/tag/hipaa

  • Computing Environments at UVA

    Rivanna The primary vehicle for high-performance computing since 2014 has been the Rivanna cluster. Rivanna is a heterogenous system with a total of ~420 nodes and ~18,000 cpu cores. It consists of approximately 116 x 20-core nodes with 128GB of RAM each, 39 x 28-core nodes with 256GB of RAM, and 363 x 40-core nodes with 384GB each. Five “big memory” nodes offer 1TB of RAM with 16 cores each. A number of nodes supporting specialty hardware are included; there are 8 nodes with NVIDIA K80 GPGPUs, 4 nodes with NVIDIA V100 GPGPUs, 13 nodes with NVIDIA V100 GPGPUs, and 2 nodes with NVIDIA RTX2080TI devices.
  • Ivy Secure Environment

    Ivy is a secure computing environment for researchers consisting of virtual machines (Linux and Windows). Researchers can use Ivy to process and store sensitive data with the confidence that the environment is secure and meets HIPAA or CUI requirements. Are you submitting a grant proposal and need standard information about UVA research computing environments? Get it here. Overview Ivy consists of both virtual computing environments and secure storage. In order to obtain access to either system, users must 1. Submit an account request, 2. Complete the Information Security Awareness Training, and 3. Ensure their personal computer meets all High Security VPN requirements.
  • Secure Computing for Surgical Research

    RC is working with Dr. Eric Schneider to create a secure computing environment for the research of the Healthcare Surgical Outcome team. Data from this project will contain HIPAA identifiers, as well as Medicare information, and requires more security and control of data ingress/egress than projects previously hosted on the Ivy platform. After successful implementation of this project, RC will create a similar computing environment for DoD blast and traumatic brain injury data collected by Dr. Schneider before he joined UVA. PI: Eric Schneider (Department of Surgery)
  • Image Processing Software on Ivy Linux VM

    Pre-approved packages The following software packages are pre-approved for image processing on an Ivy Linux VM KNIME KNIME is open source analytics platform for data mining and pipelining. KNIME’s Image Processing Plugin allows users to perform common image processing techniques such as registration, segmentation, and feature extraction. KNIME is compatible with over 120 image file types and can be used alongside ImageJ. ImageJ ImageJ is a Java-based image processing program developed at the NIH. ImageJ can be used interactively through a graphical user interface or automatically with Java. OpenCV OpenCV is an open source library for computer vision applications. OpenCV includes modules for image processing, video analysis, machine learning, and much more.
  • Image Processing Software on Ivy Windows VM

    Pre-approved packages The following software packages are pre-approved for image processing on an Ivy Windows VM Axiovision Axiovision is software for microscopy image processing and analysis. Axiovision is highly configurableto meet the needs of your individual workflows. KNIME KNIME is open source analytics platform for data mining and pipelining. KNIME’s Image Processing Plugin allows users to perform common image processing techniques such as registration, segmentation, and feature extraction. KNIME is compatible with over 120 image file types and can be used alongside ImageJ. ImageJ ImageJ is a Java-based image processing program developed at the NIH. ImageJ can be used interactively through a graphical user interface or automatically with Java.
  • Secure Computing

    UVA School of Medicine Research Computing can assist medical researchers in both understanding what HIPAA compliance requires of their work, and how to implement technical solutions to achieve and verify such compliance. Review & Assessment From a compliance perspective, RC offers three levels of review/assessment: Security Plan - Having a security plan in place is important to your success at UVA School of Medicine. If your lab or department doesn’t have a plan in place Research Computing Information Security will be happy to help you develop such a plan. Security Review - If you have a security plan in place already we can help you verify that your computing resources are functioning as documented in your security plan.