# Computing Environments

## Stronghold

A core component of the URSA Initiative is Brown's Stronghold. Stronghold is a secure computing and storage environment that enables Brown researchers and associates to analyze sensitive data while complying with regulatory or contractual requirements.&#x20;

Stronghold is maintained by the Brown University's Center for Computation and Visualization ([CCV](https://ccv.brown.edu/)) in the Office of Information Technology ([OIT](https://it.brown.edu/)). To learn more about Stronghold, you may refer to CCV's [Stronghold Documentation](https://docs.ccv.brown.edu/stronghold).

### URSA Stronghold

URSA Stronghold is one of the research "tenants" within Stronghold. It is collaboratively managed by CCV, the Brown Center for Biomedical Informatics ([BCBI](https://bcbi.brown.edu/)), and the Biomedical Informatics, Bioinformatics, and Cyberinfrastructure Enhancement ([BIBCE](https://advancectr.brown.edu/research-services/informatics-implementation-science)) Core of [Advance RI-CTR](https://advancectr.brown.edu/). URSA Stronghold offers both Linux and Windows computing platforms; database management systems such as Microsoft SQL, PostgreSQL, and MySQL; and, a broad range of data analysis tools including Julia, Python, R, SAS, and Stata.&#x20;

Researchers may work within the URSA tenant or request their own dedicated Stronghold tenant. Refer to Brown CCV's documentation for more information about available features and how to [request a Stronghold tenant](https://docs.ccv.brown.edu/stronghold).

## Oscar

Oscar (Ocean State Center for Advanced Resources) is Brown University's high performance computing cluster. Oscar is maintained and supported by Brown's Center for Computation and Visualization ([CCV](https://ccv.brown.edu/)).

## Data Storage at Brown

Brown’s [Data Risk Classifications](https://it.brown.edu/policies/data-risk-classifications) are used to determine data access and storage options. Stronghold is the institutionally-designated environment for Risk Level 3,  identified datasets that include protected health information ([**PHI**](https://docs.bcbi.brown.edu/codiac-for-health/observational-research/best-practices/protected-health-information-phi)) or personally identifiable information (PII). With approval from the data provider, researchers may leverage Brown's [Oscar](https://docs.ccv.brown.edu/oscar) high-performance computing environment or other Brown-managed computers for the storage and analysis of [de-identified](https://app.gitbook.com/s/uIg6LTJWpw8cb897CQsk/best-practices/protected-health-information-phi) (Brown Risk Level 2) datasets. In addition, Brown’s [File Service for Researchers](https://docs.google.com/document/d/1GiUyKqo6sk9c00tOAkR3Q_GBlBhGs2Ob8EO6pYneNDc/edit) can be used for storage of de-identified data and other research files. Data analysis is initiated "locally" on a researcher's computer while the data remain secure.&#x20;

## Resources

### Links

* [Brown OIT Data Risk Classifications](https://it.brown.edu/policies/data-risk-classifications)
* [Brown CCV Computing](https://ccv.brown.edu/services/computing/)
* [Stronghold Documentation](https://docs.ccv.brown.edu/stronghold)
* [Oscar Documentation](https://docs.ccv.brown.edu/oscar)
