Approved for
PHI, but subject to "Shared responsibility model for securing PHI on UITS systems".
Directions
- Try using the tools in the HPC Everywhere portal to help you find the right system:
- Use the Supercomputing Pathfinder to answer a few simple yes/no questions about your use case and get a recommendation.
- Use the HPC Applications tool to search by software installed on IU's research supercomputers.
- See below for a list of IU research computing platforms and some example use cases to help you decide which system to use for your specific workflow.
- If you are still unsure of which system to use, please contact us and explain your use case and/or security needs and we would be glad to discuss with you and make a recommendation.
Big Red 200
Brief description, highlighting purpose/strengths.
Example Use Cases:
- Use case/recipe 1
Big Red 3
Brief description, highlighting purpose/strengths.
Example Use Cases:
- Use case/recipe 1
Carbonate
Brief description, highlighting purpose/strengths.
Example Use Cases:
Carbonate Deep Learning Nodes
Brief description, highlighting purpose/strengths.
Example Use Cases:
- Use case/recipe 1
Karst
Brief description, highlighting purpose/strengths.
Example Use Cases:
- Use case/recipe 1
Jetstream
Brief description, highlighting purpose/strengths.
Example Use Cases:
- Use case/recipe 1
RADaRS
Brief description, highlighting purpose/strengths.
Example Use Cases:
- Use case/recipe 1
Related articles
Navigation Tip
To go back to the home page, you can click the small IU icon at the top of the sidebar or use breadcrumbs above the title.