Master Branch of Your Git Working Copies of the Different Easybuild Repositories

Total Page:16

File Type:pdf, Size:1020Kb

Master Branch of Your Git Working Copies of the Different Easybuild Repositories EasyBuild Documentation Release 20201210.0 Ghent University Wed, 06 Jan 2021 10:34:03 Contents 1 What is EasyBuild? 3 2 Concepts and terminology 5 2.1 EasyBuild framework..........................................5 2.2 Easyblocks................................................6 2.3 Toolchains................................................7 2.3.1 system toolchain.......................................7 2.3.2 dummy toolchain (DEPRECATED) ..............................7 2.3.3 Common toolchains.......................................7 2.4 Easyconfig files..............................................7 2.5 Extensions................................................8 3 Typical workflow example: building and installing WRF9 3.1 Searching for available easyconfigs files.................................9 3.2 Getting an overview of planned installations.............................. 10 3.3 Installing a software stack........................................ 11 4 Getting started 13 4.1 Installing EasyBuild........................................... 13 4.1.1 Requirements.......................................... 14 4.1.2 Bootstrapping EasyBuild.................................... 14 4.1.3 Advanced bootstrapping options................................ 18 4.1.4 Updating an existing EasyBuild installation.......................... 20 4.1.5 Dependencies.......................................... 20 4.1.6 Sources............................................. 23 4.1.7 In case of installation issues. .................................. 23 4.2 Configuring EasyBuild.......................................... 23 4.2.1 Supported configuration types................................. 24 4.2.2 Overview of current configuration (--show-config, --show-full-config).... 28 4.2.3 Available configuration settings................................ 29 4.3 Common toolchains........................................... 35 4.3.1 Definition and motivation.................................... 35 4.3.2 Versioning scheme for common toolchains........................... 36 4.3.3 Update cycle for common toolchains.............................. 37 4.3.4 Overview of common toolchains................................ 37 4.3.5 Customizing common toolchains................................ 39 4.3.6 More information about toolchains............................... 39 i 5 Basic usage topics 41 5.1 Using the EasyBuild command line................................... 41 5.1.1 Specifying builds........................................ 41 5.1.2 Commonly used command line options............................ 44 5.2 Writing easyconfig files: the basics................................... 53 5.2.1 What is an easyconfig (file)?.................................. 54 5.2.2 Available easyconfig parameters................................ 55 5.2.3 Mandatory easyconfig parameters............................... 55 5.2.4 Common easyconfig parameters................................ 55 5.2.5 Tweaking existing easyconfig files............................... 67 5.2.6 Dynamic values for easyconfig parameters........................... 67 5.2.7 Version-specific documentation relevant to easyconfigs.................... 67 5.2.8 Contributing easyconfigs.................................... 68 5.3 Understanding EasyBuild logs...................................... 68 5.3.1 Basic information........................................ 68 5.3.2 Navigating log files....................................... 69 6 Advanced usage topics 71 6.1 Archived easyconfigs........................................... 71 6.1.1 Toolchain deprecation...................................... 71 6.1.2 Using --consider-archived-easyconfigs ..................... 72 6.2 Backing up of existing modules (--backup-modules)....................... 72 6.2.1 Disabling automatic backup of modules............................ 73 6.2.2 Example............................................. 73 6.3 Generating container recipes & images................................. 74 6.3.1 Requirements.......................................... 75 6.3.2 Usage.............................................. 75 6.3.3 Configuration.......................................... 83 6.3.4 ‘Stacking’ container images.................................. 85 6.3.5 Seeding in source files for container build process....................... 86 6.4 Contributing............................................... 86 6.4.1 How to contribute........................................ 87 6.4.2 Pull requests........................................... 89 6.4.3 Review process for contributions................................ 94 6.5 Controlling compiler optimization flags................................. 97 6.5.1 Controlling target architecture specific optimizations via --optarch ............ 98 6.6 EasyBuild on Cray............................................ 100 6.6.1 Test systems........................................... 100 6.6.2 EasyBuild toolchains...................................... 100 6.6.3 What works already?...................................... 101 6.6.4 Required EasyBuild configuration............................... 101 6.6.5 Major supported/tested applications.............................. 102 6.7 Detection of loaded modules....................................... 103 6.7.1 Motivation............................................ 103 6.7.2 Detection mechanism...................................... 104 6.7.3 Action to take if loaded modules are detected......................... 104 6.7.4 Allowing particular loaded modules.............................. 106 6.7.5 Checking of $EBROOT* environment variables........................ 106 6.8 Local variables in easyconfig files.................................... 108 6.8.1 Motivation & context...................................... 108 6.8.2 Changes in EasyBuild v4.0 w.r.t. local variables in easyconfig files.............. 109 6.8.3 Recommended naming scheme for local variables in easyconfig files............. 109 6.8.4 Warning for local variables that do not follow the recommended naming scheme....... 109 ii 6.8.5 Specifying what should be done when non-confirming local variables are found via --local-var-naming-check .............................. 110 6.8.6 Renaming local variables to match the recommended naming scheme using eb --fix-deprecated-easyconfigs ........................... 110 6.9 Using an index to speed up searching for easyconfigs.......................... 111 6.9.1 Creating an index (--create-index)........................... 112 6.9.2 Updating an existing index (--create-index --force)................ 112 6.9.3 Using index files........................................ 113 6.9.4 Ignoring indices (--ignore-index)............................ 113 6.9.5 Controlling how long the index is valid (--index-max-age)............... 113 6.9.6 Index included with EasyBuild releases............................ 113 6.9.7 Should I create an index?.................................... 114 6.10 Easystack files.............................................. 114 6.10.1 The basics............................................ 114 6.10.2 Usage.............................................. 114 6.10.3 Structure of an easystack file.................................. 115 6.10.4 To be developed......................................... 116 6.11 Experimental features.......................................... 116 6.12 Extended dry run............................................. 116 6.12.1 Important notes......................................... 117 6.12.2 Overview of dry run mechanism................................ 118 6.12.3 Guidelines for easyblocks.................................... 125 6.12.4 Example output......................................... 129 6.13 Hooks................................................... 129 6.13.1 What are hooks?........................................ 129 6.13.2 Configuring EasyBuild to use your hook implementations................... 130 6.13.3 Available hooks......................................... 130 6.13.4 Implementing hooks...................................... 131 6.13.5 Caveats............................................. 132 6.13.6 Examples of hook implementations.............................. 133 6.14 Implementing easyblocks........................................ 134 6.14.1 The basics............................................ 135 6.14.2 Easyblocks vs easyconfigs................................... 135 6.14.3 Naming scheme for easyblocks................................. 136 6.14.4 Structure of an easyblock.................................... 137 6.14.5 Deriving from existing (generic) easyblocks.......................... 138 6.14.6 Specific aspects of easyblocks................................. 138 6.14.7 Using new/custom easyblocks................................. 142 6.14.8 Testing easyblocks....................................... 142 6.14.9 Use case: an easyblock for Tensorflow............................. 143 6.15 Including additional Python modules (--include-*)........................ 143 6.15.1 General aspects of --include-* options.......................... 143 6.15.2 Including additional easyblocks (--include-easyblocks)............... 144 6.15.3 Including additional module naming schemes (--include-module-naming-schemes) 144 6.15.4 Including additional toolchains (--include-toolchains)................ 145 6.16 Integration with GitHub......................................... 145 6.16.1 Requirements.......................................... 146 6.16.2 Configuration.......................................... 147 6.16.3 Checking status of GitHub integration (--check-github)................
Recommended publications
  • Practical C Programming, 3Rd Edition
    Practical C Programming, 3rd Edition By Steve Oualline 3rd Edition August 1997 ISBN: 1-56592-306-5 This new edition of "Practical C Programming" teaches users not only the mechanics or programming, but also how to create programs that are easy to read, maintain, and debug. It features more extensive examples and an introduction to graphical development environments. Programs conform to ANSI C. 0 TEAM FLY PRESENTS Table of Contents Preface How This Book is Organized Chapter by Chapter Notes on the Third Edition Font Conventions Obtaining Source Code Comments and Questions Acknowledgments Acknowledgments to the Third Edition I. Basics 1. What Is C? How Programming Works Brief History of C How C Works How to Learn C 2. Basics of Program Writing Programs from Conception to Execution Creating a Real Program Creating a Program Using a Command-Line Compiler Creating a Program Using an Integrated Development Environment Getting Help on UNIX Getting Help in an Integrated Development Environment IDE Cookbooks Programming Exercises 3. Style Common Coding Practices Coding Religion Indentation and Code Format Clarity Simplicity Summary 4. Basic Declarations and Expressions Elements of a Program Basic Program Structure Simple Expressions Variables and Storage 1 TEAM FLY PRESENTS Variable Declarations Integers Assignment Statements printf Function Floating Point Floating Point Versus Integer Divide Characters Answers Programming Exercises 5. Arrays, Qualifiers, and Reading Numbers Arrays Strings Reading Strings Multidimensional Arrays Reading Numbers Initializing Variables Types of Integers Types of Floats Constant Declarations Hexadecimal and Octal Constants Operators for Performing Shortcuts Side Effects ++x or x++ More Side-Effect Problems Answers Programming Exercises 6.
    [Show full text]
  • University of North Carolina at Charlotte Belk College of Business
    University of North Carolina at Charlotte Belk College of Business BPHD 8220 Financial Bayesian Analysis Fall 2019 Course Time: Tuesday 12:20 - 3:05 pm Location: Friday Building 207 Professor: Dr. Yufeng Han Office Location: Friday Building 340A Telephone: (704) 687-8773 E-mail: [email protected] Office Hours: by appointment Textbook: Introduction to Bayesian Econometrics, 2nd Edition, by Edward Greenberg (required) An Introduction to Bayesian Inference in Econometrics, 1st Edition, by Arnold Zellner Doing Bayesian Data Analysis: A Tutorial with R, JAGS, and Stan, 2nd Edition, by Joseph M. Hilbe, de Souza, Rafael S., Emille E. O. Ishida Bayesian Analysis with Python: Introduction to statistical modeling and probabilistic programming using PyMC3 and ArviZ, 2nd Edition, by Osvaldo Martin The Oxford Handbook of Bayesian Econometrics, 1st Edition, by John Geweke Topics: 1. Principles of Bayesian Analysis 2. Simulation 3. Linear Regression Models 4. Multivariate Regression Models 5. Time-Series Models 6. State-Space Models 7. Volatility Models Page | 1 8. Endogeneity Models Software: 1. Stan 2. Edward 3. JAGS 4. BUGS & MultiBUGS 5. Python Modules: PyMC & ArviZ 6. R, STATA, SAS, Matlab, etc. Course Assessment: Homework assignments, paper presentation, and replication (or project). Grading: Homework: 30% Paper presentation: 40% Replication (project): 30% Selected Papers: Vasicek, O. A. (1973), A Note on Using Cross-Sectional Information in Bayesian Estimation of Security Betas. Journal of Finance, 28: 1233-1239. doi:10.1111/j.1540- 6261.1973.tb01452.x Shanken, J. (1987). A Bayesian approach to testing portfolio efficiency. Journal of Financial Economics, 19(2), 195–215. https://doi.org/10.1016/0304-405X(87)90002-X Guofu, C., & Harvey, R.
    [Show full text]
  • Advanced-Game-Design-With-Html5
    www.allitebooks.com For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access them. www.allitebooks.com Contents at a Glance About the Author .....................................................................................................xv About the Technical Reviewers .............................................................................xvii Acknowledgments ..................................................................................................xix Introduction ............................................................................................................xxi ■ Chapter 1: Level Up! .............................................................................................. 1 ■ Chapter 2: The Canvas Drawing API .................................................................... 59 ■ Chapter 3: Working with Game Assets ................................................................ 93 ■ Chapter 4: Making Sprites and a Scene Graph .................................................. 111 ■ Chapter 5: Making Things Move ........................................................................ 165 ■ Chapter 6: Interactivity ...................................................................................... 189 ■ Chapter 7: Collision Detection ........................................................................... 239 ■ Chapter 8: Juice It Up .......................................................................................
    [Show full text]
  • Cscope Security Update (RHSA-2009-1101)
    cscope security update (RHSA-2009-1101) Original Release Date: June 16, 2009 Last Revised: June 16, 2009 Number: ASA-2009-236 Risk Level: None Advisory Version: 1.0 Advisory Status: Final 1. Overview: cscope is a mature, ncurses-based, C source-code tree browsing tool. Multiple buffer overflow flaws were found in cscope. An attacker could create a specially crafted source code file that could cause cscope to crash or, possibly, execute arbitrary code when browsed with cscope. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-2541, CVE-2006-4262, CVE-2009- 0148 and CVE-2009-1577 to these issues. Note: This advisory is specific to RHEL3 and RHEL4. No Avaya system products are vulnerable, as cscope is not installed by default. More information about these vulnerabilities can be found in the security advisory issued by RedHat Linux: · https://rhn.redhat.com/errata/RHSA-2009-1101.html 2. Avaya System Products using RHEL3 or RHEL4 with cscope installed: None 3. Avaya Software-Only Products: Avaya software-only products operate on general-purpose operating systems. Occasionally vulnerabilities may be discovered in the underlying operating system or applications that come with the operating system. These vulnerabilities often do not impact the software-only product directly but may threaten the integrity of the underlying platform. In the case of this advisory Avaya software-only products are not affected by the vulnerability directly but the underlying Linux platform may be. Customers should determine on which Linux operating system the product was installed and then follow that vendor's guidance.
    [Show full text]
  • The Glib/GTK+ Development Platform
    The GLib/GTK+ Development Platform A Getting Started Guide Version 0.8 Sébastien Wilmet March 29, 2019 Contents 1 Introduction 3 1.1 License . 3 1.2 Financial Support . 3 1.3 Todo List for this Book and a Quick 2019 Update . 4 1.4 What is GLib and GTK+? . 4 1.5 The GNOME Desktop . 5 1.6 Prerequisites . 6 1.7 Why and When Using the C Language? . 7 1.7.1 Separate the Backend from the Frontend . 7 1.7.2 Other Aspects to Keep in Mind . 8 1.8 Learning Path . 9 1.9 The Development Environment . 10 1.10 Acknowledgments . 10 I GLib, the Core Library 11 2 GLib, the Core Library 12 2.1 Basics . 13 2.1.1 Type Definitions . 13 2.1.2 Frequently Used Macros . 13 2.1.3 Debugging Macros . 14 2.1.4 Memory . 16 2.1.5 String Handling . 18 2.2 Data Structures . 20 2.2.1 Lists . 20 2.2.2 Trees . 24 2.2.3 Hash Tables . 29 2.3 The Main Event Loop . 31 2.4 Other Features . 33 II Object-Oriented Programming in C 35 3 Semi-Object-Oriented Programming in C 37 3.1 Header Example . 37 3.1.1 Project Namespace . 37 3.1.2 Class Namespace . 39 3.1.3 Lowercase, Uppercase or CamelCase? . 39 3.1.4 Include Guard . 39 3.1.5 C++ Support . 39 1 3.1.6 #include . 39 3.1.7 Type Definition . 40 3.1.8 Object Constructor . 40 3.1.9 Object Destructor .
    [Show full text]
  • Openimageio 1.7 Programmer Documentation (In Progress)
    OpenImageIO 1.7 Programmer Documentation (in progress) Editor: Larry Gritz [email protected] Date: 31 Mar 2016 ii The OpenImageIO source code and documentation are: Copyright (c) 2008-2016 Larry Gritz, et al. All Rights Reserved. The code that implements OpenImageIO is licensed under the BSD 3-clause (also some- times known as “new BSD” or “modified BSD”) license: Redistribution and use in source and binary forms, with or without modification, are per- mitted provided that the following conditions are met: • Redistributions of source code must retain the above copyright notice, this list of condi- tions and the following disclaimer. • Redistributions in binary form must reproduce the above copyright notice, this list of con- ditions and the following disclaimer in the documentation and/or other materials provided with the distribution. • Neither the name of the software’s owners nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIB- UTORS ”AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT- NESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABIL- ITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    [Show full text]
  • Linux Kernel and Driver Development Training Slides
    Linux Kernel and Driver Development Training Linux Kernel and Driver Development Training © Copyright 2004-2021, Bootlin. Creative Commons BY-SA 3.0 license. Latest update: October 9, 2021. Document updates and sources: https://bootlin.com/doc/training/linux-kernel Corrections, suggestions, contributions and translations are welcome! embedded Linux and kernel engineering Send them to [email protected] - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 1/470 Rights to copy © Copyright 2004-2021, Bootlin License: Creative Commons Attribution - Share Alike 3.0 https://creativecommons.org/licenses/by-sa/3.0/legalcode You are free: I to copy, distribute, display, and perform the work I to make derivative works I to make commercial use of the work Under the following conditions: I Attribution. You must give the original author credit. I Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. I For any reuse or distribution, you must make clear to others the license terms of this work. I Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. Document sources: https://github.com/bootlin/training-materials/ - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 2/470 Hyperlinks in the document There are many hyperlinks in the document I Regular hyperlinks: https://kernel.org/ I Kernel documentation links: dev-tools/kasan I Links to kernel source files and directories: drivers/input/ include/linux/fb.h I Links to the declarations, definitions and instances of kernel symbols (functions, types, data, structures): platform_get_irq() GFP_KERNEL struct file_operations - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 3/470 Company at a glance I Engineering company created in 2004, named ”Free Electrons” until Feb.
    [Show full text]
  • El-Arte-De-La-Linea-De-Comandos
    Traducido por Lyx Drymer Maxxcan Zorro Fanta Suggie y Frangor de El Binario 2 Indice´ general 0.1. El arte de la l´ınea de comandos . .4 0.1.1. Meta . .4 0.1.2. Fundamentos . .5 0.1.3. De uso diario . .6 0.1.4. Procesamiento de archivos y datos . .8 0.1.5. Depuracion´ del sistema . 10 0.1.6. Comandos concatenados . 11 0.1.7. Oscuro pero util´ . 13 0.1.8. Solo MacOS . 15 0.1.9. Mas´ recursos . 16 0.1.10. Advertencia . 16 0.1.11. Licencia . 16 3 4 INDICE´ GENERAL 0.1. El arte de la lınea´ de comandos La soltura del uso de la consola es una destreza a menudo abandonada y considerada arcaica, pero mejorara´ tu flexibilidad y productividad como si fueras un i ngeniero de una forma obvia y sutil. Esta es una seleccion´ de notas y consejos de como usar la l´ınea de comandos de consola que encontre´ util´ cuando trabajaba en Linux. Algunos consejos son basicos,´ y otros bastante espec´ıficos, sofiscitados, u .oscuros”. Esta pagina´ no es larga, pero si usas y recuerdas todos los puntos, sabras´ lo suficiente. Figura 1: curl -s ‘https://raw.githubusercontent.com/jlevy/the-art-of-command- line/master/README.md’q j egrep -o ‘nw+’ j tr -d “’ j cowsay -W50 0.1.1. Meta Objetivo: Esta gu´ıa es tanto para el principiante como para el experimentado. Los objeti- vos son amplitud (todo importa), especificidad (dar ejemplos concretos del uso mas´ comun),´ y brevedad (evitar lo que no sea esencial o que se puedan encontrar facil-´ mente en otro lugar).
    [Show full text]
  • Release 0.11 Todd Gamblin
    Spack Documentation Release 0.11 Todd Gamblin Feb 07, 2018 Basics 1 Feature Overview 3 1.1 Simple package installation.......................................3 1.2 Custom versions & configurations....................................3 1.3 Customize dependencies.........................................4 1.4 Non-destructive installs.........................................4 1.5 Packages can peacefully coexist.....................................4 1.6 Creating packages is easy........................................4 2 Getting Started 7 2.1 Prerequisites...............................................7 2.2 Installation................................................7 2.3 Compiler configuration..........................................9 2.4 Vendor-Specific Compiler Configuration................................ 13 2.5 System Packages............................................. 16 2.6 Utilities Configuration.......................................... 18 2.7 GPG Signing............................................... 20 2.8 Spack on Cray.............................................. 21 3 Basic Usage 25 3.1 Listing available packages........................................ 25 3.2 Installing and uninstalling........................................ 42 3.3 Seeing installed packages........................................ 44 3.4 Specs & dependencies.......................................... 46 3.5 Virtual dependencies........................................... 50 3.6 Extensions & Python support...................................... 53 3.7 Filesystem requirements........................................
    [Show full text]
  • Foundations for Music-Based Games
    Die approbierte Originalversion dieser Diplom-/Masterarbeit ist an der Hauptbibliothek der Technischen Universität Wien aufgestellt (http://www.ub.tuwien.ac.at). The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology (http://www.ub.tuwien.ac.at/englweb/). MASTERARBEIT Foundations for Music-Based Games Ausgeführt am Institut für Gestaltungs- und Wirkungsforschung der Technischen Universität Wien unter der Anleitung von Ao.Univ.Prof. Dipl.-Ing. Dr.techn. Peter Purgathofer und Univ.Ass. Dipl.-Ing. Dr.techn. Martin Pichlmair durch Marc-Oliver Marschner Arndtstrasse 60/5a, A-1120 WIEN 01.02.2008 Abstract The goal of this document is to establish a foundation for the creation of music-based computer and video games. The first part is intended to give an overview of sound in video and computer games. It starts with a summary of the history of game sound, beginning with the arguably first documented game, Tennis for Two, and leading up to current developments in the field. Next I present a short introduction to audio, including descriptions of the basic properties of sound waves, as well as of the special characteristics of digital audio. I continue with a presentation of the possibilities of storing digital audio and a summary of the methods used to play back sound with an emphasis on the recreation of realistic environments and the positioning of sound sources in three dimensional space. The chapter is concluded with an overview of possible categorizations of game audio including a method to differentiate between music-based games.
    [Show full text]
  • An Introduction to Data Analysis Using the Pymc3 Probabilistic Programming Framework: a Case Study with Gaussian Mixture Modeling
    An introduction to data analysis using the PyMC3 probabilistic programming framework: A case study with Gaussian Mixture Modeling Shi Xian Liewa, Mohsen Afrasiabia, and Joseph L. Austerweila aDepartment of Psychology, University of Wisconsin-Madison, Madison, WI, USA August 28, 2019 Author Note Correspondence concerning this article should be addressed to: Shi Xian Liew, 1202 West Johnson Street, Madison, WI 53706. E-mail: [email protected]. This work was funded by a Vilas Life Cycle Professorship and the VCRGE at University of Wisconsin-Madison with funding from the WARF 1 RUNNING HEAD: Introduction to PyMC3 with Gaussian Mixture Models 2 Abstract Recent developments in modern probabilistic programming have offered users many practical tools of Bayesian data analysis. However, the adoption of such techniques by the general psychology community is still fairly limited. This tutorial aims to provide non-technicians with an accessible guide to PyMC3, a robust probabilistic programming language that allows for straightforward Bayesian data analysis. We focus on a series of increasingly complex Gaussian mixture models – building up from fitting basic univariate models to more complex multivariate models fit to real-world data. We also explore how PyMC3 can be configured to obtain significant increases in computational speed by taking advantage of a machine’s GPU, in addition to the conditions under which such acceleration can be expected. All example analyses are detailed with step-by-step instructions and corresponding Python code. Keywords: probabilistic programming; Bayesian data analysis; Markov chain Monte Carlo; computational modeling; Gaussian mixture modeling RUNNING HEAD: Introduction to PyMC3 with Gaussian Mixture Models 3 1 Introduction Over the last decade, there has been a shift in the norms of what counts as rigorous research in psychological science.
    [Show full text]
  • Hitachi Unified Storage File Module File Services Administration Guide
    Hitachi Unified Storage File Module File Services Administration Guide Release 12.5 MK-92HUSF004-09 December 2015 © 2011-2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. 2 Hitachi Unified Storage File Module File Services Administration Guide Hitachi Data Systems products and services can be ordered only under the terms and conditions of Hitachi Data Systems’ applicable agreements. The use of Hitachi Data Systems products is governed by the terms of your agreements with Hitachi Data Systems. By using this software, you agree that you are responsible for: a) Acquiring the relevant consents as may be required under local privacy laws or otherwise from employees and other individuals to access relevant data; and b) Verifying that data continues to be held, retrieved, deleted, or otherwise processed in accordance with relevant laws.
    [Show full text]