Intersect Partnership

The University of Adelaide has partnered with Intersect to provide research support.

Our initial agreement sees Intersect providing storage and virtual machines to university researchers who were previous customers of eRSA. This transition should conclude by the end of October 2019. In addition to providing technical support we have become members of the Intersect community which entitles us to additional services.

Membership benefits

The main membership benefits being:

  1. eResearch Analyst – UofA will have a dedicated eResearch Analyst who will be primarily located on the North Terrace campus. The analyst will manage and report on the usage of compute and support researchers that use Intersects data storage and virtual machines to troubleshoot technical issues
  2. eResearch Analyst support – Although the eResearch Analyst is employed by Intersect and primarily engaged to support Intersect customers, where they have capacity, they will also provide research support to our research community
  3. Research specific training – Throughout the year the analyst will coordinate and run multiple compute training sessions with a focus on research needs. These sessions will be offered to the university research community. The training sessions will range from beginner to advanced skills, increasing our ability to process research results
  4. Discounted rates – As a member of Intersect we are entitled to a discount on select technical services


Intersect is currently recruiting for our dedicated eResearch analyst. The Analyst is likely to commence throughout the month of November 2019. Once the analyst joins the team, we will add their contact information on this page. In the interim, if you require further information or support relating to Intersect, you can continue to email us at or call John Harpas (our project manager) on 8313 5303.

For all other IT support needs you can continue to contact For any technology issues that require urgent attention please contact the ITDS Service Desk on 08 8313 3000.

Click on Training Sessions to see what is currently available:

  • Training sessions

    Intersect’s training courses range from Introductory to Advanced, and cover concepts from Data Collection, Management, and Analysis to Software, Programming, and Advanced Computing. You can find more information about their course catalogue on the Intersect Training page.

    To start us off with Intersect training we are offering the following courses in November this year. If you or someone else you know within the University is interested in attending, please click the relevant link to register:

    Monday 11th November 2019 9:30 – 4:30pm

    Programming with MATLAB Introductory level - No prior knowledge in programming needed for this course

    Tuesday 12th November 2019 9:30 – 4:30pm

    Programming with R Introductory level - No prior knowledge in programming needed for this course

    Thursday 14th and Friday 15th 2019 9:30 – 4:30pm (2 day workshop)

    Software Carpentry workshop: An Introduction to Unix, Git and R – Introductory level - No prior knowledge in programming needed for this course – Note: 2-days

    Monday 25th November 2019 9:30 – 4:30pm

    Data Manipulation and Visualisation in R Intermediate level - Understanding of basic concepts in programming needed for this course

    Tuesday 26th November 2019 9:30 – 4:30pm

    Data Manipulation and Visualisation in Python Intermediate level - Understanding of basic concepts in programming needed for this course

    Wednesday 27th November 9:30 – 4:30pm

    Programming with R Introductory level - No prior knowledge in programming needed for this course

    Thursday 28th November 9:30 – 4:30pm

    TBC – We are going to monitor the registration for the other courses and if possible re-run the course that seems to be receiving the most registrations / interest


    Registration numbers are limited, so if you do register and then realise you can no longer attend, please unregister yourself from the course.

Click through these tabs to read further information relevant to the transition:

If you have either a VM or data stores moving to Intersect, we will send the key contact an email with details of a shared folder in Box where we can share any information such as other users who access your compute or access keys for the move into the Intersect infrastructure. Your key contact is either the owner of the VM or data store, or a person they have nominated.

How do you keep updated with the move…

The project team will update this page regularly as we have more information.

Overall Schedule:

We'll be updating the overall schedule as we work through the transition so you can keep an eye on the progress as dates may change. When it is your time to move, we will contact our key contacts directly to confirm dates.

Virtual Machines:

You can click on the VM schedule to keep an eye on the timing of the upcoming outages that may affect you. But remember this document will continue to be updated throughout the transition.

Data / Shares:

You can click on the share schedule to keep an eye on the timing of the upcoming times that the data will be copied over to Intersect. This will give you an indication on when you will transition over to Intersect.

We need you.

If you have a VM or data store moving to intersect, please make sure:

  • You have reviewed and completed the relevant parts of the checklist (a link to the checklist will be emailed to you). This is where you can provide us with information such as a public ssh key, other users, etc
  • You have confirmed your availability to engage with us at the start of the testing timeslot to work through access with Intersect and then test and verify that your compute at Intersect is up and running successfully. If there is any need to change the date, contact us asap at email
  • After you have spent time reviewing and testing your data or VM, please send us a confirmation email to confirm that your new location at Intersect is up and running successfully.

Impacts on others

We are working directly with the key contact of the data and VMs, with little contact with other users. If you are our key contact and you know of other researchers or students that you have given access to either your data or VM, you’ll need to let them know about your outage, and let us know what impacts the transition will have on them. In addition, if you would like us to retain their access after the transition, please let us know via or the email address that Giacinta has or will send you.

Once you have transitioned, you may find some of the information on the Intersect pages are of interest to you.

Intersect refers to things with some slightly different names to us. Here are a couple of things you may want to know about. We'll update this list as the project progresses:

Space = storage. Intersect has various ‘space’ offerings that you’ll hear about. The main terms that you will come across are:

  • DeepSpace for your archived data. DeepSpace is a low cost storage solution for researchers requiring long-term networked data storage. Three synced copies of your data are stored on tape and disk at two different locations, so you can be confident of integrity and security.
  • SpaceShuttle is a storage solution that securely transfers, stores, manages and shares large amounts of active research data. Data is read, written, copied or moved over the Internet at maximum speed using the most efficient transmission technology available. SpaceShuttle uses a combination of disk and tape with two copies stored on tape so you can be confident of its integrity. (Check out
  • SpaceVault - SpaceVault is used in conjunction with SpaceShuttle to offer an extra level of security over your data, especially when shared with others. SpaceVault enables restoration of your data to an earlier point in time.

Time = VMs (our virtual machines). Intersect has various time offerings. Ours is under the CloudTime umbrella which offers a range of Openstack cloud deployment models, including private, public, and community offerings. The main term you will come across is:

  • OwnTime - which supports several operating systems, a range of virtual configurations, and provides a large number of pre-built images that can be used as the basis for your own Virtual Machines (VMs), without having to configure the entire system.

Hosted VM - means Intersect does all the system admin such as patching and adding and removing users

Self-managed VM - means the Researcher gets "sudo" access and needs to initiate their own patching requirements and add and remove users

Sudo - allows users to run programs with the security privileges of another user, by default the superuser

VM relocate

This means your VM will be copied and moved as it is to Intersect infrastructure.

Benchmark Validation

Intersect suggests you conduct a short test by running a job prior to the move. You can do it now, or if you have a recent one, you can choose to use that as a benchmark. After the move, you will be asked to run the exact same job to ensure that all is working well in the new infrastructure.

SSH public key

Intersect require an SSH public key for you and all users who access your VM. Click this link if you need information about how to generate this key:

Please save your public key file name starting with your first name followed by your last name with no space, eg JohnSmith.

Prior to your moving day you'll need to provide your key contact with your public key, so that they can save it in their Box folder. Without this we cannot give you access to the VM.

Stop using it

Intersect needs you to ensure you are not running any jobs on the days we have scheduled you to move. Any jobs you have running leading into the move will be stopped. You will no longer have access to the eRSA VM from the nominated days.

We will send your key contact a meeting request following the moving days. This is where the key contact will commence the benchmark validation and we will assist to resolve any issues relating to logging in, or working with your machine. We need confirmation that the test in the new environment has been successful.

VM rebuild

This means that the key contact will be given a new VM to install software and set up as required.

A VM that is going to be rebuilt from scratch will not be impacted by downtime. Once the key contact validates that their VM has been successfully rebuilt, the access to the eRSA VM will cease.


In order to have access to space using Aspera GUI, every researcher needs to log in to using UofA credentials. This step will enable Intersect to add you to the right space.

Copying in the background

Around the time of your moving day, Intersect will start taking a copy of your data in the background. Through this process, you can continue accessing it as you currently do through the eRSA infrastructure.

Stop using it

On your moving day, you will not be able to access your data. Intersect needs this drive to be inactive so that they can capture the final version of your data. Once this is done, you no longer have access to the eRSA storage, but will access your data from its new home in Intersect. You’ll need to contact any researcher that also accesses your data to ensure they are aware of the shut down, and the new way of accessing the data.


Folders in Intersect can be set up with restricted access. We can set this up if you let us know your requirements.

Accessing Shares (pre and post migration)

Here are some links to access your data shares:

● Generate SSH key

● Data transfer using SFTP

● Data transfer using

 Accessing Space from my VM

A key part of our membership with Intersect is the services of an on-site eResearch Analyst. This analyst will work within DRI and will be your key support person for any issues or requests relating to your Intersect data or VM's. They have not been employed yet, but we will let you know when they join our University team.

Intersect have given us some support links: 

How to log out/log in

1. Go to, then click on your name on the top right corner, finally click Sign out. 

2. After that, click again on it should ask you to log in again.

How to sign in from an incognito window

1. Open an incognito window, If you are using Google Chrome, please press:

  • SHIFT+CMD+N for Mac Laptop or 
  • CNTRL+SHIF+N  for Windows machines.

2. After that, sign in again by clicking on any of the links, for instance