Researchers

GW Information Technology provides a number of research technology services for GW students, faculty, staff and community members. These services support computationally intensive research computing and are designed to enhance the university's research and education goals. 

All Services

 

 

For research needs that use high-performance computing for data analysis, GW has implemented Pegasus, a shared high-performance computing cluster.

The High Performance Computing Cluster (HPC), Pegasus, is managed by professional staff in GW IT, with university-sponsored computational staff housed in the Computational Biology Institute, School of Engineering and Applied Science (SEAS), GW School of Public Health (GWSPH), the Columbian College of Arts and Sciences (CCAS) and School of Medicine and Health Science (SMHS). Access to the High Performance Computing cluster is open to the university community. 

Facility

Pegasus is housed on the Virginia Science and Technology Campus in one of GW's two enterprise-class data centers and features the following:

  • Professional IT management by GW IT, including 24-hour on-premise and remote environment monitoring with hourly staff walkthroughs

  • Redundant power distribution, including UPS (battery) and generator backup

  • Cooling systems are provided to the cluster utilizing the facility’s CRAC unit.

  • Direct network connectivity to GW's robust 100-Gigabit fiber optic network

​Compute and Interconnect Capacity

Pegasus compute capacity features a topal of 8,112 CPU cores, 76,800 NVIDIA Tensor Cores and 614,400 CUDA cores in these compute node configurations:

  • 164 Dell R740 standard CPU nodes featuring dual 20-Core 3.70GHz Intel Xeon Gold 6148 processors, 92GB of RAM, and 800 GB SSD onboard storage.
  • 16 Dell R740 “Small” GPU nodes featuring 2 NVIDIA Tesla V100 GPUs, Dual 20-Core 3.70GHz Intel Xeon Gold 6148 processors, 192GB of RAM, and 800 GB SSD onboard storage.
  • 22 Dell C4140 “Large” GPU nodes featuring 4 Nvidia Tesla V100 SXM2 16GB GPUs with NVLink enabled with a 6TB NVMe card, Dual 18-Core 3.70GHz Intel Xeon Gold 6140 processors, 384GB of RAM, and 800 GB SSD onboard storage.
  • 6 Dell R740 High Throughput nodes featuring Dual 4-Core 3.70GHz Intel Xeon Gold 5122 processors, 384GB of RAM, and 800 GB SSD onboard storage
  • 2 Dell R740 High Memory nodes featuring Dual 18-Core 3.70GHz Intel Xeon Gold 6140M processors, 3Tb of RAM, and 800 GB SSD onboard storage
  • Mellanox EDR Infiniband controller to 100GB fabric.

​Storage Systems

The Pegasus cluster has both a primary storage system and a high-speed scratch storage system connected to the Infiniband network fabric. Both are accessible throughout the entire cluster, and remote file transfer services are provided through dedicated login nodes. Additional specifications include:

  • For NFS, the cluster utilizes DDN GS7K Storage appliance having a total of 2Pb of space. Which is connected to compute and login nodes via Mellanox EDR Infiniband over 100Gb fabric.
  • For scratch/high speed storage, the cluster utilizes DDN ES14K Lustre appliance providing 2Pb of Parallel Scratch storage. The ES14K will be connected to the compute nodes via Mellanox EDR Infiniband over 100Gb fabric.

UCS Stack

UCS Stack is a high performance virtual environment that provides virtual machines with direct access to a 100GB network infrastructure.  It is integrated with the high performance high capacity cluster, Pegasus, located on the GW Virginia Science and Technology Campus (VSTC). 

Stay Informed

View Pegasus user documentation on our webpage.

High Performance Computing Cluster Acknowledgement

Please acknowledge in your publications the role GW IT Research Technology Services (RTS) facilities played in your research.

If you have published a paper or given a presentation that acknowledges GW’s High Performance Computing Cluster (Pegasus or Colonial One), please acknowledge the use with the language below.  

Please email RTSHelp with the paper title, journal, poster, Digital Object Identifier (DOI) or conference where a presentation was given.  These citations help Research Technology Services (RTS) demonstrate the importance of its role in the support of research within the GW community, helping to assure the continued availability of these valuable resources.   We appreciate your conscientiousness in this matter.

For the High Performance Computing Cluster (Pegasus / Colonial One) Samples:

“We gratefully acknowledge the computing resources provided on the High Performance Computing Cluster operated by Research Technology Services at the George Washington University.”

“This work was completed in part with resources provided by the High Performance Computing Cluster at The George Washington University, Information Technology, Research Technology Services.”

“The authors acknowledge the use of the High Performance Computing Cluster and the advanced support from the Research Technology Services at The George Washington University, to carry out the research presented here.”

 

Request Technology Services

GW Information Technology, GW Libraries Technology-based research services, and the Office of Research Integrity and Compliance, offer regulated environments and data protection, along with risk assessments. 

These are sample frameworks we can use as a foundation for a discussion to better understand the researchers particular needs.  Working together with the RTS team, we can develop potential solutions with cost estimates to build the environment you need. 

Running Custom Software Securely

For  researchers who want to securely host a software application, either that they built or are providing the source code, this Software Application will be able to leverage GW’s high performance computing nodes.  Jobs are submitted to GW on premise services.  Below is a potential solution to this challenge.

Design Pattern - Secure Data Warehouse

The above solution is comprised of the components below:

  • Virtual Private Network
  • Application Server
  • Identity Access Management
  • Database Server

In this solution, the researcher provides the code, the code is deployed onto an existing application server on the VPN, the application is granted permissions to submit jobs to HPC (typically using SLURM).

This framework can be implemented for many potential applications, whether they are applications written by the researcher or hosted software, like Galaxy, to be used by a researcher’s team.

 

Working with Data Securely

Many researchers require a space for working with and managing a repository of their data.  This data usually consists of numerous sources and varying types.  They need the ability to work with and aggregate data in real time.

Design Pattern - Secure Custom App with Secure Data

The above solution is comprised of these components:

  • Virtual Private Network
  • Identity Access Management
  • Database Server
  • Data Factory
  • Storage Solution

Under this solution, the researcher would provide the data and the data use agreement (DUA). Data is brought into a data factory on the VPN in a tiered process. First the data is staged , uploaded or imported data is cached in data storage in accordance with the DUA. Second, the staged, or if external data is being imported in real time, is then aggregated and stored in the secure data warehouse. After the data has been brought into the warehouse, in accordance with the DUA, layers and views are made available. The researcher is allowed to grant explicit permissions to layers and views of data that have been transformed in the warehouse.

Request Technology Services

View the Research Guide from GW Libraries for information on Data Management Plans, best practices, archiving data, data security and data use agreements. 

Data management refers to activities and practices that support the long-term preservation, access, and use of data.

Activities can include:

  • planning
  • documenting 
  • formatting 
  • storing 
  • anonymizing
  • setting access restrictions on data.

Consulting services are available through GW Library Research Services.

Federal funding agencies and government entities may require data to be made available after the completion of a funded research project. These agencies may also require transparency of project operations, which means that data management plans must be outlined, submitted, and approved during the initial proposal process for every research project.

GW IT Information Security Services team is responsible for establishing and maintaining policies and conducting risk assessments to ensure that George Washington University has a secure information technology environment. GW departments and projects can request or be asked to undergo a risk assessment for their information resources.  For more information on security assessments and how to request one, please refer to the GW Information Security Services website.  These formal risk assessments may be conducted in a variety of ways, including:

  • Application Security Assessments or Penetration Testing
  • 3rd Party Application Security Assessments
  • Vulnerability Scans
  • Business Impact Analysis

Note: Fee to be determined

 

GW IT provides service agreement support, consulting and technology support. 

Request Technology Services

GW IT works with schools, business units, and researchers to identify and implement IT solutions, while addressing specific needs. Combining technical expertise with an understanding of the unique requirements of the George Washington University environment, we identify optimal solutions for the GW community. Consulting services include evaluation and recommendation, provisioning, integration, management, and support.

Advanced Engineering and Support Services are offered in 3 different areas.

  • Network and Security Systems provided by Communications & Technology Support Services (C&TSS)
  • Web Services provided by Mobile and Web Services
  • Virtual, Infrastructure, Platform and Enterprise Systems provided by System Engineering Services (SES)

Fee
Labor Hourly Rate:

  • Communications & Technology Support Services (Network and Security Systems): $40.00
  • University Web & Identity Services (Web Services): $70.00
  • System Engineering Services (Virtual, Infrastructure, Platform and Enterprise Systems): $53.00

GW Information Technology offers enhanced computer support services for faculty & staff workstations on a contractual basis for departments, units or divisions ensuring a stable, and reliable computing environment.  This service includes complete setup and technical support of a typical functional office environment.  Additionally, specialized support tools including remote management, centralized workstation software updates (patches), centrally maintained and distributed software applications, security and authentication, file sharing, computer and software inventory management, firewall configuration and anti-virus updates can be used to effectively and in some cases remotely provide support, correct problems, and add maintain software.

Fee to be determined

Service Agreement (SA) - Administration and Management includes the following elements:

  • Assist university departments in the understanding of information technology needs including specific project or technology requirements.
  • Coordinate review and prioritization of projects with IT Project Management Office and technical service units.
  • Facilitate resolution of high-priority customer service issues.
  • Continual process and service improvement based on evolving customer needs and / or service offerings.
  • Regularly scheduled meetings with customers and necessary staff to ensure communication of successes, challenges and operational status of services.

No fee

This service description outlines support standards that apply to most GW IT services. Generally, Service Level Agreements (SLA) will reference this service description and note specific deviations from these standards.

  • Incident reporting, response and technical escalation procedure
  • Administrative escalation
  • Service availability
  • Scheduled maintenance
  • Unscheduled outages

These standards are considered baseline standards, individual service descriptions may contain additional or modified service standards.

No fee

GW Information Technology Support Center (ITSC) provides call center and helpdesk services to all faculty and staff on supported systems, technologies and services.  Serving as the primary point of contact, the ITSC provides skilled staff that will receive and record calls (incidents); make an attempt to resolve the incident; escalate incidents to either Level 2 or 3 IT specialists or to outside vendors; and communicate status of incidents to customers.

Fee to be determined

 

GW IT provides data storage options, server service and shared service offerings (networking, computing, data and applications services). 

Request Technology Services

Data storage is provided on GW IT supported servers.

View the Research Guide from GW Libraries for information on Data Management Plans, best practices, archiving data, data security and data use agreements. 

GW Information Technology offers a dedicated virtual server environment that will support a group of researchers and support staff associated with a project, this environment will be used to store and analyze research data. 

Fee
Base system: $211.77 per month 
Consists of:

  • Base Cost (up to 90VM): $14.13 per year
  • vCPU: $32.30 per year
  • GB of RAM: $6.23 per year
  • GB of Storage: $0.63 per year