.usc.edu, as well as code to generate a DAX description of the workflow. The workflow framework for CyberShake is described in detail at CyberShake Workflow Framework.
Workflow Monitoring
There are multiple ways to monitor a CyberShake workflow, both locally and remotely. We describe the different ways at CyberShake Workflow Monitoring.
Study Framework
During CyberShake study execution, we use an additional layer of automation and monitoring around the workflow framework. These components are described at CyberShake Study Framework.
CyberShake utilities
Extending CyberShake
The steps required to add new elements CyberShake are here: Adding to CyberShake.
Training Videos
In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above. These videos are available below.
- CyberShake training, part 1
- CyberShake training, part 2
- CyberShake training, part 3
- CyberShake training, part 4
- CyberShake training, part 5
- CyberShake training, part 6
- CyberShake training, part 7
- CyberShake training, part 8
- CyberShake training, part 9
- CyberShake training, part 10
- CyberShake training, part 11
- CyberShake training, part 12