Using CSC Environment Efficiently
This one day course focuses on using the CSC environment which has been tailored for researchers to be easy and efficient for scientific use.
Find our upcoming trainings and events at www.csc.fi.
This site is an archive version and is no longer updated.
2017
This one day course focuses on using the CSC environment which has been tailored for researchers to be easy and efficient for scientific use.
This training course addresses the fundamentals and programming of the D-Wave 2X. A combination of lectures and hands-on practical labs will guide the students through the quantum phenomena harnessed in quantum computers, to examples in constructing their own quantum algorithm. It concludes with a hands-on laboratory in which students will formulate and execute programs on a live quantum computer in Canada.
Foundation course for working with structural mechanics simulations in ANSYS Workbench.
In the webinar we introduce basic usage of Notebooks, demonstrate how lecturers can use power user features to create customised course environments and host QA to answer your questions about the service. The introduction part takes about 20 minutes.
Do you have an understanding of the fundamentals of wireless technology? Do you know how WLAN work and how it's managed day-to-day? Do you have the ability to install, configure and troubleshoot and maintain wireless networks within small business or Enterprise deployments?
Get an introduction to power usage of the Schrödinger Maestro molecular modeling suite including hands-on training.
This course is aimed at people who wish to start learning R programming from scratch. No previous experience with R or other programming languages is expected.
This two day course addresses the technical architechture and use cases of Spark, setting it up for your work, best practices and programming aspects.
Blender is free and open source 3D creation suite, that supports the entire 3D pipeline. Many aspects of Blender will be demoed, depending on the interests of the participants. The focus will be on rendering imported meshes, and creating geometry.
Why should you manage your data? What are the good practices managing your research data? How does CSC help you and provide tools for your data management in the different phases of your research? This is the first webinar of the series "Love your data! CSC´s research data management webinars"
This course provides a short introduction to python programming and Biopython tool library
You can find datasets for your purposes with a help of discovery services as Etsin and B2FIND. Some issues must be taken into consideration when using another researcher's data in your own research. What are they and how can you minimize the risks? This is the second webinar of the series "Love your data! CSC´s research data management webinars".
Various aspects of the data and its use are to be considered already when planning the research project. This webinar gives an overview to the storage services produced by CSC and how these services can be applied during the lifecycle of your research data. This is the third webinar of the series "Love your data! CSC´s research data management webinars".
CSC recommends sharing research data whenever possible. This webinar tells you about several services that enable you to share data within a project or for a wider audience. From the perspective of making the data freely available, it is important to define the terms and conditions under which persons interested in using the data can know whether there are any restrictions on its use. This is the fourth webinar of the series "Love your data! CSC´s research data management webinars".
This course gives a thorough introduction to programming GPUs using the directive based OpenACC paradigm. The course consists of lectures and hands-on exercises. Topics of this course include the basic usage of OpenACC, as well as some more advanced issues related to profiling, performance and interoperability with CUDA.
This is a continuation course to Linux 1 - Introduction to Linux.
Korkeakoulujen IAM-verkosto sparraa organisaatioiden identiteetinhallinnan (IdM/IAM) kehittämistä.
Kohti vahvempaa tunnistamista -työpajassa harjoitellaan vahvemman tunnistusmenetelmän käyttöönottoa Hakaan liitetyssä palvelussa (SP) tai tunnistupalvelimella (IdP)
Introducing Apache Syncope 2.0 for open source identity management in collaboration with Haka IAM network
Kurssi koostuu neljästä eri modulista, joissa harjoitellaan tietoturvapoikkeamien käsittelyyn vaadittavia perustaitoja. Kaikki kouluttajat ovat Funet CERT:n jäseniä. Kurssin materiaali on englanniksi, koulutuskielenä Suomi.
Korkeakoulujen IAM-verkosto sparraa organisaatioiden identiteetinhallinnan (IdM/IAM) kehittämistä.
Korkeakoulujen IAM-verkosto sparraa organisaatioiden identiteetinhallinnan (IdM/IAM) kehittämistä.
Koulutuksessa tutustumme Nessus -haavoittuvuusskannerin peruskäyttöön sekä Funet Tutkain -palvelun hyödyntämiseen oman verkon auditoinnissa. Valinnaisena työpajapäivänä tehdään paljon käytännön harjoituksia liittyen skannausten ja raportoinnin automatisointiin.
Did you attend the Certified Wireless Network Administrator (CWNA) course and decide you want to learn more? Do you want to take the next step towards becoming a real expert on Wi-Fi? We are now offering a continuing course that covers the major topics of Certified Wireless Design Professional (CWDP) and Certified Wireless Analysis Professional (CWAP).
Tosca Structure -ohjelmistolla voi ratkoa erilaisia mekaanisten rakenteiden optimointiin liittyviä tehtäviä.