Intersect Partnership

The University of Adelaide has partnered with Intersect to provide research support.

Our initial agreement sees Intersect providing storage and virtual machines to university researchers who were previous customers of eRSA. In addition to providing technical support we have become members of the Intersect community which entitles us to additional services.

Intersect Notifications

Intersect reports and provides updates on issues such as planned and unplanned outages on Twitter.

Membership benefits

The main membership benefits are:

  1. eResearch Analyst – UofA will have a dedicated eResearch Analyst who will be primarily located on the North Terrace campus. The analyst will manage and report on the usage of compute and support researchers who use Intersect's data storage and virtual machines to troubleshoot technical issues
  2. eResearch Analyst support – Although the eResearch Analyst is employed by Intersect and primarily engaged to support Intersect customers, where they have capacity, they will also provide research support to our research community
  3. Research-specific training – Throughout the year the analyst will coordinate and run multiple compute training sessions with a focus on research needs. These sessions will be offered to the university research community. The training sessions will range from beginner to advanced skills, increasing our ability to process research results
  4. Discounted rates – As a member of Intersect we are entitled to a discount on select technical services

Support

Intersect is currently recruiting for our dedicated eResearch analyst. The Analyst is likely to commence in late November or early December 2019. Once the analyst joins the team, we will add their contact information on this page. In the interim, if you require further information or support relating to Intersect, you can continue to email us at ersa_transition@adelaide.edu.au or call John Harpas (our project manager) on 8313 5303.

For all other IT support needs you can continue to contact servicedesk@adelaide.edu.au. For any technology issues that require urgent attention please contact the ITDS Service Desk on 08 8313 3000.

Click on Training Sessions to see what is currently available:

    Expand
  • Training sessions

    Intersect’s training courses range from Introductory to Advanced, and cover concepts from Data Collection, Management, and Analysis to Software, Programming, and Advanced Computing. You can find more information about their course catalogue on the Intersect Training page.

    To start us off with Intersect training we are offering the following courses in November this year. If you or someone else you know within the University is interested in attending, please click the relevant link to register:

    Monday 11th November 2019 9:30 – 4:30pm

    Programming with MATLAB Introductory level - No prior knowledge in programming needed for this course

    Tuesday 12th November 2019 9:30 – 4:30pm

    Programming with R Introductory level - No prior knowledge in programming needed for this course

    Thursday 14th and Friday 15th 2019 9:30 – 4:30pm (2 day workshop)

    Software Carpentry workshop: An Introduction to Unix, Git and R – Introductory level - No prior knowledge in programming needed for this course – Note: 2-days

    Monday 25th November 2019 9:30 – 4:30pm

    Data Manipulation and Visualisation in R Intermediate level - Understanding of basic concepts in programming needed for this course

    Tuesday 26th November 2019 9:30 – 4:30pm

    Data Manipulation and Visualisation in Python Intermediate level - Understanding of basic concepts in programming needed for this course

    Wednesday 27th November 9:30 – 4:30pm

    Programming with R Introductory level - No prior knowledge in programming needed for this course

    Thursday 28th November 9:30 – 4:30pm

    Programming with Python  Introductory level - No prior knowledge in programming needed for this course

     

    Registration numbers are limited, so if you do register and then realise you can no longer attend, please unregister yourself from the course.

Click through these tabs to read further information relevant to the transition:

Intersect refers to things with some slightly different names to us. Here are a couple of things you may want to know about. We'll update this list as the project progresses:

Space = storage. Intersect has various ‘space’ offerings that you’ll hear about. The main terms that you will come across are:

  • DeepSpace for your archived data. DeepSpace is a low cost storage solution for researchers requiring long-term networked data storage. Three synced copies of your data are stored on tape and disk at two different locations, so you can be confident of integrity and security.
  • SpaceShuttle is a storage solution that securely transfers, stores, manages and shares large amounts of active research data. Data is read, written, copied or moved over the Internet at maximum speed using the most efficient transmission technology available. SpaceShuttle uses a combination of disk and tape with two copies stored on tape so you can be confident of its integrity. (Check out https://intersect.org.au/space/)
  • SpaceVault - SpaceVault is used in conjunction with SpaceShuttle to offer an extra level of security over your data, especially when shared with others. SpaceVault enables restoration of your data to an earlier point in time.

Time = VMs (our virtual machines). Intersect has various time offerings. Ours is under the CloudTime umbrella which offers a range of Openstack cloud deployment models including private, public, and community offerings. The main term you will come across is:

  • OwnTime - which supports several operating systems, a range of virtual configurations, and provides a large number of pre-built images that can be used as the basis for your own Virtual Machines (VMs), without having to configure the entire system.

Hosted VM - means Intersect does all the system admin such as patching and adding and removing users

Self-managed VM - means the Researcher gets "pseudo" access and needs to initiate their own patching requirements and add and remove users

Sudo - allows users to run programs with the security privileges of another user, by default the superuser

A key part of our membership with Intersect is the services of an on-site eResearch Analyst. This analyst will work within the Division of Research & Innovation and will be your key support person for any issues or requests relating to your Intersect data or VMs. They have not been employed yet, but we will let you know when they join our University team.

Intersect have given us some support links: 

How to log out/log in

1. Go to https://intersect.freshservice.com/support/home, click on your name on the top right corner, then click Sign out. 

2. After that, click again on https://help.intersect.org.au/support/solutions/75000006218. It should ask you to log in again.

How to sign in from an incognito window

1. Open an incognito window, If you are using Google Chrome, please press:

  • SHIFT+CMD+N for Mac Laptop or 
  • CNTRL+SHIF+N  for Windows machines.

2. After that, sign in again by clicking on any of the links, for instance https://help.intersect.org.au/support/solutions/75000006218

The University offers multiple self-help resources to enable you to conduct your research. Here are a few that we think may be helpful:

 

Phoenix training - even though you likely won't be using Phoenix with your Intersect VM's or Data, the online training may provide you with valuable transferable knowledge.

We have a Phoenix Wiki Page

Phoenix training and support

 

Adapt - Access your files on any device, any place, anytime

 

VPN - Did you know that you can access the University network anywhere using our Virtual Private Network (VPN)?

https://www.adelaide.edu.au/technology/your-services/network-services/remote-access-via-virtual-private-network-vpn

 

Storage information

We have about research data (scroll down the page a little under ‘more about your storage options’) - https://www.adelaide.edu.au/technology/your-services/storage/storage-for-staff#research-data

 

Third party hosting - the use of cloud services entails transmitting and entrusting third parties with potentially sensitive data, and carries risks that should be carefully considered and managed. These guidelines provide a common process and a template for performing a consistent risk assessment of cloud services. https://www.adelaide.edu.au/technology/policies-and-guidelines/third-party-hosting#related-university-policies