Computing Environments
Last updated
Last updated
A core component of the URSA Initiative is Brown's Stronghold. Stronghold is a secure computing and storage environment that enables Brown researchers and associates to analyze sensitive data while complying with regulatory or contractual requirements.
Stronghold is maintained by the Brown University's Center for Computation and Visualization (CCV) in the Office of Information Technology (OIT). To learn more about Stronghold, you may refer to CCV's Stronghold Documentation.
URSA Stronghold is one of the research "tenants" within Stronghold. It is collaboratively managed by CCV, the Brown Center for Biomedical Informatics (BCBI), and the Biomedical Informatics, Bioinformatics, and Cyberinfrastructure Enhancement (BIBCE) Core of Advance RI-CTR. URSA Stronghold offers both Linux and Windows computing platforms; database management systems such as Microsoft SQL, PostgreSQL, and MySQL; and, a broad range of data analysis tools including Julia, Python, R, SAS, and Stata.
Researchers may work within the URSA tenant or request their own dedicated Stronghold tenant. Refer to Brown CCV's documentation for more information about available features and how to request a Stronghold tenant.
Oscar (Ocean State Center for Advanced Resources) is Brown University's high performance computing cluster. Oscar is maintained and supported by Brown's Center for Computation and Visualization (CCV).
Brown’s Data Risk Classifications are used to determine data access and storage options. Stronghold is the institutionally-designated environment for Risk Level 3, identified datasets that include protected health information (PHI) or personally identifiable information (PII). With approval from the data provider, researchers may leverage Brown's Oscar high-performance computing environment or other Brown-managed computers for the storage and analysis of (Brown Risk Level 2) datasets. In addition, Brown’s File Service for Researchers can be used for storage of de-identified data and other research files. Data analysis is initiated "locally" on a researcher's computer while the data remain secure.