Welcome and Introductions

Overview

Teaching: 10 min
Exercises: 0 min
Questions
  • Instructor introductions

Objectives
  • Overview of the course

FIXME

Welcome and Introductions

Welcome to this tutorial on using the Singularity containerization framework to install customizable applications.

This tutorial is a primer on how to use the Singularity containerization framework to install customizable applications and use those containers on Linux based computer systems.

Software containers and containerization technologies are emerging as a valuable research artifact to facilitate and promote scientific reproducibility. Software containers provide a separation of the containerized application environment from the host system, acting as an abstracted virtualization layer within the operating system of the host machine. One of the primary reasons behind this rapid adoption of containerization frameworks is that this abstracted virtualization layer allows containers to be easily migrated from one system and executed on another as long as the underlying containerization framework is present on a given system. Another major factor driving adoption, particularly in the computational biology and bioinformatics domain, is that this abstraction and virtualization allows application and container developers to bundle up the necessary prerequisites and software dependencies required by their applications, allowing their applications to be easily transferred and executed by others seeking to utilize them on their own datasets.

This tutorial will allow participants to interact with and build Singularity containers for various computational biology and bioinformatics applications using cloud hosted resources (ex: instances in AWS, GCP, or Azure) provided to each participant for the duration of the tutorial and configured with a host system Linux operating system and Singularity containerization framework.

Presenters

Objectives

Connecting to the Workshop Resources

Please use the instructions below to connect to the Google Cloud virtual machine machine instances used for this course.

1. Click here to view a list of virtual machines (VMs) for this workshop. Each one is represented by a unique Public IP address.

2. Find your name in the list or place your name in an empty space in the “Workshop User” column. This ensures only one user will be logged in per virtual machine instance.

image

3 Copy the public IP address associated with your VM.

Mac Users

image

Windows User

image

image

image

Click Here to view a PDF version of the instructions above

Key Points

  • First key point. Brief Answer to questions. (FIXME)