Difference between revisions of "CyberShake Training"

From SCECpedia
Jump to navigationJump to search
 
Line 51: Line 51:
 
In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above.  These videos are available below.
 
In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above.  These videos are available below.
  
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_1_2017-11-02T12_11.mp4 CyberShake training, part 1]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_1_2017-11-02T12_11.mp4 CyberShake training, part 1]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_2_2017-11-09T12_11.mp4 CyberShake training, part 2]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_2_2017-11-09T12_11.mp4 CyberShake training, part 2]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_3_2018-01-18T15_01.mp4 CyberShake training, part 3]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_3_2018-01-18T15_01.mp4 CyberShake training, part 3]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_4_2018-02-01T14_02.mp4 CyberShake training, part 4]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_4_2018-02-01T14_02.mp4 CyberShake training, part 4]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_5_2018-02-08T14_02.mp4 CyberShake training, part 5]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_5_2018-02-08T14_02.mp4 CyberShake training, part 5]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_6_2018-02-14T15_02.mp4 CyberShake training, part 6]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_6_2018-02-14T15_02.mp4 CyberShake training, part 6]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_7_2018-03-02T14_03.mp4 CyberShake training, part 7]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_7_2018-03-02T14_03.mp4 CyberShake training, part 7]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_8_2018-04-06T15_04.mp4 CyberShake training, part 8]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_8_2018-04-06T15_04.mp4 CyberShake training, part 8]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_9_2018-04-13T12_04.mp4 CyberShake training, part 9]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_9_2018-04-13T12_04.mp4 CyberShake training, part 9]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_10_2018-05-09T13_05.mp4 CyberShake training, part 10]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_10_2018-05-09T13_05.mp4 CyberShake training, part 10]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_11_2018-09-27T16_09.mp4 CyberShake training, part 11]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_11_2018-09-27T16_09.mp4 CyberShake training, part 11]
*[https://hypocenter.usc.edu/research/cybershake/training_videos/CyberShake_training_part_12_2018-10-04T13_10.mp4 CyberShake training, part 12]
+
*[https://g-c662a6.a78b8.36fe.data.globus.org/cybershake/training/CyberShake_training_part_12_2018-10-04T13_10.mp4 CyberShake training, part 12]
  
 
== Related Entries ==
 
== Related Entries ==
 
*[[CyberShake]]
 
*[[CyberShake]]
 
*[[CME Project]]
 
*[[CME Project]]

Latest revision as of 05:11, 19 January 2024

This page is the entry point to documentation on the CyberShake software platform.

If you are looking for the code:

We divide CyberShake training into the following elements:

  1. CyberShake data overview
  2. CyberShake code base
  3. CyberShake rupture file set
  4. CyberShake workflow middleware
  5. CyberShake utilities

CyberShake data

CyberShake produces a variety of output data products. A description of each kind of data product, and how to access them, is available at CyberShake Data.

CyberShake code base

A detailed description of all the pieces of the CyberShake scientific simulation codes is available at CyberShake Code Base.

CyberShake rupture files

Rupture files serve as a key input to CyberShake simulations. More information on their role, location, and format is available at CyberShake Rupture Files.

Workflow Framework

CyberShake relies on Pegasus-WMS, HTCondor, and the Globus Toolkit running on shock.usc.edu, as well as code to generate a DAX description of the workflow. The workflow framework for CyberShake is described in detail at CyberShake Workflow Framework.

Workflow Monitoring

There are multiple ways to monitor a CyberShake workflow, both locally and remotely. We describe the different ways at CyberShake Workflow Monitoring.

Study Framework

During CyberShake study execution, we use an additional layer of automation and monitoring around the workflow framework. These components are described at CyberShake Study Framework.

CyberShake utilities

Extending CyberShake

The steps required to add new elements CyberShake are here: Adding to CyberShake.

CyberShake Glossary

A glossary defining terms as used in CyberShake is available here: CyberShake Glossary.

Training Videos

In 2017-18, Scott Callaghan led a 12-part series trainings for Kevin Milner and Phil Maechling, roughly following the order of the links above. These videos are available below.

Related Entries