Unveiling User Behavior on Summit Login Nodes as a User

04/18/2022
by   Sean R. Wilkinson, et al.
0

We observe and analyze usage of the login nodes of the leadership class Summit supercomputer from the perspective of an ordinary user – not a system administrator – by periodically sampling user activities (job queues, running processes, etc.) for two full years (2020-2021). Our findings unveil key usage patterns that evidence misuse of the system, including gaming the policies, impairing I/O performance, and using login nodes as a sole computing resource. Our analysis highlights observed patterns for the execution of complex computations (workflows), which are key for processing large-scale applications.

READ FULL TEXT
research
04/12/2012

Enabling Semantic Analysis of User Browsing Patterns in the Web of Data

A useful step towards better interpretation and analysis of the usage pa...
research
11/08/2017

An Analysis of Privacy-Aware Personalization Signals by Using Online Evaluation Methods

Personalization despite being an effective solution to the problem infor...
research
05/30/2017

Tracking System Behaviour from Resource Usage Data

Resource usage data, collected using tools such as TACC Stats, capture t...
research
07/31/2019

Distributed Streaming Analytics on Large-scale Oceanographic Data using Apache Spark

Real-world data from diverse domains require real-time scalable analysis...
research
08/09/2017

How Do People Differ? A Social Media Approach

Research from a variety of fields including psychology and linguistics h...
research
06/18/2020

Computing techniques

This lecture aims at providing a user's perspective on the main concepts...
research
06/20/2023

Fine-grained Policy-driven I/O Sharing for Burst Buffers

A burst buffer is a common method to bridge the performance gap between ...

Please sign up or login with your details

Forgot password? Click here to reset