|
Setup |
Download files required for the lesson |
00:00 |
1. Introduction to High-Performance Computing
|
What is a High-Performance Computing (HPC) system?
Who uses HPC systems?
Why HPC?
|
00:10 |
2. Spam: Everyone's Cybersecurity Issue
|
What is a spam?
What the different types of spam?
What are the problems posed by spam?
How does spam indicate cybersecurity problems?
Why do we need a powerful supercomputer to analyze a massive collection of spam emails?
|
00:20 |
3. Accessing HPC
|
How do we access a modern HPC system?
How do we interact with a basic HPC interface?
|
00:30 |
4. Basic Shell Interaction
|
How do we interact with a UNIX shell, the basic HPC interface?
What is a file system?
How do we navigate around files and directories from a UNIX shell?
How do we manage files and directories from a UNIX shell?
How do we work with text files from a UNIX shell?
How do we get help on UNIX shell commands?
|
01:20 |
5. Text Processing Tools & Pipeline
|
How do we process text-based information using UNIX tools?
How do we build a processing pipeline by combining UNIX tools?
|
01:50 |
6. Task Automation with Scripts
|
How can we repeat the same or similar set of commands over and over?
|
02:15 |
7. Investigating the Origin of Spam Emails
|
What is a spam database?
What are the uses of spam database?
How do we trace the origin of an email based on its header information?
|
02:30 |
8. Running Spam Analyzer on a High-Performance Computer System
|
How do we run computational jobs on a modern HPC system?
|
03:00 |
9. Using HPC for Parallel Processing
|
How do we run computational jobs in parallel on a modern HPC system?
What are key issues to watch out to achieve efficient parallel execution on HPC?
|
03:30 |
10. Using GNU Parallel on HPC
|
What is GNU Parallel?
What are the characteristics of suitable jobs for GNU Parallel?
How do we run multiple jobs simultaneously using GNU Parallel?
|
04:00 |
11. Analyzing and Summarizing the Distribution of Spam Origins
|
How do we analyze and summarize HPC results?
What is the distribution of the origins of spam emails in Spam Archive?
|
04:45 |
Finish |
|
The actual schedule may vary slightly depending on the topics and exercises chosen by the instructor.