The computational resources of IT4I are allocated by the Allocation Committee via several allocation mechanisms to a project investigated by a Primary Investigator. By allocating the computational resources, the Allocation Committee is authorizing the PI to access and use the clusters. The PI may decide to authorize a number of their collaborators to access and use the clusters to consume the resources allocated to their Project. These collaborators will be associated to the Project. The Figure below is depicting the authorization chain:
- Academic researchers may apply via Open Access Competitions.
- Commercial and non-commercial institutions may also apply via the Directors Discretion.
In all cases, IT4Innovations’ access mechanisms are aimed at distributing computational resources while taking into account the development and application of supercomputing methods and their benefits and usefulness for society. The applicants are expected to submit a proposal. In the proposal, the applicants apply for a particular amount of core-hours of computational resources. The requested core-hours should be substantiated by scientific excellence of the proposal, its computational maturity and expected impacts. The allocation decision is based on the scientific, technical, and economic evaluation of the proposal.
Becoming Primary Investigator¶
Once you create an account, log in to the IT4I SCS portal and apply for a project. You will be informed by IT4I about the Allocation Committee decision. Once approved by the Allocation Committee, you become the Primary Investigator (PI) for the project and are authorized to use the clusters and any allocated resources as well as authorize collaborators for your project.
Authorize Collaborators for Your Project¶
As a PI, you can approve or deny users' requests to join your project. There are two methods of authorizing collaborators:
Authorization by Web¶
This is a preferred method if you have an IT4I or e-INFRA CZ account.
Log in to the IT4I SCS portal using your credentials and go to the Authorization Requests section. Here you can authorize collaborators for your project.
Authorization by Email (An Alternative Approach)¶
- Identify their project by project ID.
- Provide a list of people, including themself, who are authorized to use the resources allocated to the project. The list must include the full name, email and affiliation. If collaborators' login access already exists in the IT4I systems, provide their usernames as well.
- Include "Authorization to IT4Innovations" into the subject line.
Should the above information be provided by email, the email must be digitally signed. Read more on digital signatures.
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
Subject: Authorization to IT4Innovations
Please include my collaborators to project OPEN-0-0.
John Smith, email@example.com, Department of Chemistry, MIT, US
Jonas Johansson, firstname.lastname@example.org, Department of Physics, RIT, Sweden
Luisa Fibonacci, email@example.com, Department of Mathematics, National Research Council, Italy
Web-based email interfaces cannot be used for secure communication; external application, such as Thunderbird or Outlook must be used. This way, your new credentials will be visible only in applications that have access to your certificate.