Pitzer

CUDA Quantum

CUDA Quantum is a platform for developing quantum-classical applications that leverages NVIDIA's CUDA technology. This platform provides a framework to create and execute quantum algorithms on quantum processors while integrating with classical computing resources. It is designed to accelerate quantum computing tasks and support hybrid quantum-classical workflows, making it an essential tool for researchers and developers in the field of quantum computing.

Change is Coming!

Later this fall, OSC will be introducing a major change to the current process clients use to get help. We will be rolling out a new web-based system for clients to manage and review open cases with the service desk. More information will be forthcoming over the next few months, so keep an eye out for messages on various OSC communication channels, as well as at https://www.osc.edu/service_portal_deployment .

System Downtime August 6 2024

A downtime for OSC HPC systems is scheduled from 7 a.m. to 9 p.m., Tuesday, August 6 2024. The downtime will affect the Pitzer, Owens and Ascend Clusters, web portals, and HPC file servers. There will be a short outage of the state-wide licenses; MyOSC (the client portal) will be available during the downtime. In preparation for the downtime, the batch scheduler will not start jobs that cannot be completed before 7 a.m., August 6. Jobs that are not started on clusters will be held until after the downtime and then started once the system is returned to production status.

AutoDock

AutoDock is a a suite of automated docking tools. It is designed to predict how small molecules, such as substrates or drug candidates, bind to a receptor of known 3D structure. AutoDock has applications in X-ray crystallography, structure-based drug design, lead optimization, etc.

Rolling reboot of Pitzer, Owens and Ascend, starting at 9am 06/06

A vulnerability, CVE-2024-27322, in the R programming language that affects the serialization and deserialization process in the R programming language prior to version 4.4.0 is discovered. This vulnerability can be exploited through R Data Serialization files or R packages, which are often shared between developers and data scientists. An attacker can create malicious RDS files or R packages containing embedded arbitrary R code that executes on the victim's target device upon interaction. R addresses the vulnerability starting from version 4.4.0.

Vulnerability in R Programming language

A vulnerability, CVE-2024-27322, in the R programming language that affects the serialization and deserialization process in the R programming language prior to version 4.4.0 is discovered. This vulnerability can be exploited through R Data Serialization (RDS) files or R packages, which are often shared between developers and data scientists. R addresses the vulnerability starting from version 4.4.0. We have installed R 4.4.0 on all clusters and recommend using R/4.4.0. Please limit package use to trusted sources.

Pages