CSBC/CBI New Account Application

Thank you for your interest in joining the CBI! By joining the CBI, you get access to our lab facilities, located at BSE 3.114, where we have two labs. The high priority research lab with Windows workstations for reservation, and our open classroom lab with Linux workstations. All workstations feature multi-core cpus and high memory capacity as well as large flat panel displays. Benefits of membership include:

  • Quiet workspace with high end workstations
  • Technical support from our highly qualified staff
  • Access to high end software such as Imaris, Genespring, Matlab, and more
  • Host meetings within our space with access to projector and smartboard

Those involved in bioinformatics related research at UTSA are welcome to apply for an account. We also accept graduate level and above researchers from the College of Science and any others in need of our computational resources. To get a new account, please first read and understand our usage policy then complete the following application form.

For outside collaborators, please use this form.

Any questions/comments/issues, please contact us at cbiadmin@utsa.edu.

Personal Information
Full Name
Contact Information
+1
Please provide area code. Numbers only, no dashes or parentheses.
Insitutional emails only such as @my.utsa.edu, @utsa.edu, etc
Appointment Information
Institution Information
Your primary institution, UTSA, UTHSCSA, etc
Your UTSA ID (abc123). If not a UTSA employee or student, then leave blank.
For those with secondary appointments at other institutions or additional titles such as fellowships
Project Information
Full name of your PI. If you are a PI, please enter your own name.
Provide your PI's institutional email
Your Banner ID number as printed on your UTSA ID card, including zeros, without the '@' or some other id number provided to you by your institution
Department Information
Select your department, if from Engineering, enter your concentration as secondary. If other, please enter your department in the provided space.
Are you applying to access resources as part of your research or as part of enrolling in a class?
Card access is for those who need to access the CBI lab after hours. NOTE: There is no notification should the request to Access Control fail. Also if you do not have access to the BSE building after hours, you will not be able to access the CBI lab.

CBI Usage Policy

As a CBI user, your usage of our services and systems is covered under UTSA's Acceptable Use Policy. In addition to UTSA's policy, the primary requirments of all CBI/CSBC users is to register with your institutional email(edu) and all users must acknowledge the CBI as part of their research on all publications(white papers, conference papers, posters, etc). We also have specific usage policies for the following situations:

CBI Support Policy

The primary management objective of the Computational Biology Core Facility is to maximally advance research and education related to core expertise for our affiliated members. The organization of the facility is predicated on the assumption that computational techniques will be increasingly important for state-of-the-art biological research. We also recognize that students, faculty, and staff within the institutions that the core serves have a wide range of existing expertise, needs and resources. For this reason, the core use policy is designed to be as organizationally flexible and adaptive as possible.

It is important to minimize barriers to use of core facilities, especially for new projects and laboratory groups just learning to incorporate computational techniques into their research. For this reason, the Directors of the facility will continue to seek funding to provide, as far as possible, open and free access. At the same time, we recognize both the need and the value inherent in receiving direct support from research groups making heavy or central use of the core facility.

The transition from free use to pay-as-you-go use is probably best understood in the context of the three tiered level of support around which the facility is organized and managed:

Tier 1: Tier one support refers to use basic use of software and hardware with minimal expenditure of staff resources. Software and hardware are made freely available to anyone with a need. The facility maintains a large array of software of general interest to the community. Some of this software is free, while some requires yearly site licenses. With fee for use software, we evaluate the likely general usefulness of the software and invest accordingly. We are particularly mindful of opportunities to maximize the value of the investment across institutions. Core purchases have already saved individual laboratories multiple thousands of dollars. Occasionally users request additional software to support specific lab groups. Freely available software is obtained and installed at no charge. If there is a charge for the software, we pay in full, partially pay, or request payment from the requesting lab based on our assessment of the likely general use of the software as well as the ability of the requesting laboratory to pay.

Tier 2: Tier 2 involves training beyond basic installation and creation of user accounts. Core facility staff organizes educational workshops focused on specific software packages and/or computational techniques. Workshop topics are established based on the perceived needs of the community by the staff and occasionally on requests from users. In many cases experts are brought in from outside San Antonio to lead these workshops. To date, all workshops have been free and the expectation is that most or all will continue to be free.

Tier 3: Tier 3 involves direct investment of staff or affiliated faculty expertise to support research. At this level of support, a staff member participates directly in computational efforts in individual laboratories as full collaborators. The initial establishment of Tier 3 efforts is not explicitly dependent on the prior existence of funds to pay for the service. However, as these collaborations frequently result in the generation of new grant proposals, we then work with PIs to include support for the facility in those grants. An important measure of the success of the facility is how well it incubates new research directions and contributes to successful new grant applications. PIs whose projects are heavily dependent on the CBI services are expected to include support for facility staff, software and hardware in their grants. Well funded PIs who make heavy use of core services are also expected to support the facility. The ability to provide intensive Tier 3 support at little or no cost depends on core funding.

Although at present the facility is not used by businesses or outside organizations, we anticipate the possibility of such use at any of the three levels identified. Decisions about fees for services for outside groups will be assessed on a case by case basis. At no time, however, will the ability of an outside organization to pay for services exclude use by affiliated organizations (at present UTSA and the UTHSCSA). The principle focus and the top priority for use will always be given to members of affiliated organizations.

In summary, the Computational Biology Core Facility is not designed or intended to be a profit center. The facility is constructed as a collaborative, intellectual / scientific enterprise that focuses on supporting research and incubating new research directions. While we expect and encourage our users, especially those with the means to do so to contribute to core operation, we also anticipate that core services will always be subsidized by sources of support obtained by the directors themselves, as well as by the institutions served.



CBI Data Storage Policy

As part of our mission to provide computational infrastructure to researchers, data storage is provided only as needed to conduct research and data analysis with our hardware. At no time can any data that is classified as Category I/Confidential be stored on our systems. Any data of a personal nature(musics, videos, pictures, etc) nor any backups of software or backups of lab equipment may be stored. Under no circumstance may illegal and/or pirated material be stored.

Primary Investigators(referred to as Data Owner in UTSA's policy) are responsible for their research data and its management. As part of our infrastructure we have disaster recovery methods to ensure proper and smooth operations, yet these are not available to the user. As such we cannot be considered a backup, thus it is the responsibility of the Data Owner to maintain a proper backup of their data.

All users of our services have access to a personal directory or home directory accessible to only themselves. Under certain circumstances, the PI may request to have access to a subordinate user's directory as part of their data management. Administrators may also access the home directory, but only as part of their duties to maintain system integrity. All users are considered 'Standard Users' and as such are capped at 100GB per home directory. Under special conditions may a user be considered 'Advanced' and allowed a higher cap, as determined by the CBI Director.

Once a user is no longer affiliated with the University or after six months of inactivity, or we are notified by a PI, a user's account will be marked as inactive and locked. Data held within the user's directory can be made available to the PI for their data archive procedures. After another six month period, any remaining data will be declared abandoned and removed from the system. If the user returns to the University, their account may be reopened, but once data is declared abandoned, there is no guarantee of recovery.

Group shares are available as a means to share data between members of a research group or lab for collaborative work. The same restrictions as to what can be stored apply here as well. At no time can this location or the home directory be considered a place for long term storage. Once a procedure is implemented, storage will not only be capped by capacity but by age as well.

Soon to be available will be our long term archive system. Only PIs/Data Owners will have access to this system. PIs will be able to apply for storage on a yearly renewable basis and a recovery fee may be applied. Again the same restrictions on what is allowed is applied here as well.

Room Usage Policy

The CBI maintains two rooms, the classroom and the workroom, for users who need access to high end workstations for their work. We require all users to sign in at the front door via the touch screen, which is good for a single day.

Food and drink are allowed in small quantities and we ask that all users clean up after themselves. Please report any spills, though should users disregard this, then we will ban all food and drink. Please use the trash cans in each room, and there is a paper recycling bin by the printer.

Cell Phones are not prohibited but we ask that users please take their phone calls outside of the lab. There is to be no propping open the front door as this is both a security and fire safety issue. Only approved CBI users are allowed in the lab after hours.

All the workstations in the workroom are Windows XP and require a user reserve time beforehand. Any user found using a system without a reservation will be asked to reserve the rest of their time. Should a user be using a system that is reserved by another user, they will be asked to move to another system.

All the workstations in the classroom are Linux and do not require a reservation. While users can lock the workstation, we ask that we be notified. Users are allowed to bring their laptops, but note that there is a limited number of power and network connections. Under no circumstance should a user unplug a power or network cable. Air Rowdy is available to all UTSA students, faculty, and staff.

MATLAB Usage Policy

When using Matlab, it checks out a license from the pool of available licenses as well as a license for any toolboxes in use. As there is a limited number of Matlab licenses, and in some cases even less for some individual toolboxes, there is a usage policy in place to promote fair usage for all users.

When using Matlab, please restrict your usage to only a few instances as needed. The more instances in use, the less there are available for the rest of the community to use. We encourage you use Matlab in this fashion when actively developing code. Once your code is ready to run full computations, there are two options to run your code that does not use a Matlab license.

Matlab code can be compiled into a stand alone executable that does not use a license when in use. It can be submitted to the cluster as a normal serial job.

Also available is the Matlab Distributed Compute Server(MDCS) that can accept Matlab jobs in much the same fashion as a traditional cluster. This is advantageous for running many individual jobs or running large parallel jobs. Running Matlab code this way only uses a single Matlab license when interacting with the MDCS.

Matlab license usage is monitored and those who do not follow the policy will be notified.

Windows Usage Policy

All users must reserve a workstation ahead of time and be aware that storing data within the Windows profile(ie Desktop, My Documents, etc) is highly not recommended as that data is not protected and also leads to long login/logoff times.