The IT department bottlenecks progress. How should I handle this?How to address the lack of seminars in my departmentHow should you address academic colleagues in the United States? Is the “Prof” title necessary?How to handle students not returning borrowed equipment?Should I say congratulations to my professor? What is the best way for this?How to handle possibly subtly flirtatious emails from students?Attending job talks when you are leaving the departmentHow to handle rude and distracting fellow graduate student who sits in the same office?How to handle the particular situation when mind goes blank during a presentation?Did the professor “give” me this project?How to handle lecturer who doesn't let me use my phone?
How do ultrasonic sensors differentiate between transmitted and received signals?
How to prevent YouTube from showing already watched videos?
What was required to accept "troll"?
"lassen" in meaning "sich fassen"
What is Sitecore Managed Cloud?
Stereotypical names
The most efficient algorithm to find all possible integer pairs which sum to a given integer
Superhero words!
What does the "3am" section means in manpages?
Is there enough fresh water in the world to eradicate the drinking water crisis?
How can a jailer prevent the Forge Cleric's Artisan's Blessing from being used?
Word describing multiple paths to the same abstract outcome
Java - What do constructor type arguments mean when placed *before* the type?
Is the next prime number always the next number divisible by the current prime number, except for any numbers previously divisible by primes?
Have I saved too much for retirement so far?
What should I use for Mishna study?
Is there a good way to store credentials outside of a password manager?
Would it be legal for a US State to ban exports of a natural resource?
Can somebody explain Brexit in a few child-proof sentences?
A known event to a history junkie
Simulating a probability of 1 of 2^N with less than N random bits
Is there any significance to the Valyrian Stone vault door of Qarth?
Why is delta-v is the most useful quantity for planning space travel?
Indicating multiple different modes of speech (fantasy language or telepathy)
The IT department bottlenecks progress. How should I handle this?
How to address the lack of seminars in my departmentHow should you address academic colleagues in the United States? Is the “Prof” title necessary?How to handle students not returning borrowed equipment?Should I say congratulations to my professor? What is the best way for this?How to handle possibly subtly flirtatious emails from students?Attending job talks when you are leaving the departmentHow to handle rude and distracting fellow graduate student who sits in the same office?How to handle the particular situation when mind goes blank during a presentation?Did the professor “give” me this project?How to handle lecturer who doesn't let me use my phone?
I'm currently working as a PhD student.
I am not working on a tech-oriented PhD. However, my project requires a lot of programming. This involves both working on a computation cluster, servers, and working with a variety of software. These are provided and maintained by our faculty IT support.
Now on the reason why I post: the first problems started when working on our server, maintained by our IT staff. I required some software essential to do my work, but because I have no administrator rights, I cannot install what I need. I asked IT very politely (I'm the new one after all), and they let me know that they would handle it as soon as possible.
Two weeks later, I still did not have access to the software I desperately needed to do my work. I had to ask my promotor (luckily a huge help in this matter) to ask IT, and finally the software was installed.
The following cycle continued until now:
- I notice that software is missing / outdated / not working properly
- I ask IT to fix the issue, because no other options are available
- IT ignores my requests, leading to me having difficulties to meet deadlines
- Someone with better credentials has to pressure IT into fixing the issue
Like I mentioned earlier, I absolutely love programming and computers in general, so I can fix almost all issues myself. However, my hands are tied because I have no administrator rights, and IT goes to great lengths to avoid that a non-IT person does something / installs something on one of the computers...
Does some here have similar experiences, and do you know how to smoothen this out? I obviously don't want to cause a ruckus in our department, but I also believe it to be unfair that we are blocked from doing our job. I'm not the only employee who was bottlenecked by IT, so I guess all suggestions are welcome!
etiquette colleagues
New contributor
|
show 13 more comments
I'm currently working as a PhD student.
I am not working on a tech-oriented PhD. However, my project requires a lot of programming. This involves both working on a computation cluster, servers, and working with a variety of software. These are provided and maintained by our faculty IT support.
Now on the reason why I post: the first problems started when working on our server, maintained by our IT staff. I required some software essential to do my work, but because I have no administrator rights, I cannot install what I need. I asked IT very politely (I'm the new one after all), and they let me know that they would handle it as soon as possible.
Two weeks later, I still did not have access to the software I desperately needed to do my work. I had to ask my promotor (luckily a huge help in this matter) to ask IT, and finally the software was installed.
The following cycle continued until now:
- I notice that software is missing / outdated / not working properly
- I ask IT to fix the issue, because no other options are available
- IT ignores my requests, leading to me having difficulties to meet deadlines
- Someone with better credentials has to pressure IT into fixing the issue
Like I mentioned earlier, I absolutely love programming and computers in general, so I can fix almost all issues myself. However, my hands are tied because I have no administrator rights, and IT goes to great lengths to avoid that a non-IT person does something / installs something on one of the computers...
Does some here have similar experiences, and do you know how to smoothen this out? I obviously don't want to cause a ruckus in our department, but I also believe it to be unfair that we are blocked from doing our job. I'm not the only employee who was bottlenecked by IT, so I guess all suggestions are welcome!
etiquette colleagues
New contributor
15
Is there any chance of you installing your required software in your home directory rather than as root?
– thosphor
Mar 21 at 13:58
67
Having been on the IT department side of this, and in case you're curious, the most likely reason for their behavior is that they have a lot of more urgent work that they are catching up on, and only once someone higher up the ladder makes your request urgent does it get ahead of all the other things. To the detriment of the work on other things. So for what it's worth, they are probably not ignoring you for any personal reason, they are just scrambling to keep the servers running.
– Todd Wilcox
Mar 21 at 14:21
11
In the meantime, you could try to have things working in your computer, with a smaller dataset. This way, you know exactly what you need to make your thing work and you can go to your professor to ask them to ask IT to install all you need at once, instead of doing the cycle you describe.
– user4052054
Mar 21 at 14:25
8
Does anybody not have this experience? This is what IT departments do. It's the easiest way to meet their objective of "reducing expenditure."
– alephzero
Mar 21 at 18:32
11
Almost every IT department is under-staffed, because management treads it like facility management: you have to have it, but it has no business value. They do not notice the problems, because their requests are always fulfilled immediately.
– Chris
Mar 22 at 8:03
|
show 13 more comments
I'm currently working as a PhD student.
I am not working on a tech-oriented PhD. However, my project requires a lot of programming. This involves both working on a computation cluster, servers, and working with a variety of software. These are provided and maintained by our faculty IT support.
Now on the reason why I post: the first problems started when working on our server, maintained by our IT staff. I required some software essential to do my work, but because I have no administrator rights, I cannot install what I need. I asked IT very politely (I'm the new one after all), and they let me know that they would handle it as soon as possible.
Two weeks later, I still did not have access to the software I desperately needed to do my work. I had to ask my promotor (luckily a huge help in this matter) to ask IT, and finally the software was installed.
The following cycle continued until now:
- I notice that software is missing / outdated / not working properly
- I ask IT to fix the issue, because no other options are available
- IT ignores my requests, leading to me having difficulties to meet deadlines
- Someone with better credentials has to pressure IT into fixing the issue
Like I mentioned earlier, I absolutely love programming and computers in general, so I can fix almost all issues myself. However, my hands are tied because I have no administrator rights, and IT goes to great lengths to avoid that a non-IT person does something / installs something on one of the computers...
Does some here have similar experiences, and do you know how to smoothen this out? I obviously don't want to cause a ruckus in our department, but I also believe it to be unfair that we are blocked from doing our job. I'm not the only employee who was bottlenecked by IT, so I guess all suggestions are welcome!
etiquette colleagues
New contributor
I'm currently working as a PhD student.
I am not working on a tech-oriented PhD. However, my project requires a lot of programming. This involves both working on a computation cluster, servers, and working with a variety of software. These are provided and maintained by our faculty IT support.
Now on the reason why I post: the first problems started when working on our server, maintained by our IT staff. I required some software essential to do my work, but because I have no administrator rights, I cannot install what I need. I asked IT very politely (I'm the new one after all), and they let me know that they would handle it as soon as possible.
Two weeks later, I still did not have access to the software I desperately needed to do my work. I had to ask my promotor (luckily a huge help in this matter) to ask IT, and finally the software was installed.
The following cycle continued until now:
- I notice that software is missing / outdated / not working properly
- I ask IT to fix the issue, because no other options are available
- IT ignores my requests, leading to me having difficulties to meet deadlines
- Someone with better credentials has to pressure IT into fixing the issue
Like I mentioned earlier, I absolutely love programming and computers in general, so I can fix almost all issues myself. However, my hands are tied because I have no administrator rights, and IT goes to great lengths to avoid that a non-IT person does something / installs something on one of the computers...
Does some here have similar experiences, and do you know how to smoothen this out? I obviously don't want to cause a ruckus in our department, but I also believe it to be unfair that we are blocked from doing our job. I'm not the only employee who was bottlenecked by IT, so I guess all suggestions are welcome!
etiquette colleagues
etiquette colleagues
New contributor
New contributor
edited Mar 23 at 0:01
Peter Mortensen
31426
31426
New contributor
asked Mar 21 at 8:40
unit_with_a_soulunit_with_a_soul
254127
254127
New contributor
New contributor
15
Is there any chance of you installing your required software in your home directory rather than as root?
– thosphor
Mar 21 at 13:58
67
Having been on the IT department side of this, and in case you're curious, the most likely reason for their behavior is that they have a lot of more urgent work that they are catching up on, and only once someone higher up the ladder makes your request urgent does it get ahead of all the other things. To the detriment of the work on other things. So for what it's worth, they are probably not ignoring you for any personal reason, they are just scrambling to keep the servers running.
– Todd Wilcox
Mar 21 at 14:21
11
In the meantime, you could try to have things working in your computer, with a smaller dataset. This way, you know exactly what you need to make your thing work and you can go to your professor to ask them to ask IT to install all you need at once, instead of doing the cycle you describe.
– user4052054
Mar 21 at 14:25
8
Does anybody not have this experience? This is what IT departments do. It's the easiest way to meet their objective of "reducing expenditure."
– alephzero
Mar 21 at 18:32
11
Almost every IT department is under-staffed, because management treads it like facility management: you have to have it, but it has no business value. They do not notice the problems, because their requests are always fulfilled immediately.
– Chris
Mar 22 at 8:03
|
show 13 more comments
15
Is there any chance of you installing your required software in your home directory rather than as root?
– thosphor
Mar 21 at 13:58
67
Having been on the IT department side of this, and in case you're curious, the most likely reason for their behavior is that they have a lot of more urgent work that they are catching up on, and only once someone higher up the ladder makes your request urgent does it get ahead of all the other things. To the detriment of the work on other things. So for what it's worth, they are probably not ignoring you for any personal reason, they are just scrambling to keep the servers running.
– Todd Wilcox
Mar 21 at 14:21
11
In the meantime, you could try to have things working in your computer, with a smaller dataset. This way, you know exactly what you need to make your thing work and you can go to your professor to ask them to ask IT to install all you need at once, instead of doing the cycle you describe.
– user4052054
Mar 21 at 14:25
8
Does anybody not have this experience? This is what IT departments do. It's the easiest way to meet their objective of "reducing expenditure."
– alephzero
Mar 21 at 18:32
11
Almost every IT department is under-staffed, because management treads it like facility management: you have to have it, but it has no business value. They do not notice the problems, because their requests are always fulfilled immediately.
– Chris
Mar 22 at 8:03
15
15
Is there any chance of you installing your required software in your home directory rather than as root?
– thosphor
Mar 21 at 13:58
Is there any chance of you installing your required software in your home directory rather than as root?
– thosphor
Mar 21 at 13:58
67
67
Having been on the IT department side of this, and in case you're curious, the most likely reason for their behavior is that they have a lot of more urgent work that they are catching up on, and only once someone higher up the ladder makes your request urgent does it get ahead of all the other things. To the detriment of the work on other things. So for what it's worth, they are probably not ignoring you for any personal reason, they are just scrambling to keep the servers running.
– Todd Wilcox
Mar 21 at 14:21
Having been on the IT department side of this, and in case you're curious, the most likely reason for their behavior is that they have a lot of more urgent work that they are catching up on, and only once someone higher up the ladder makes your request urgent does it get ahead of all the other things. To the detriment of the work on other things. So for what it's worth, they are probably not ignoring you for any personal reason, they are just scrambling to keep the servers running.
– Todd Wilcox
Mar 21 at 14:21
11
11
In the meantime, you could try to have things working in your computer, with a smaller dataset. This way, you know exactly what you need to make your thing work and you can go to your professor to ask them to ask IT to install all you need at once, instead of doing the cycle you describe.
– user4052054
Mar 21 at 14:25
In the meantime, you could try to have things working in your computer, with a smaller dataset. This way, you know exactly what you need to make your thing work and you can go to your professor to ask them to ask IT to install all you need at once, instead of doing the cycle you describe.
– user4052054
Mar 21 at 14:25
8
8
Does anybody not have this experience? This is what IT departments do. It's the easiest way to meet their objective of "reducing expenditure."
– alephzero
Mar 21 at 18:32
Does anybody not have this experience? This is what IT departments do. It's the easiest way to meet their objective of "reducing expenditure."
– alephzero
Mar 21 at 18:32
11
11
Almost every IT department is under-staffed, because management treads it like facility management: you have to have it, but it has no business value. They do not notice the problems, because their requests are always fulfilled immediately.
– Chris
Mar 22 at 8:03
Almost every IT department is under-staffed, because management treads it like facility management: you have to have it, but it has no business value. They do not notice the problems, because their requests are always fulfilled immediately.
– Chris
Mar 22 at 8:03
|
show 13 more comments
11 Answers
11
active
oldest
votes
This is a partial solution I've used myself, and it assumes a few things:
- You access your clusters remotely through a connection (like other answers pointed, cloud servers or remote), so where you work isn't exactly the bottleneck.
- The software you use isn't OS dependent or has any special licenses
- You do not have a ton of things hooked up from serial ports to measuring equipment and whatnot.
One thing I've done in this situation is, when you finally grab a ticket from IT, ask them to install a virtual machine like VirtualBox and have them enable virtualization in the BIOS. Most processors allow this nowadays. Make sure they install it properly or they will ghost again.
This basically allows you to install any Linux distribution you want (you need Licenses for Windows images), so it is an operating system where you have all admin rights. This completely removes the IT middleman if your case is just coding and clustering the data crunching since you don't need their permission to do things in the VM, and also shouldn't impact performance significantly.
If IT is worth half a dime, they will appreciate the solution, since:
- It takes gargantuan effort to compromise the Host Machine through a VM if you are not malicious
- Resulting lack of tickets from you needing something updated/installed.
Worst case scenario you can still alternate between both Operating Systems, and do small things in the VM with your admin rights.
35
I'm not sure about university IT departments, but in other areas, a user that does not have admin rights to a server cannot have a VM on that server with admin rights on the VM either. In other words, I've never worked in an IT department where this request would be granted. Something that would work in my experience is getting approval from your department or program for money for a virtual machine on a cloud service like AWS or Azure.
– Todd Wilcox
Mar 21 at 14:18
3
@Todd: In principle, anything a user in as an admin guest OS can also be done as a user host OS. Depending on how the IT department models threats, this sort of request might be granted. Where things get problematic is with VM-based security systems. E.g., Windows 10 environment has a feature called Device/Credential Guard. This security feature tends to prevent VM software from functioning. Even if the IT department is willing to toggle the BIOS virtualization settings, they'll probably be far less willing to disable Device/Credential Guard.
– Brian
Mar 21 at 14:36
2
If the only time you need admin rights is the installation then a singularity container should do the trick. One of these things; sylabs.io/docs afak they are cli only, but otherwise they are basically a virtual box with better pass through. You can set it up as admin on your own machine then move the image to the cluster and run it there as a normal user.
– Clumsy cat
Mar 21 at 18:16
6
@Todd Wilcox: As of a couple years ago, you could get a free student account on AWS. Depending on what the OP's computation needs are, that might serve.
– jamesqf
Mar 22 at 5:43
1
Considering that a great many "servers" these days are virtualized to begin with, it's not that simple to ask for a VM any more. Nested virtualization has a whole lot of challenges. Also I don't understand what tools people are running that require admin permissions. I've worked on tons of clusters where I simply installed all my programs for the my user.
– Voo
Mar 22 at 18:18
|
show 3 more comments
I think this is a fairly common occurrence in many companies. There is a big disconnect between the researchers trying to do their work and the IT staff who may be under-resourced, under-trained or limited by administrative policy. In my experience there is often lots of worry about researchers installing software without fully understanding the security implications. In short, I would not expect you to be able to change this policy and it may well be in place for sound reasons.
One solution that has been suggested to me is that academics can apply for time using different cloud compute solutions (e.g. Google compute https://cloud.google.com/edu/, Microsoft Azure https://azure.microsoft.com/en-us/education/, any many more). If successful you will be given compute time in a virtual machine where you will have appropriate administrative rights to install any software you want.
Thank you for your reply. I understand your point, a lot of people just install random software without thinking through what it does to their computer (or the network the computer is connected to). The cloud is indeed a solution I did not immediately think of (I thought it was always a paying service, but I see that they also award grants for using the cloud in academic settings). I will definitely look into it!
– unit_with_a_soul
Mar 21 at 12:36
12
This might come in very handy but be aware that there might be data security implications. Uploading research data to anywhere outside of my institution's network, especially to US-based servers, could very much be a punishable offense where I work. Of course this might depend on the project, type of data etc and it might well go unnoticed, but it's worth mentioning I think.
– smcs
Mar 22 at 15:05
1
@speedymcs Absolutely. OP needs to get permission from the relevant people, in writing. One web app I maintain at my old university has to be restricted to one university building, and faculty who want to connect outside the building have to use the university's VPN. It's locked down even to me (VPN + 2-factor auth) as the developer. Universities take data exposure very seriously, so make sure you can actually use the data and protect it in the right way!
– Chris Cirefice
Mar 22 at 16:25
add a comment |
We had this issue with some Silicon Graphics machines - we removed them from the IT department's control, with the support of the supervisors whose budgets had paid for them, and then controlled everything ourselves.
It went much better; we had more uptime and fewer issues than any other group / team on campus.
We learnt a lot about compiling & installing etc.
Not sure if you can go that route.
Note, the software we were using was CFD and the IT dept had no experience of what was needed.
Thank you for your response. Well, the problem is indeed that it is not possible for us to separate ourselves from IT using budget. The infrastructure we are working on belongs to the university, and the maintenance is a job for department IT. We indeed try to do as much as possible when it comes to the software we use (and this indeed works quite well), but being completely free from IT is really difficult I think.
– unit_with_a_soul
Mar 21 at 12:31
10
How long ago was this? Today, I'd expect the response to be that the IT support team can't afford for you to be the ones who learn a lot about what happens when you get hacked. Also, nothing in the question suggests that there's money available for duplicating facilities provided by the department. (The asker is using central resources, not resources that belong to the group but which are centrally managed.)
– David Richerby
Mar 21 at 19:10
@DavidRicherby They were on an internal network - no external hacking possible.... Funding was by particular research projects not "central" .... Unless you can hack via the power cord...
– Solar Mike
Mar 21 at 19:24
2
@DavidRicherby It's extremely rare in the US to not have group computers self managed, where the only thing IT requires is current antimalware. They're going to have to adapt quick: had several cases recently where instead of using a university HPC cluster, we just went to Amazon AWS or Microsoft Azure since there you install anything you want on your VM, get the right amount of RAM, cores, storage and GPU, and don't have to wait in line.
– user71659
Mar 21 at 22:54
1
@SolarMike An air-gapped internal network also means no network-based software updates (and burning a CD to run an update is a pain), installing extra software and the prerequisites for the software is difficult, getting to a login prompt is usually hard. Email and network shares are out of the question. Unless you're running FISMA-high data, I would not recommend going in this route.
– Doug O'Neal
Mar 22 at 19:03
|
show 3 more comments
Whilst others have focused on giving you some technical advice on alternatives to using your institution's infrastructure, I want to note that your problems are not uncommon. In my practice I opted to installing the software myself (a lot of software packets I used do not need root privileges for installation, make sure that admin access for yours is really a must) or asked supervisor for help.
If you are on good terms with your supervisor, you can always ask him for help, going from as little as cc-ing him in software installation emails that you send to your IT department to directly asking him for help when those request emails are ignored. In many organizations it's not easy for junior members to be listened to and that's just something you have to get over with.
Thank your for answering. Yes, I execute several applications as 'non elevated' user because that will give me what I need in most programs. My supervisor is indeed a big help and, for now, asking the supervisor is the best workaround. Yes, I understand that this is not a rare problem, especially for new employees like myself. However, what annoys me is that the things I ask are really not that difficult. I'm usually merely asking to install a certain software update or library that could come in handy, which is not something that takes weeks to complete.
– unit_with_a_soul
Mar 21 at 12:45
4
Upvoting for the second part here - always CC someone with more leverage whenever you report issues. Just that frequently moves it up in priority a surprising amount.
– user2699
Mar 21 at 14:03
1
Will chime in that as an admin (non-IT), receiving a cc with the PI is essentially "failing at your job". It is the form of accountability that staff relies on. So as much as we groan when we are at fault, it's absolutely the go-to for reminding other staff that we aren't doing this for our health--other, more important people care about this too. We have a million competing priorities, so unfortunately the squeaky wheel gets the oil... running from emergency to emergency...
– yourfriendlyresearchadmin
Mar 22 at 5:14
Upvoting for the second part here. On the one hand, it is your advisor's job to make sure you have the IT resources you need. On the other hand, your advisor has actual leverage with the IT admins; you don't. Always CC your advisor, and ask your advisor to follow up immediately with "I concur with / approve this request."
– JeffE
Mar 22 at 9:02
add a comment |
At many universities, you can actually go through a (rather secret) bureaucratic process that allows you to install your own software on the university computer, even though this is not the default option.
If this option exists, it will likely include signing forms that may limit (or even eliminate) future IT support for that computer. Basically, you are agreeing to be your own IT in exchange for flexibility. However, if you are constantly downloading software it is often worth it.
The University doesn't want to encourage this option, because it can be a perceived security risk, so you will have to directly ask administrators in your department and IT, if this option is available, as it likely won't be published online anywhere. And you may have to assertively push for it.
This process was available to me at two of the three universities I've been based at over the years (in the USA and Australia). The one that didn't allow it actually theoretically did, but the form also said that you would no longer be able to connect to the Universities wired internet network, which wasn't worth giving up for me. Read the forms very carefully before you go down this route to make sure you are comfortable with the tradeoff you are making.
1
Upvoted and agreed. I was at my current academic position for about 10 years before I accidentally discovered (arising from similar complaint to my chair) that we could request having my office computer be "unlocked" so I could install my own software. Meanwhile, my chair was surprised that this hadn't been done for me years earlier (CS department here).
– Daniel R. Collins
2 days ago
add a comment |
Since you're not in a "tech-oriented PhD", I'm guessing the cluster is 10 machines or less? If so, consider setting up your own cluster on any of the big cloud providers. AWS and Azure come to mind, but Google and IBM are still trying to hang on in those markets.
Thoughts on pricing:
- You don't have to have the cluster up all the time, so you don't have to pay for 24hrs/day for a full month. You would have to figure out how to save/load the data and install some programs quickly (docker?), if you opt for shutting down some or all servers.
- If you have fellow students or professors who are in the same boat, consider sharing your cluster and its expenses.
- Depending on your research, you might (eventually) be able to get special pricing from some vendors.
- On AWS, reserved instances are cheaper than spot instances.
Look at how much your time is worth, and how much these delays are impacting your research. If IT delays cost you 1 week of delays every month, then it's probably worth setting up things yourself. (Remember to back things up, and test your backup strategy. Put your code and data in github)
And lastly, are you using their ticketing system for your requests, or just asking them verbally? If there's no ticket, it'll surely be forgotten 5 minutes after you spoke to them.
New contributor
2
This answer may apply, but I don't see where you take the logical step from “not-tech-oriented” to “probably cluster <10 nodes”. In fact, to me, needing a cluster at all while not doing tech actually suggest more likely that lots of nodes are involved. Science or data science applications tend to be really computation intensive. Furthermore, many of these applications are quite latency-critical and only perform properly when run on an actual physical cluster with native MPI support and a suitable file system like Lustre.
– leftaroundabout
Mar 23 at 0:02
Doesn't AWS EMR allow for there to be clustering on demand in this case?
– lucasgcb
2 days ago
add a comment |
You should also be managing your requests.
I mean: track when you raised the request, ask for news after a reasonable period of time (two working days), repeat that max three times. In the first follow-up you can make it clear why this is important to you. For IT staff it might sound like 'I want this tool installed', but if you detail the deadline you have and why this ticket is crucial for your work, they might understand. After the third time, get your supervisor involved. Ask him/her to escalate the request in a conversation with an IT service manager.
Don't be happy with simply solving the ticket, try to see if IT can communicate what time of service level agreement they aim to respect. Maybe installing something requires internal permissions (release management) which, for instance, makes it impossible to install stuff on a Friday, or an afternoon, or if you don't have a rollback (meaning you have to backup the entire server setup before touching anything), etc.
Managing the request also means making sure your requirements are superclear. If you think you might need a package ask them to install it. Run these installations yourself in a VM that is identical to the production setup and provide them with the commands to actually install the tools. All these things you can manage.
At all times, and I must stress that, be nice. Just be nice. Unless you have reasons to suspect someone is trolling you, you have to give them the full credit for having to tackle many such requests at the same time. Being nice will get you further on the long run. It will also show to your supervisor that you are capable of creatively handling difficult situations.
New contributor
Tagging onto this answer: When following up, use multiple modes if possible. For example, start with the ticketing system, but do the first follow up by phone. Being nice and tech-savvy on the phone can work wonders with some IT departments.
– krubo
Mar 22 at 18:25
1
As an experienced computer tech, I'd have to add that the IT dept. might already have an agreed upon Service Level Agreement (SLA) as to how soon tickets need to be addressed. Some can be as long as a week or to. The OP stating they need to get their software in only 2 days may require extra steps, signatures, or could just be flat out denied due to this prior SLA. I'd suggest the OP finds out what the Standard Operating Procedure (SOP) is before stating any time limits. And being nice is always a good way to stay off the bad side of the IT dept., cause that's a bad side to be on.
– computercarguy
Mar 22 at 20:49
1
And you need to remember that the SLA is based on the worst-case workload that IT can reasonably expect. In my organization, we promise through an SLA that a reasonable VM will be created within two weeks. In practice, the timeframe is generally within two day and that's only because we have to depend on two other outside groups for part of the process. Also, if installation of your software involves installing multiple cutting-edge packages that affect other users, understand that IT has to support everybody, not just your research needs.
– Doug O'Neal
yesterday
add a comment |
Adding this since nobody's mentioned it yet: You could ask your supervisor about having a meeting between you, your supervisor and someone from IT. Maybe even invite them to lunch if it's appropriate to your institution and situation. In case they're overwhelmed by tickets and/or they feel like your tickets come in from a faceless ticket-generator, it could help to meet the real researcher behind them. And you can meet the real person handling the tickets, and see if there's any way you can make your tickets more straightforward for them.
add a comment |
Talk to your supervisor ("promotor"?) about the issue, and suggest that you should get a server that you manage. Depending on circumstances, you can agree on a physical server, an upgrade to you workstation / laptop to make it usable as a server, or even a server instance which is completely external to your institution, like Amazon AWS.
If your supervisor insists that you must use the existing IT infrastructure, send your support requests to them the next day after contacting IT. Don't wait for two weeks. Either helping you with these requests is not much of a burden, or your supervisor will grow tired of this and do something about it.
add a comment |
my.back had a good answer, and it sounds like this may be the way to go when working through a bureaucracy where some of the solutions which involve some variation of "use your own hardware" just aren't practical. To add to this, I've found the following technique useful when dealing with a department or person who is willing to help, but does things on their own time.
- CC your supervisor on every request. This gives your supervisor a chance to give you feedback if you request something that you might not have realized was not necessarily what you need, or should be asking, but also lacking a response from your supervisor, it let's the person doing the thing that needs to be done know that your supervisor is aware of the request. (make sure you follow the advice given by my.back when making this initial request as far as why you need it, and when you need it)
- When you don't get a response within a reasonable amount of time, send the request again, but make sure you that you put in the request itself "Second Request", making sure to again cc your supervisor on the request. This lets them know that you still do need this thing to be done, it tends to have an effect of increasing the urgency of the IT professional for your task. Repeat as necessary, making sure to put your request number in the request each time.
In my experience a second request is generally all that is needed when using this technique unless the department is just completely swamped. The tricky part is to figure out what time frame is reasonable to complete such a request, and since organizations differ, it's not one that can be answered here. I would suggest getting to know the folks who are completing your task, so that you can get an idea of what they go through, and so they can see you aren't just asking for ridiculous things and just being demanding all the time, because sometimes it's hard to see the world through other people's eyes without some context.
New contributor
add a comment |
A simple solution, just always make the requests through your promotor. Maybe explain to them the pattern you have noticed if they ask why you are going through them consistently.
Alternatively maybe they are doing something different, ask them how they get the IT department to resolve the issues quickly.
New contributor
add a comment |
protected by Alexandros Mar 22 at 23:01
Thank you for your interest in this question.
Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).
Would you like to answer one of these unanswered questions instead?
11 Answers
11
active
oldest
votes
11 Answers
11
active
oldest
votes
active
oldest
votes
active
oldest
votes
This is a partial solution I've used myself, and it assumes a few things:
- You access your clusters remotely through a connection (like other answers pointed, cloud servers or remote), so where you work isn't exactly the bottleneck.
- The software you use isn't OS dependent or has any special licenses
- You do not have a ton of things hooked up from serial ports to measuring equipment and whatnot.
One thing I've done in this situation is, when you finally grab a ticket from IT, ask them to install a virtual machine like VirtualBox and have them enable virtualization in the BIOS. Most processors allow this nowadays. Make sure they install it properly or they will ghost again.
This basically allows you to install any Linux distribution you want (you need Licenses for Windows images), so it is an operating system where you have all admin rights. This completely removes the IT middleman if your case is just coding and clustering the data crunching since you don't need their permission to do things in the VM, and also shouldn't impact performance significantly.
If IT is worth half a dime, they will appreciate the solution, since:
- It takes gargantuan effort to compromise the Host Machine through a VM if you are not malicious
- Resulting lack of tickets from you needing something updated/installed.
Worst case scenario you can still alternate between both Operating Systems, and do small things in the VM with your admin rights.
35
I'm not sure about university IT departments, but in other areas, a user that does not have admin rights to a server cannot have a VM on that server with admin rights on the VM either. In other words, I've never worked in an IT department where this request would be granted. Something that would work in my experience is getting approval from your department or program for money for a virtual machine on a cloud service like AWS or Azure.
– Todd Wilcox
Mar 21 at 14:18
3
@Todd: In principle, anything a user in as an admin guest OS can also be done as a user host OS. Depending on how the IT department models threats, this sort of request might be granted. Where things get problematic is with VM-based security systems. E.g., Windows 10 environment has a feature called Device/Credential Guard. This security feature tends to prevent VM software from functioning. Even if the IT department is willing to toggle the BIOS virtualization settings, they'll probably be far less willing to disable Device/Credential Guard.
– Brian
Mar 21 at 14:36
2
If the only time you need admin rights is the installation then a singularity container should do the trick. One of these things; sylabs.io/docs afak they are cli only, but otherwise they are basically a virtual box with better pass through. You can set it up as admin on your own machine then move the image to the cluster and run it there as a normal user.
– Clumsy cat
Mar 21 at 18:16
6
@Todd Wilcox: As of a couple years ago, you could get a free student account on AWS. Depending on what the OP's computation needs are, that might serve.
– jamesqf
Mar 22 at 5:43
1
Considering that a great many "servers" these days are virtualized to begin with, it's not that simple to ask for a VM any more. Nested virtualization has a whole lot of challenges. Also I don't understand what tools people are running that require admin permissions. I've worked on tons of clusters where I simply installed all my programs for the my user.
– Voo
Mar 22 at 18:18
|
show 3 more comments
This is a partial solution I've used myself, and it assumes a few things:
- You access your clusters remotely through a connection (like other answers pointed, cloud servers or remote), so where you work isn't exactly the bottleneck.
- The software you use isn't OS dependent or has any special licenses
- You do not have a ton of things hooked up from serial ports to measuring equipment and whatnot.
One thing I've done in this situation is, when you finally grab a ticket from IT, ask them to install a virtual machine like VirtualBox and have them enable virtualization in the BIOS. Most processors allow this nowadays. Make sure they install it properly or they will ghost again.
This basically allows you to install any Linux distribution you want (you need Licenses for Windows images), so it is an operating system where you have all admin rights. This completely removes the IT middleman if your case is just coding and clustering the data crunching since you don't need their permission to do things in the VM, and also shouldn't impact performance significantly.
If IT is worth half a dime, they will appreciate the solution, since:
- It takes gargantuan effort to compromise the Host Machine through a VM if you are not malicious
- Resulting lack of tickets from you needing something updated/installed.
Worst case scenario you can still alternate between both Operating Systems, and do small things in the VM with your admin rights.
35
I'm not sure about university IT departments, but in other areas, a user that does not have admin rights to a server cannot have a VM on that server with admin rights on the VM either. In other words, I've never worked in an IT department where this request would be granted. Something that would work in my experience is getting approval from your department or program for money for a virtual machine on a cloud service like AWS or Azure.
– Todd Wilcox
Mar 21 at 14:18
3
@Todd: In principle, anything a user in as an admin guest OS can also be done as a user host OS. Depending on how the IT department models threats, this sort of request might be granted. Where things get problematic is with VM-based security systems. E.g., Windows 10 environment has a feature called Device/Credential Guard. This security feature tends to prevent VM software from functioning. Even if the IT department is willing to toggle the BIOS virtualization settings, they'll probably be far less willing to disable Device/Credential Guard.
– Brian
Mar 21 at 14:36
2
If the only time you need admin rights is the installation then a singularity container should do the trick. One of these things; sylabs.io/docs afak they are cli only, but otherwise they are basically a virtual box with better pass through. You can set it up as admin on your own machine then move the image to the cluster and run it there as a normal user.
– Clumsy cat
Mar 21 at 18:16
6
@Todd Wilcox: As of a couple years ago, you could get a free student account on AWS. Depending on what the OP's computation needs are, that might serve.
– jamesqf
Mar 22 at 5:43
1
Considering that a great many "servers" these days are virtualized to begin with, it's not that simple to ask for a VM any more. Nested virtualization has a whole lot of challenges. Also I don't understand what tools people are running that require admin permissions. I've worked on tons of clusters where I simply installed all my programs for the my user.
– Voo
Mar 22 at 18:18
|
show 3 more comments
This is a partial solution I've used myself, and it assumes a few things:
- You access your clusters remotely through a connection (like other answers pointed, cloud servers or remote), so where you work isn't exactly the bottleneck.
- The software you use isn't OS dependent or has any special licenses
- You do not have a ton of things hooked up from serial ports to measuring equipment and whatnot.
One thing I've done in this situation is, when you finally grab a ticket from IT, ask them to install a virtual machine like VirtualBox and have them enable virtualization in the BIOS. Most processors allow this nowadays. Make sure they install it properly or they will ghost again.
This basically allows you to install any Linux distribution you want (you need Licenses for Windows images), so it is an operating system where you have all admin rights. This completely removes the IT middleman if your case is just coding and clustering the data crunching since you don't need their permission to do things in the VM, and also shouldn't impact performance significantly.
If IT is worth half a dime, they will appreciate the solution, since:
- It takes gargantuan effort to compromise the Host Machine through a VM if you are not malicious
- Resulting lack of tickets from you needing something updated/installed.
Worst case scenario you can still alternate between both Operating Systems, and do small things in the VM with your admin rights.
This is a partial solution I've used myself, and it assumes a few things:
- You access your clusters remotely through a connection (like other answers pointed, cloud servers or remote), so where you work isn't exactly the bottleneck.
- The software you use isn't OS dependent or has any special licenses
- You do not have a ton of things hooked up from serial ports to measuring equipment and whatnot.
One thing I've done in this situation is, when you finally grab a ticket from IT, ask them to install a virtual machine like VirtualBox and have them enable virtualization in the BIOS. Most processors allow this nowadays. Make sure they install it properly or they will ghost again.
This basically allows you to install any Linux distribution you want (you need Licenses for Windows images), so it is an operating system where you have all admin rights. This completely removes the IT middleman if your case is just coding and clustering the data crunching since you don't need their permission to do things in the VM, and also shouldn't impact performance significantly.
If IT is worth half a dime, they will appreciate the solution, since:
- It takes gargantuan effort to compromise the Host Machine through a VM if you are not malicious
- Resulting lack of tickets from you needing something updated/installed.
Worst case scenario you can still alternate between both Operating Systems, and do small things in the VM with your admin rights.
answered Mar 21 at 10:47
lucasgcblucasgcb
59315
59315
35
I'm not sure about university IT departments, but in other areas, a user that does not have admin rights to a server cannot have a VM on that server with admin rights on the VM either. In other words, I've never worked in an IT department where this request would be granted. Something that would work in my experience is getting approval from your department or program for money for a virtual machine on a cloud service like AWS or Azure.
– Todd Wilcox
Mar 21 at 14:18
3
@Todd: In principle, anything a user in as an admin guest OS can also be done as a user host OS. Depending on how the IT department models threats, this sort of request might be granted. Where things get problematic is with VM-based security systems. E.g., Windows 10 environment has a feature called Device/Credential Guard. This security feature tends to prevent VM software from functioning. Even if the IT department is willing to toggle the BIOS virtualization settings, they'll probably be far less willing to disable Device/Credential Guard.
– Brian
Mar 21 at 14:36
2
If the only time you need admin rights is the installation then a singularity container should do the trick. One of these things; sylabs.io/docs afak they are cli only, but otherwise they are basically a virtual box with better pass through. You can set it up as admin on your own machine then move the image to the cluster and run it there as a normal user.
– Clumsy cat
Mar 21 at 18:16
6
@Todd Wilcox: As of a couple years ago, you could get a free student account on AWS. Depending on what the OP's computation needs are, that might serve.
– jamesqf
Mar 22 at 5:43
1
Considering that a great many "servers" these days are virtualized to begin with, it's not that simple to ask for a VM any more. Nested virtualization has a whole lot of challenges. Also I don't understand what tools people are running that require admin permissions. I've worked on tons of clusters where I simply installed all my programs for the my user.
– Voo
Mar 22 at 18:18
|
show 3 more comments
35
I'm not sure about university IT departments, but in other areas, a user that does not have admin rights to a server cannot have a VM on that server with admin rights on the VM either. In other words, I've never worked in an IT department where this request would be granted. Something that would work in my experience is getting approval from your department or program for money for a virtual machine on a cloud service like AWS or Azure.
– Todd Wilcox
Mar 21 at 14:18
3
@Todd: In principle, anything a user in as an admin guest OS can also be done as a user host OS. Depending on how the IT department models threats, this sort of request might be granted. Where things get problematic is with VM-based security systems. E.g., Windows 10 environment has a feature called Device/Credential Guard. This security feature tends to prevent VM software from functioning. Even if the IT department is willing to toggle the BIOS virtualization settings, they'll probably be far less willing to disable Device/Credential Guard.
– Brian
Mar 21 at 14:36
2
If the only time you need admin rights is the installation then a singularity container should do the trick. One of these things; sylabs.io/docs afak they are cli only, but otherwise they are basically a virtual box with better pass through. You can set it up as admin on your own machine then move the image to the cluster and run it there as a normal user.
– Clumsy cat
Mar 21 at 18:16
6
@Todd Wilcox: As of a couple years ago, you could get a free student account on AWS. Depending on what the OP's computation needs are, that might serve.
– jamesqf
Mar 22 at 5:43
1
Considering that a great many "servers" these days are virtualized to begin with, it's not that simple to ask for a VM any more. Nested virtualization has a whole lot of challenges. Also I don't understand what tools people are running that require admin permissions. I've worked on tons of clusters where I simply installed all my programs for the my user.
– Voo
Mar 22 at 18:18
35
35
I'm not sure about university IT departments, but in other areas, a user that does not have admin rights to a server cannot have a VM on that server with admin rights on the VM either. In other words, I've never worked in an IT department where this request would be granted. Something that would work in my experience is getting approval from your department or program for money for a virtual machine on a cloud service like AWS or Azure.
– Todd Wilcox
Mar 21 at 14:18
I'm not sure about university IT departments, but in other areas, a user that does not have admin rights to a server cannot have a VM on that server with admin rights on the VM either. In other words, I've never worked in an IT department where this request would be granted. Something that would work in my experience is getting approval from your department or program for money for a virtual machine on a cloud service like AWS or Azure.
– Todd Wilcox
Mar 21 at 14:18
3
3
@Todd: In principle, anything a user in as an admin guest OS can also be done as a user host OS. Depending on how the IT department models threats, this sort of request might be granted. Where things get problematic is with VM-based security systems. E.g., Windows 10 environment has a feature called Device/Credential Guard. This security feature tends to prevent VM software from functioning. Even if the IT department is willing to toggle the BIOS virtualization settings, they'll probably be far less willing to disable Device/Credential Guard.
– Brian
Mar 21 at 14:36
@Todd: In principle, anything a user in as an admin guest OS can also be done as a user host OS. Depending on how the IT department models threats, this sort of request might be granted. Where things get problematic is with VM-based security systems. E.g., Windows 10 environment has a feature called Device/Credential Guard. This security feature tends to prevent VM software from functioning. Even if the IT department is willing to toggle the BIOS virtualization settings, they'll probably be far less willing to disable Device/Credential Guard.
– Brian
Mar 21 at 14:36
2
2
If the only time you need admin rights is the installation then a singularity container should do the trick. One of these things; sylabs.io/docs afak they are cli only, but otherwise they are basically a virtual box with better pass through. You can set it up as admin on your own machine then move the image to the cluster and run it there as a normal user.
– Clumsy cat
Mar 21 at 18:16
If the only time you need admin rights is the installation then a singularity container should do the trick. One of these things; sylabs.io/docs afak they are cli only, but otherwise they are basically a virtual box with better pass through. You can set it up as admin on your own machine then move the image to the cluster and run it there as a normal user.
– Clumsy cat
Mar 21 at 18:16
6
6
@Todd Wilcox: As of a couple years ago, you could get a free student account on AWS. Depending on what the OP's computation needs are, that might serve.
– jamesqf
Mar 22 at 5:43
@Todd Wilcox: As of a couple years ago, you could get a free student account on AWS. Depending on what the OP's computation needs are, that might serve.
– jamesqf
Mar 22 at 5:43
1
1
Considering that a great many "servers" these days are virtualized to begin with, it's not that simple to ask for a VM any more. Nested virtualization has a whole lot of challenges. Also I don't understand what tools people are running that require admin permissions. I've worked on tons of clusters where I simply installed all my programs for the my user.
– Voo
Mar 22 at 18:18
Considering that a great many "servers" these days are virtualized to begin with, it's not that simple to ask for a VM any more. Nested virtualization has a whole lot of challenges. Also I don't understand what tools people are running that require admin permissions. I've worked on tons of clusters where I simply installed all my programs for the my user.
– Voo
Mar 22 at 18:18
|
show 3 more comments
I think this is a fairly common occurrence in many companies. There is a big disconnect between the researchers trying to do their work and the IT staff who may be under-resourced, under-trained or limited by administrative policy. In my experience there is often lots of worry about researchers installing software without fully understanding the security implications. In short, I would not expect you to be able to change this policy and it may well be in place for sound reasons.
One solution that has been suggested to me is that academics can apply for time using different cloud compute solutions (e.g. Google compute https://cloud.google.com/edu/, Microsoft Azure https://azure.microsoft.com/en-us/education/, any many more). If successful you will be given compute time in a virtual machine where you will have appropriate administrative rights to install any software you want.
Thank you for your reply. I understand your point, a lot of people just install random software without thinking through what it does to their computer (or the network the computer is connected to). The cloud is indeed a solution I did not immediately think of (I thought it was always a paying service, but I see that they also award grants for using the cloud in academic settings). I will definitely look into it!
– unit_with_a_soul
Mar 21 at 12:36
12
This might come in very handy but be aware that there might be data security implications. Uploading research data to anywhere outside of my institution's network, especially to US-based servers, could very much be a punishable offense where I work. Of course this might depend on the project, type of data etc and it might well go unnoticed, but it's worth mentioning I think.
– smcs
Mar 22 at 15:05
1
@speedymcs Absolutely. OP needs to get permission from the relevant people, in writing. One web app I maintain at my old university has to be restricted to one university building, and faculty who want to connect outside the building have to use the university's VPN. It's locked down even to me (VPN + 2-factor auth) as the developer. Universities take data exposure very seriously, so make sure you can actually use the data and protect it in the right way!
– Chris Cirefice
Mar 22 at 16:25
add a comment |
I think this is a fairly common occurrence in many companies. There is a big disconnect between the researchers trying to do their work and the IT staff who may be under-resourced, under-trained or limited by administrative policy. In my experience there is often lots of worry about researchers installing software without fully understanding the security implications. In short, I would not expect you to be able to change this policy and it may well be in place for sound reasons.
One solution that has been suggested to me is that academics can apply for time using different cloud compute solutions (e.g. Google compute https://cloud.google.com/edu/, Microsoft Azure https://azure.microsoft.com/en-us/education/, any many more). If successful you will be given compute time in a virtual machine where you will have appropriate administrative rights to install any software you want.
Thank you for your reply. I understand your point, a lot of people just install random software without thinking through what it does to their computer (or the network the computer is connected to). The cloud is indeed a solution I did not immediately think of (I thought it was always a paying service, but I see that they also award grants for using the cloud in academic settings). I will definitely look into it!
– unit_with_a_soul
Mar 21 at 12:36
12
This might come in very handy but be aware that there might be data security implications. Uploading research data to anywhere outside of my institution's network, especially to US-based servers, could very much be a punishable offense where I work. Of course this might depend on the project, type of data etc and it might well go unnoticed, but it's worth mentioning I think.
– smcs
Mar 22 at 15:05
1
@speedymcs Absolutely. OP needs to get permission from the relevant people, in writing. One web app I maintain at my old university has to be restricted to one university building, and faculty who want to connect outside the building have to use the university's VPN. It's locked down even to me (VPN + 2-factor auth) as the developer. Universities take data exposure very seriously, so make sure you can actually use the data and protect it in the right way!
– Chris Cirefice
Mar 22 at 16:25
add a comment |
I think this is a fairly common occurrence in many companies. There is a big disconnect between the researchers trying to do their work and the IT staff who may be under-resourced, under-trained or limited by administrative policy. In my experience there is often lots of worry about researchers installing software without fully understanding the security implications. In short, I would not expect you to be able to change this policy and it may well be in place for sound reasons.
One solution that has been suggested to me is that academics can apply for time using different cloud compute solutions (e.g. Google compute https://cloud.google.com/edu/, Microsoft Azure https://azure.microsoft.com/en-us/education/, any many more). If successful you will be given compute time in a virtual machine where you will have appropriate administrative rights to install any software you want.
I think this is a fairly common occurrence in many companies. There is a big disconnect between the researchers trying to do their work and the IT staff who may be under-resourced, under-trained or limited by administrative policy. In my experience there is often lots of worry about researchers installing software without fully understanding the security implications. In short, I would not expect you to be able to change this policy and it may well be in place for sound reasons.
One solution that has been suggested to me is that academics can apply for time using different cloud compute solutions (e.g. Google compute https://cloud.google.com/edu/, Microsoft Azure https://azure.microsoft.com/en-us/education/, any many more). If successful you will be given compute time in a virtual machine where you will have appropriate administrative rights to install any software you want.
answered Mar 21 at 9:06
tr1tr1
43326
43326
Thank you for your reply. I understand your point, a lot of people just install random software without thinking through what it does to their computer (or the network the computer is connected to). The cloud is indeed a solution I did not immediately think of (I thought it was always a paying service, but I see that they also award grants for using the cloud in academic settings). I will definitely look into it!
– unit_with_a_soul
Mar 21 at 12:36
12
This might come in very handy but be aware that there might be data security implications. Uploading research data to anywhere outside of my institution's network, especially to US-based servers, could very much be a punishable offense where I work. Of course this might depend on the project, type of data etc and it might well go unnoticed, but it's worth mentioning I think.
– smcs
Mar 22 at 15:05
1
@speedymcs Absolutely. OP needs to get permission from the relevant people, in writing. One web app I maintain at my old university has to be restricted to one university building, and faculty who want to connect outside the building have to use the university's VPN. It's locked down even to me (VPN + 2-factor auth) as the developer. Universities take data exposure very seriously, so make sure you can actually use the data and protect it in the right way!
– Chris Cirefice
Mar 22 at 16:25
add a comment |
Thank you for your reply. I understand your point, a lot of people just install random software without thinking through what it does to their computer (or the network the computer is connected to). The cloud is indeed a solution I did not immediately think of (I thought it was always a paying service, but I see that they also award grants for using the cloud in academic settings). I will definitely look into it!
– unit_with_a_soul
Mar 21 at 12:36
12
This might come in very handy but be aware that there might be data security implications. Uploading research data to anywhere outside of my institution's network, especially to US-based servers, could very much be a punishable offense where I work. Of course this might depend on the project, type of data etc and it might well go unnoticed, but it's worth mentioning I think.
– smcs
Mar 22 at 15:05
1
@speedymcs Absolutely. OP needs to get permission from the relevant people, in writing. One web app I maintain at my old university has to be restricted to one university building, and faculty who want to connect outside the building have to use the university's VPN. It's locked down even to me (VPN + 2-factor auth) as the developer. Universities take data exposure very seriously, so make sure you can actually use the data and protect it in the right way!
– Chris Cirefice
Mar 22 at 16:25
Thank you for your reply. I understand your point, a lot of people just install random software without thinking through what it does to their computer (or the network the computer is connected to). The cloud is indeed a solution I did not immediately think of (I thought it was always a paying service, but I see that they also award grants for using the cloud in academic settings). I will definitely look into it!
– unit_with_a_soul
Mar 21 at 12:36
Thank you for your reply. I understand your point, a lot of people just install random software without thinking through what it does to their computer (or the network the computer is connected to). The cloud is indeed a solution I did not immediately think of (I thought it was always a paying service, but I see that they also award grants for using the cloud in academic settings). I will definitely look into it!
– unit_with_a_soul
Mar 21 at 12:36
12
12
This might come in very handy but be aware that there might be data security implications. Uploading research data to anywhere outside of my institution's network, especially to US-based servers, could very much be a punishable offense where I work. Of course this might depend on the project, type of data etc and it might well go unnoticed, but it's worth mentioning I think.
– smcs
Mar 22 at 15:05
This might come in very handy but be aware that there might be data security implications. Uploading research data to anywhere outside of my institution's network, especially to US-based servers, could very much be a punishable offense where I work. Of course this might depend on the project, type of data etc and it might well go unnoticed, but it's worth mentioning I think.
– smcs
Mar 22 at 15:05
1
1
@speedymcs Absolutely. OP needs to get permission from the relevant people, in writing. One web app I maintain at my old university has to be restricted to one university building, and faculty who want to connect outside the building have to use the university's VPN. It's locked down even to me (VPN + 2-factor auth) as the developer. Universities take data exposure very seriously, so make sure you can actually use the data and protect it in the right way!
– Chris Cirefice
Mar 22 at 16:25
@speedymcs Absolutely. OP needs to get permission from the relevant people, in writing. One web app I maintain at my old university has to be restricted to one university building, and faculty who want to connect outside the building have to use the university's VPN. It's locked down even to me (VPN + 2-factor auth) as the developer. Universities take data exposure very seriously, so make sure you can actually use the data and protect it in the right way!
– Chris Cirefice
Mar 22 at 16:25
add a comment |
We had this issue with some Silicon Graphics machines - we removed them from the IT department's control, with the support of the supervisors whose budgets had paid for them, and then controlled everything ourselves.
It went much better; we had more uptime and fewer issues than any other group / team on campus.
We learnt a lot about compiling & installing etc.
Not sure if you can go that route.
Note, the software we were using was CFD and the IT dept had no experience of what was needed.
Thank you for your response. Well, the problem is indeed that it is not possible for us to separate ourselves from IT using budget. The infrastructure we are working on belongs to the university, and the maintenance is a job for department IT. We indeed try to do as much as possible when it comes to the software we use (and this indeed works quite well), but being completely free from IT is really difficult I think.
– unit_with_a_soul
Mar 21 at 12:31
10
How long ago was this? Today, I'd expect the response to be that the IT support team can't afford for you to be the ones who learn a lot about what happens when you get hacked. Also, nothing in the question suggests that there's money available for duplicating facilities provided by the department. (The asker is using central resources, not resources that belong to the group but which are centrally managed.)
– David Richerby
Mar 21 at 19:10
@DavidRicherby They were on an internal network - no external hacking possible.... Funding was by particular research projects not "central" .... Unless you can hack via the power cord...
– Solar Mike
Mar 21 at 19:24
2
@DavidRicherby It's extremely rare in the US to not have group computers self managed, where the only thing IT requires is current antimalware. They're going to have to adapt quick: had several cases recently where instead of using a university HPC cluster, we just went to Amazon AWS or Microsoft Azure since there you install anything you want on your VM, get the right amount of RAM, cores, storage and GPU, and don't have to wait in line.
– user71659
Mar 21 at 22:54
1
@SolarMike An air-gapped internal network also means no network-based software updates (and burning a CD to run an update is a pain), installing extra software and the prerequisites for the software is difficult, getting to a login prompt is usually hard. Email and network shares are out of the question. Unless you're running FISMA-high data, I would not recommend going in this route.
– Doug O'Neal
Mar 22 at 19:03
|
show 3 more comments
We had this issue with some Silicon Graphics machines - we removed them from the IT department's control, with the support of the supervisors whose budgets had paid for them, and then controlled everything ourselves.
It went much better; we had more uptime and fewer issues than any other group / team on campus.
We learnt a lot about compiling & installing etc.
Not sure if you can go that route.
Note, the software we were using was CFD and the IT dept had no experience of what was needed.
Thank you for your response. Well, the problem is indeed that it is not possible for us to separate ourselves from IT using budget. The infrastructure we are working on belongs to the university, and the maintenance is a job for department IT. We indeed try to do as much as possible when it comes to the software we use (and this indeed works quite well), but being completely free from IT is really difficult I think.
– unit_with_a_soul
Mar 21 at 12:31
10
How long ago was this? Today, I'd expect the response to be that the IT support team can't afford for you to be the ones who learn a lot about what happens when you get hacked. Also, nothing in the question suggests that there's money available for duplicating facilities provided by the department. (The asker is using central resources, not resources that belong to the group but which are centrally managed.)
– David Richerby
Mar 21 at 19:10
@DavidRicherby They were on an internal network - no external hacking possible.... Funding was by particular research projects not "central" .... Unless you can hack via the power cord...
– Solar Mike
Mar 21 at 19:24
2
@DavidRicherby It's extremely rare in the US to not have group computers self managed, where the only thing IT requires is current antimalware. They're going to have to adapt quick: had several cases recently where instead of using a university HPC cluster, we just went to Amazon AWS or Microsoft Azure since there you install anything you want on your VM, get the right amount of RAM, cores, storage and GPU, and don't have to wait in line.
– user71659
Mar 21 at 22:54
1
@SolarMike An air-gapped internal network also means no network-based software updates (and burning a CD to run an update is a pain), installing extra software and the prerequisites for the software is difficult, getting to a login prompt is usually hard. Email and network shares are out of the question. Unless you're running FISMA-high data, I would not recommend going in this route.
– Doug O'Neal
Mar 22 at 19:03
|
show 3 more comments
We had this issue with some Silicon Graphics machines - we removed them from the IT department's control, with the support of the supervisors whose budgets had paid for them, and then controlled everything ourselves.
It went much better; we had more uptime and fewer issues than any other group / team on campus.
We learnt a lot about compiling & installing etc.
Not sure if you can go that route.
Note, the software we were using was CFD and the IT dept had no experience of what was needed.
We had this issue with some Silicon Graphics machines - we removed them from the IT department's control, with the support of the supervisors whose budgets had paid for them, and then controlled everything ourselves.
It went much better; we had more uptime and fewer issues than any other group / team on campus.
We learnt a lot about compiling & installing etc.
Not sure if you can go that route.
Note, the software we were using was CFD and the IT dept had no experience of what was needed.
edited Mar 22 at 18:59
RJFalconer
1072
1072
answered Mar 21 at 8:47
Solar MikeSolar Mike
14.6k52653
14.6k52653
Thank you for your response. Well, the problem is indeed that it is not possible for us to separate ourselves from IT using budget. The infrastructure we are working on belongs to the university, and the maintenance is a job for department IT. We indeed try to do as much as possible when it comes to the software we use (and this indeed works quite well), but being completely free from IT is really difficult I think.
– unit_with_a_soul
Mar 21 at 12:31
10
How long ago was this? Today, I'd expect the response to be that the IT support team can't afford for you to be the ones who learn a lot about what happens when you get hacked. Also, nothing in the question suggests that there's money available for duplicating facilities provided by the department. (The asker is using central resources, not resources that belong to the group but which are centrally managed.)
– David Richerby
Mar 21 at 19:10
@DavidRicherby They were on an internal network - no external hacking possible.... Funding was by particular research projects not "central" .... Unless you can hack via the power cord...
– Solar Mike
Mar 21 at 19:24
2
@DavidRicherby It's extremely rare in the US to not have group computers self managed, where the only thing IT requires is current antimalware. They're going to have to adapt quick: had several cases recently where instead of using a university HPC cluster, we just went to Amazon AWS or Microsoft Azure since there you install anything you want on your VM, get the right amount of RAM, cores, storage and GPU, and don't have to wait in line.
– user71659
Mar 21 at 22:54
1
@SolarMike An air-gapped internal network also means no network-based software updates (and burning a CD to run an update is a pain), installing extra software and the prerequisites for the software is difficult, getting to a login prompt is usually hard. Email and network shares are out of the question. Unless you're running FISMA-high data, I would not recommend going in this route.
– Doug O'Neal
Mar 22 at 19:03
|
show 3 more comments
Thank you for your response. Well, the problem is indeed that it is not possible for us to separate ourselves from IT using budget. The infrastructure we are working on belongs to the university, and the maintenance is a job for department IT. We indeed try to do as much as possible when it comes to the software we use (and this indeed works quite well), but being completely free from IT is really difficult I think.
– unit_with_a_soul
Mar 21 at 12:31
10
How long ago was this? Today, I'd expect the response to be that the IT support team can't afford for you to be the ones who learn a lot about what happens when you get hacked. Also, nothing in the question suggests that there's money available for duplicating facilities provided by the department. (The asker is using central resources, not resources that belong to the group but which are centrally managed.)
– David Richerby
Mar 21 at 19:10
@DavidRicherby They were on an internal network - no external hacking possible.... Funding was by particular research projects not "central" .... Unless you can hack via the power cord...
– Solar Mike
Mar 21 at 19:24
2
@DavidRicherby It's extremely rare in the US to not have group computers self managed, where the only thing IT requires is current antimalware. They're going to have to adapt quick: had several cases recently where instead of using a university HPC cluster, we just went to Amazon AWS or Microsoft Azure since there you install anything you want on your VM, get the right amount of RAM, cores, storage and GPU, and don't have to wait in line.
– user71659
Mar 21 at 22:54
1
@SolarMike An air-gapped internal network also means no network-based software updates (and burning a CD to run an update is a pain), installing extra software and the prerequisites for the software is difficult, getting to a login prompt is usually hard. Email and network shares are out of the question. Unless you're running FISMA-high data, I would not recommend going in this route.
– Doug O'Neal
Mar 22 at 19:03
Thank you for your response. Well, the problem is indeed that it is not possible for us to separate ourselves from IT using budget. The infrastructure we are working on belongs to the university, and the maintenance is a job for department IT. We indeed try to do as much as possible when it comes to the software we use (and this indeed works quite well), but being completely free from IT is really difficult I think.
– unit_with_a_soul
Mar 21 at 12:31
Thank you for your response. Well, the problem is indeed that it is not possible for us to separate ourselves from IT using budget. The infrastructure we are working on belongs to the university, and the maintenance is a job for department IT. We indeed try to do as much as possible when it comes to the software we use (and this indeed works quite well), but being completely free from IT is really difficult I think.
– unit_with_a_soul
Mar 21 at 12:31
10
10
How long ago was this? Today, I'd expect the response to be that the IT support team can't afford for you to be the ones who learn a lot about what happens when you get hacked. Also, nothing in the question suggests that there's money available for duplicating facilities provided by the department. (The asker is using central resources, not resources that belong to the group but which are centrally managed.)
– David Richerby
Mar 21 at 19:10
How long ago was this? Today, I'd expect the response to be that the IT support team can't afford for you to be the ones who learn a lot about what happens when you get hacked. Also, nothing in the question suggests that there's money available for duplicating facilities provided by the department. (The asker is using central resources, not resources that belong to the group but which are centrally managed.)
– David Richerby
Mar 21 at 19:10
@DavidRicherby They were on an internal network - no external hacking possible.... Funding was by particular research projects not "central" .... Unless you can hack via the power cord...
– Solar Mike
Mar 21 at 19:24
@DavidRicherby They were on an internal network - no external hacking possible.... Funding was by particular research projects not "central" .... Unless you can hack via the power cord...
– Solar Mike
Mar 21 at 19:24
2
2
@DavidRicherby It's extremely rare in the US to not have group computers self managed, where the only thing IT requires is current antimalware. They're going to have to adapt quick: had several cases recently where instead of using a university HPC cluster, we just went to Amazon AWS or Microsoft Azure since there you install anything you want on your VM, get the right amount of RAM, cores, storage and GPU, and don't have to wait in line.
– user71659
Mar 21 at 22:54
@DavidRicherby It's extremely rare in the US to not have group computers self managed, where the only thing IT requires is current antimalware. They're going to have to adapt quick: had several cases recently where instead of using a university HPC cluster, we just went to Amazon AWS or Microsoft Azure since there you install anything you want on your VM, get the right amount of RAM, cores, storage and GPU, and don't have to wait in line.
– user71659
Mar 21 at 22:54
1
1
@SolarMike An air-gapped internal network also means no network-based software updates (and burning a CD to run an update is a pain), installing extra software and the prerequisites for the software is difficult, getting to a login prompt is usually hard. Email and network shares are out of the question. Unless you're running FISMA-high data, I would not recommend going in this route.
– Doug O'Neal
Mar 22 at 19:03
@SolarMike An air-gapped internal network also means no network-based software updates (and burning a CD to run an update is a pain), installing extra software and the prerequisites for the software is difficult, getting to a login prompt is usually hard. Email and network shares are out of the question. Unless you're running FISMA-high data, I would not recommend going in this route.
– Doug O'Neal
Mar 22 at 19:03
|
show 3 more comments
Whilst others have focused on giving you some technical advice on alternatives to using your institution's infrastructure, I want to note that your problems are not uncommon. In my practice I opted to installing the software myself (a lot of software packets I used do not need root privileges for installation, make sure that admin access for yours is really a must) or asked supervisor for help.
If you are on good terms with your supervisor, you can always ask him for help, going from as little as cc-ing him in software installation emails that you send to your IT department to directly asking him for help when those request emails are ignored. In many organizations it's not easy for junior members to be listened to and that's just something you have to get over with.
Thank your for answering. Yes, I execute several applications as 'non elevated' user because that will give me what I need in most programs. My supervisor is indeed a big help and, for now, asking the supervisor is the best workaround. Yes, I understand that this is not a rare problem, especially for new employees like myself. However, what annoys me is that the things I ask are really not that difficult. I'm usually merely asking to install a certain software update or library that could come in handy, which is not something that takes weeks to complete.
– unit_with_a_soul
Mar 21 at 12:45
4
Upvoting for the second part here - always CC someone with more leverage whenever you report issues. Just that frequently moves it up in priority a surprising amount.
– user2699
Mar 21 at 14:03
1
Will chime in that as an admin (non-IT), receiving a cc with the PI is essentially "failing at your job". It is the form of accountability that staff relies on. So as much as we groan when we are at fault, it's absolutely the go-to for reminding other staff that we aren't doing this for our health--other, more important people care about this too. We have a million competing priorities, so unfortunately the squeaky wheel gets the oil... running from emergency to emergency...
– yourfriendlyresearchadmin
Mar 22 at 5:14
Upvoting for the second part here. On the one hand, it is your advisor's job to make sure you have the IT resources you need. On the other hand, your advisor has actual leverage with the IT admins; you don't. Always CC your advisor, and ask your advisor to follow up immediately with "I concur with / approve this request."
– JeffE
Mar 22 at 9:02
add a comment |
Whilst others have focused on giving you some technical advice on alternatives to using your institution's infrastructure, I want to note that your problems are not uncommon. In my practice I opted to installing the software myself (a lot of software packets I used do not need root privileges for installation, make sure that admin access for yours is really a must) or asked supervisor for help.
If you are on good terms with your supervisor, you can always ask him for help, going from as little as cc-ing him in software installation emails that you send to your IT department to directly asking him for help when those request emails are ignored. In many organizations it's not easy for junior members to be listened to and that's just something you have to get over with.
Thank your for answering. Yes, I execute several applications as 'non elevated' user because that will give me what I need in most programs. My supervisor is indeed a big help and, for now, asking the supervisor is the best workaround. Yes, I understand that this is not a rare problem, especially for new employees like myself. However, what annoys me is that the things I ask are really not that difficult. I'm usually merely asking to install a certain software update or library that could come in handy, which is not something that takes weeks to complete.
– unit_with_a_soul
Mar 21 at 12:45
4
Upvoting for the second part here - always CC someone with more leverage whenever you report issues. Just that frequently moves it up in priority a surprising amount.
– user2699
Mar 21 at 14:03
1
Will chime in that as an admin (non-IT), receiving a cc with the PI is essentially "failing at your job". It is the form of accountability that staff relies on. So as much as we groan when we are at fault, it's absolutely the go-to for reminding other staff that we aren't doing this for our health--other, more important people care about this too. We have a million competing priorities, so unfortunately the squeaky wheel gets the oil... running from emergency to emergency...
– yourfriendlyresearchadmin
Mar 22 at 5:14
Upvoting for the second part here. On the one hand, it is your advisor's job to make sure you have the IT resources you need. On the other hand, your advisor has actual leverage with the IT admins; you don't. Always CC your advisor, and ask your advisor to follow up immediately with "I concur with / approve this request."
– JeffE
Mar 22 at 9:02
add a comment |
Whilst others have focused on giving you some technical advice on alternatives to using your institution's infrastructure, I want to note that your problems are not uncommon. In my practice I opted to installing the software myself (a lot of software packets I used do not need root privileges for installation, make sure that admin access for yours is really a must) or asked supervisor for help.
If you are on good terms with your supervisor, you can always ask him for help, going from as little as cc-ing him in software installation emails that you send to your IT department to directly asking him for help when those request emails are ignored. In many organizations it's not easy for junior members to be listened to and that's just something you have to get over with.
Whilst others have focused on giving you some technical advice on alternatives to using your institution's infrastructure, I want to note that your problems are not uncommon. In my practice I opted to installing the software myself (a lot of software packets I used do not need root privileges for installation, make sure that admin access for yours is really a must) or asked supervisor for help.
If you are on good terms with your supervisor, you can always ask him for help, going from as little as cc-ing him in software installation emails that you send to your IT department to directly asking him for help when those request emails are ignored. In many organizations it's not easy for junior members to be listened to and that's just something you have to get over with.
edited Mar 21 at 11:13
answered Mar 21 at 11:05
lukeglukeg
3,3462728
3,3462728
Thank your for answering. Yes, I execute several applications as 'non elevated' user because that will give me what I need in most programs. My supervisor is indeed a big help and, for now, asking the supervisor is the best workaround. Yes, I understand that this is not a rare problem, especially for new employees like myself. However, what annoys me is that the things I ask are really not that difficult. I'm usually merely asking to install a certain software update or library that could come in handy, which is not something that takes weeks to complete.
– unit_with_a_soul
Mar 21 at 12:45
4
Upvoting for the second part here - always CC someone with more leverage whenever you report issues. Just that frequently moves it up in priority a surprising amount.
– user2699
Mar 21 at 14:03
1
Will chime in that as an admin (non-IT), receiving a cc with the PI is essentially "failing at your job". It is the form of accountability that staff relies on. So as much as we groan when we are at fault, it's absolutely the go-to for reminding other staff that we aren't doing this for our health--other, more important people care about this too. We have a million competing priorities, so unfortunately the squeaky wheel gets the oil... running from emergency to emergency...
– yourfriendlyresearchadmin
Mar 22 at 5:14
Upvoting for the second part here. On the one hand, it is your advisor's job to make sure you have the IT resources you need. On the other hand, your advisor has actual leverage with the IT admins; you don't. Always CC your advisor, and ask your advisor to follow up immediately with "I concur with / approve this request."
– JeffE
Mar 22 at 9:02
add a comment |
Thank your for answering. Yes, I execute several applications as 'non elevated' user because that will give me what I need in most programs. My supervisor is indeed a big help and, for now, asking the supervisor is the best workaround. Yes, I understand that this is not a rare problem, especially for new employees like myself. However, what annoys me is that the things I ask are really not that difficult. I'm usually merely asking to install a certain software update or library that could come in handy, which is not something that takes weeks to complete.
– unit_with_a_soul
Mar 21 at 12:45
4
Upvoting for the second part here - always CC someone with more leverage whenever you report issues. Just that frequently moves it up in priority a surprising amount.
– user2699
Mar 21 at 14:03
1
Will chime in that as an admin (non-IT), receiving a cc with the PI is essentially "failing at your job". It is the form of accountability that staff relies on. So as much as we groan when we are at fault, it's absolutely the go-to for reminding other staff that we aren't doing this for our health--other, more important people care about this too. We have a million competing priorities, so unfortunately the squeaky wheel gets the oil... running from emergency to emergency...
– yourfriendlyresearchadmin
Mar 22 at 5:14
Upvoting for the second part here. On the one hand, it is your advisor's job to make sure you have the IT resources you need. On the other hand, your advisor has actual leverage with the IT admins; you don't. Always CC your advisor, and ask your advisor to follow up immediately with "I concur with / approve this request."
– JeffE
Mar 22 at 9:02
Thank your for answering. Yes, I execute several applications as 'non elevated' user because that will give me what I need in most programs. My supervisor is indeed a big help and, for now, asking the supervisor is the best workaround. Yes, I understand that this is not a rare problem, especially for new employees like myself. However, what annoys me is that the things I ask are really not that difficult. I'm usually merely asking to install a certain software update or library that could come in handy, which is not something that takes weeks to complete.
– unit_with_a_soul
Mar 21 at 12:45
Thank your for answering. Yes, I execute several applications as 'non elevated' user because that will give me what I need in most programs. My supervisor is indeed a big help and, for now, asking the supervisor is the best workaround. Yes, I understand that this is not a rare problem, especially for new employees like myself. However, what annoys me is that the things I ask are really not that difficult. I'm usually merely asking to install a certain software update or library that could come in handy, which is not something that takes weeks to complete.
– unit_with_a_soul
Mar 21 at 12:45
4
4
Upvoting for the second part here - always CC someone with more leverage whenever you report issues. Just that frequently moves it up in priority a surprising amount.
– user2699
Mar 21 at 14:03
Upvoting for the second part here - always CC someone with more leverage whenever you report issues. Just that frequently moves it up in priority a surprising amount.
– user2699
Mar 21 at 14:03
1
1
Will chime in that as an admin (non-IT), receiving a cc with the PI is essentially "failing at your job". It is the form of accountability that staff relies on. So as much as we groan when we are at fault, it's absolutely the go-to for reminding other staff that we aren't doing this for our health--other, more important people care about this too. We have a million competing priorities, so unfortunately the squeaky wheel gets the oil... running from emergency to emergency...
– yourfriendlyresearchadmin
Mar 22 at 5:14
Will chime in that as an admin (non-IT), receiving a cc with the PI is essentially "failing at your job". It is the form of accountability that staff relies on. So as much as we groan when we are at fault, it's absolutely the go-to for reminding other staff that we aren't doing this for our health--other, more important people care about this too. We have a million competing priorities, so unfortunately the squeaky wheel gets the oil... running from emergency to emergency...
– yourfriendlyresearchadmin
Mar 22 at 5:14
Upvoting for the second part here. On the one hand, it is your advisor's job to make sure you have the IT resources you need. On the other hand, your advisor has actual leverage with the IT admins; you don't. Always CC your advisor, and ask your advisor to follow up immediately with "I concur with / approve this request."
– JeffE
Mar 22 at 9:02
Upvoting for the second part here. On the one hand, it is your advisor's job to make sure you have the IT resources you need. On the other hand, your advisor has actual leverage with the IT admins; you don't. Always CC your advisor, and ask your advisor to follow up immediately with "I concur with / approve this request."
– JeffE
Mar 22 at 9:02
add a comment |
At many universities, you can actually go through a (rather secret) bureaucratic process that allows you to install your own software on the university computer, even though this is not the default option.
If this option exists, it will likely include signing forms that may limit (or even eliminate) future IT support for that computer. Basically, you are agreeing to be your own IT in exchange for flexibility. However, if you are constantly downloading software it is often worth it.
The University doesn't want to encourage this option, because it can be a perceived security risk, so you will have to directly ask administrators in your department and IT, if this option is available, as it likely won't be published online anywhere. And you may have to assertively push for it.
This process was available to me at two of the three universities I've been based at over the years (in the USA and Australia). The one that didn't allow it actually theoretically did, but the form also said that you would no longer be able to connect to the Universities wired internet network, which wasn't worth giving up for me. Read the forms very carefully before you go down this route to make sure you are comfortable with the tradeoff you are making.
1
Upvoted and agreed. I was at my current academic position for about 10 years before I accidentally discovered (arising from similar complaint to my chair) that we could request having my office computer be "unlocked" so I could install my own software. Meanwhile, my chair was surprised that this hadn't been done for me years earlier (CS department here).
– Daniel R. Collins
2 days ago
add a comment |
At many universities, you can actually go through a (rather secret) bureaucratic process that allows you to install your own software on the university computer, even though this is not the default option.
If this option exists, it will likely include signing forms that may limit (or even eliminate) future IT support for that computer. Basically, you are agreeing to be your own IT in exchange for flexibility. However, if you are constantly downloading software it is often worth it.
The University doesn't want to encourage this option, because it can be a perceived security risk, so you will have to directly ask administrators in your department and IT, if this option is available, as it likely won't be published online anywhere. And you may have to assertively push for it.
This process was available to me at two of the three universities I've been based at over the years (in the USA and Australia). The one that didn't allow it actually theoretically did, but the form also said that you would no longer be able to connect to the Universities wired internet network, which wasn't worth giving up for me. Read the forms very carefully before you go down this route to make sure you are comfortable with the tradeoff you are making.
1
Upvoted and agreed. I was at my current academic position for about 10 years before I accidentally discovered (arising from similar complaint to my chair) that we could request having my office computer be "unlocked" so I could install my own software. Meanwhile, my chair was surprised that this hadn't been done for me years earlier (CS department here).
– Daniel R. Collins
2 days ago
add a comment |
At many universities, you can actually go through a (rather secret) bureaucratic process that allows you to install your own software on the university computer, even though this is not the default option.
If this option exists, it will likely include signing forms that may limit (or even eliminate) future IT support for that computer. Basically, you are agreeing to be your own IT in exchange for flexibility. However, if you are constantly downloading software it is often worth it.
The University doesn't want to encourage this option, because it can be a perceived security risk, so you will have to directly ask administrators in your department and IT, if this option is available, as it likely won't be published online anywhere. And you may have to assertively push for it.
This process was available to me at two of the three universities I've been based at over the years (in the USA and Australia). The one that didn't allow it actually theoretically did, but the form also said that you would no longer be able to connect to the Universities wired internet network, which wasn't worth giving up for me. Read the forms very carefully before you go down this route to make sure you are comfortable with the tradeoff you are making.
At many universities, you can actually go through a (rather secret) bureaucratic process that allows you to install your own software on the university computer, even though this is not the default option.
If this option exists, it will likely include signing forms that may limit (or even eliminate) future IT support for that computer. Basically, you are agreeing to be your own IT in exchange for flexibility. However, if you are constantly downloading software it is often worth it.
The University doesn't want to encourage this option, because it can be a perceived security risk, so you will have to directly ask administrators in your department and IT, if this option is available, as it likely won't be published online anywhere. And you may have to assertively push for it.
This process was available to me at two of the three universities I've been based at over the years (in the USA and Australia). The one that didn't allow it actually theoretically did, but the form also said that you would no longer be able to connect to the Universities wired internet network, which wasn't worth giving up for me. Read the forms very carefully before you go down this route to make sure you are comfortable with the tradeoff you are making.
answered Mar 22 at 4:02
WetlabStudentWetlabStudent
6,21532446
6,21532446
1
Upvoted and agreed. I was at my current academic position for about 10 years before I accidentally discovered (arising from similar complaint to my chair) that we could request having my office computer be "unlocked" so I could install my own software. Meanwhile, my chair was surprised that this hadn't been done for me years earlier (CS department here).
– Daniel R. Collins
2 days ago
add a comment |
1
Upvoted and agreed. I was at my current academic position for about 10 years before I accidentally discovered (arising from similar complaint to my chair) that we could request having my office computer be "unlocked" so I could install my own software. Meanwhile, my chair was surprised that this hadn't been done for me years earlier (CS department here).
– Daniel R. Collins
2 days ago
1
1
Upvoted and agreed. I was at my current academic position for about 10 years before I accidentally discovered (arising from similar complaint to my chair) that we could request having my office computer be "unlocked" so I could install my own software. Meanwhile, my chair was surprised that this hadn't been done for me years earlier (CS department here).
– Daniel R. Collins
2 days ago
Upvoted and agreed. I was at my current academic position for about 10 years before I accidentally discovered (arising from similar complaint to my chair) that we could request having my office computer be "unlocked" so I could install my own software. Meanwhile, my chair was surprised that this hadn't been done for me years earlier (CS department here).
– Daniel R. Collins
2 days ago
add a comment |
Since you're not in a "tech-oriented PhD", I'm guessing the cluster is 10 machines or less? If so, consider setting up your own cluster on any of the big cloud providers. AWS and Azure come to mind, but Google and IBM are still trying to hang on in those markets.
Thoughts on pricing:
- You don't have to have the cluster up all the time, so you don't have to pay for 24hrs/day for a full month. You would have to figure out how to save/load the data and install some programs quickly (docker?), if you opt for shutting down some or all servers.
- If you have fellow students or professors who are in the same boat, consider sharing your cluster and its expenses.
- Depending on your research, you might (eventually) be able to get special pricing from some vendors.
- On AWS, reserved instances are cheaper than spot instances.
Look at how much your time is worth, and how much these delays are impacting your research. If IT delays cost you 1 week of delays every month, then it's probably worth setting up things yourself. (Remember to back things up, and test your backup strategy. Put your code and data in github)
And lastly, are you using their ticketing system for your requests, or just asking them verbally? If there's no ticket, it'll surely be forgotten 5 minutes after you spoke to them.
New contributor
2
This answer may apply, but I don't see where you take the logical step from “not-tech-oriented” to “probably cluster <10 nodes”. In fact, to me, needing a cluster at all while not doing tech actually suggest more likely that lots of nodes are involved. Science or data science applications tend to be really computation intensive. Furthermore, many of these applications are quite latency-critical and only perform properly when run on an actual physical cluster with native MPI support and a suitable file system like Lustre.
– leftaroundabout
Mar 23 at 0:02
Doesn't AWS EMR allow for there to be clustering on demand in this case?
– lucasgcb
2 days ago
add a comment |
Since you're not in a "tech-oriented PhD", I'm guessing the cluster is 10 machines or less? If so, consider setting up your own cluster on any of the big cloud providers. AWS and Azure come to mind, but Google and IBM are still trying to hang on in those markets.
Thoughts on pricing:
- You don't have to have the cluster up all the time, so you don't have to pay for 24hrs/day for a full month. You would have to figure out how to save/load the data and install some programs quickly (docker?), if you opt for shutting down some or all servers.
- If you have fellow students or professors who are in the same boat, consider sharing your cluster and its expenses.
- Depending on your research, you might (eventually) be able to get special pricing from some vendors.
- On AWS, reserved instances are cheaper than spot instances.
Look at how much your time is worth, and how much these delays are impacting your research. If IT delays cost you 1 week of delays every month, then it's probably worth setting up things yourself. (Remember to back things up, and test your backup strategy. Put your code and data in github)
And lastly, are you using their ticketing system for your requests, or just asking them verbally? If there's no ticket, it'll surely be forgotten 5 minutes after you spoke to them.
New contributor
2
This answer may apply, but I don't see where you take the logical step from “not-tech-oriented” to “probably cluster <10 nodes”. In fact, to me, needing a cluster at all while not doing tech actually suggest more likely that lots of nodes are involved. Science or data science applications tend to be really computation intensive. Furthermore, many of these applications are quite latency-critical and only perform properly when run on an actual physical cluster with native MPI support and a suitable file system like Lustre.
– leftaroundabout
Mar 23 at 0:02
Doesn't AWS EMR allow for there to be clustering on demand in this case?
– lucasgcb
2 days ago
add a comment |
Since you're not in a "tech-oriented PhD", I'm guessing the cluster is 10 machines or less? If so, consider setting up your own cluster on any of the big cloud providers. AWS and Azure come to mind, but Google and IBM are still trying to hang on in those markets.
Thoughts on pricing:
- You don't have to have the cluster up all the time, so you don't have to pay for 24hrs/day for a full month. You would have to figure out how to save/load the data and install some programs quickly (docker?), if you opt for shutting down some or all servers.
- If you have fellow students or professors who are in the same boat, consider sharing your cluster and its expenses.
- Depending on your research, you might (eventually) be able to get special pricing from some vendors.
- On AWS, reserved instances are cheaper than spot instances.
Look at how much your time is worth, and how much these delays are impacting your research. If IT delays cost you 1 week of delays every month, then it's probably worth setting up things yourself. (Remember to back things up, and test your backup strategy. Put your code and data in github)
And lastly, are you using their ticketing system for your requests, or just asking them verbally? If there's no ticket, it'll surely be forgotten 5 minutes after you spoke to them.
New contributor
Since you're not in a "tech-oriented PhD", I'm guessing the cluster is 10 machines or less? If so, consider setting up your own cluster on any of the big cloud providers. AWS and Azure come to mind, but Google and IBM are still trying to hang on in those markets.
Thoughts on pricing:
- You don't have to have the cluster up all the time, so you don't have to pay for 24hrs/day for a full month. You would have to figure out how to save/load the data and install some programs quickly (docker?), if you opt for shutting down some or all servers.
- If you have fellow students or professors who are in the same boat, consider sharing your cluster and its expenses.
- Depending on your research, you might (eventually) be able to get special pricing from some vendors.
- On AWS, reserved instances are cheaper than spot instances.
Look at how much your time is worth, and how much these delays are impacting your research. If IT delays cost you 1 week of delays every month, then it's probably worth setting up things yourself. (Remember to back things up, and test your backup strategy. Put your code and data in github)
And lastly, are you using their ticketing system for your requests, or just asking them verbally? If there's no ticket, it'll surely be forgotten 5 minutes after you spoke to them.
New contributor
New contributor
answered Mar 22 at 0:02
TomEberhardTomEberhard
1712
1712
New contributor
New contributor
2
This answer may apply, but I don't see where you take the logical step from “not-tech-oriented” to “probably cluster <10 nodes”. In fact, to me, needing a cluster at all while not doing tech actually suggest more likely that lots of nodes are involved. Science or data science applications tend to be really computation intensive. Furthermore, many of these applications are quite latency-critical and only perform properly when run on an actual physical cluster with native MPI support and a suitable file system like Lustre.
– leftaroundabout
Mar 23 at 0:02
Doesn't AWS EMR allow for there to be clustering on demand in this case?
– lucasgcb
2 days ago
add a comment |
2
This answer may apply, but I don't see where you take the logical step from “not-tech-oriented” to “probably cluster <10 nodes”. In fact, to me, needing a cluster at all while not doing tech actually suggest more likely that lots of nodes are involved. Science or data science applications tend to be really computation intensive. Furthermore, many of these applications are quite latency-critical and only perform properly when run on an actual physical cluster with native MPI support and a suitable file system like Lustre.
– leftaroundabout
Mar 23 at 0:02
Doesn't AWS EMR allow for there to be clustering on demand in this case?
– lucasgcb
2 days ago
2
2
This answer may apply, but I don't see where you take the logical step from “not-tech-oriented” to “probably cluster <10 nodes”. In fact, to me, needing a cluster at all while not doing tech actually suggest more likely that lots of nodes are involved. Science or data science applications tend to be really computation intensive. Furthermore, many of these applications are quite latency-critical and only perform properly when run on an actual physical cluster with native MPI support and a suitable file system like Lustre.
– leftaroundabout
Mar 23 at 0:02
This answer may apply, but I don't see where you take the logical step from “not-tech-oriented” to “probably cluster <10 nodes”. In fact, to me, needing a cluster at all while not doing tech actually suggest more likely that lots of nodes are involved. Science or data science applications tend to be really computation intensive. Furthermore, many of these applications are quite latency-critical and only perform properly when run on an actual physical cluster with native MPI support and a suitable file system like Lustre.
– leftaroundabout
Mar 23 at 0:02
Doesn't AWS EMR allow for there to be clustering on demand in this case?
– lucasgcb
2 days ago
Doesn't AWS EMR allow for there to be clustering on demand in this case?
– lucasgcb
2 days ago
add a comment |
You should also be managing your requests.
I mean: track when you raised the request, ask for news after a reasonable period of time (two working days), repeat that max three times. In the first follow-up you can make it clear why this is important to you. For IT staff it might sound like 'I want this tool installed', but if you detail the deadline you have and why this ticket is crucial for your work, they might understand. After the third time, get your supervisor involved. Ask him/her to escalate the request in a conversation with an IT service manager.
Don't be happy with simply solving the ticket, try to see if IT can communicate what time of service level agreement they aim to respect. Maybe installing something requires internal permissions (release management) which, for instance, makes it impossible to install stuff on a Friday, or an afternoon, or if you don't have a rollback (meaning you have to backup the entire server setup before touching anything), etc.
Managing the request also means making sure your requirements are superclear. If you think you might need a package ask them to install it. Run these installations yourself in a VM that is identical to the production setup and provide them with the commands to actually install the tools. All these things you can manage.
At all times, and I must stress that, be nice. Just be nice. Unless you have reasons to suspect someone is trolling you, you have to give them the full credit for having to tackle many such requests at the same time. Being nice will get you further on the long run. It will also show to your supervisor that you are capable of creatively handling difficult situations.
New contributor
Tagging onto this answer: When following up, use multiple modes if possible. For example, start with the ticketing system, but do the first follow up by phone. Being nice and tech-savvy on the phone can work wonders with some IT departments.
– krubo
Mar 22 at 18:25
1
As an experienced computer tech, I'd have to add that the IT dept. might already have an agreed upon Service Level Agreement (SLA) as to how soon tickets need to be addressed. Some can be as long as a week or to. The OP stating they need to get their software in only 2 days may require extra steps, signatures, or could just be flat out denied due to this prior SLA. I'd suggest the OP finds out what the Standard Operating Procedure (SOP) is before stating any time limits. And being nice is always a good way to stay off the bad side of the IT dept., cause that's a bad side to be on.
– computercarguy
Mar 22 at 20:49
1
And you need to remember that the SLA is based on the worst-case workload that IT can reasonably expect. In my organization, we promise through an SLA that a reasonable VM will be created within two weeks. In practice, the timeframe is generally within two day and that's only because we have to depend on two other outside groups for part of the process. Also, if installation of your software involves installing multiple cutting-edge packages that affect other users, understand that IT has to support everybody, not just your research needs.
– Doug O'Neal
yesterday
add a comment |
You should also be managing your requests.
I mean: track when you raised the request, ask for news after a reasonable period of time (two working days), repeat that max three times. In the first follow-up you can make it clear why this is important to you. For IT staff it might sound like 'I want this tool installed', but if you detail the deadline you have and why this ticket is crucial for your work, they might understand. After the third time, get your supervisor involved. Ask him/her to escalate the request in a conversation with an IT service manager.
Don't be happy with simply solving the ticket, try to see if IT can communicate what time of service level agreement they aim to respect. Maybe installing something requires internal permissions (release management) which, for instance, makes it impossible to install stuff on a Friday, or an afternoon, or if you don't have a rollback (meaning you have to backup the entire server setup before touching anything), etc.
Managing the request also means making sure your requirements are superclear. If you think you might need a package ask them to install it. Run these installations yourself in a VM that is identical to the production setup and provide them with the commands to actually install the tools. All these things you can manage.
At all times, and I must stress that, be nice. Just be nice. Unless you have reasons to suspect someone is trolling you, you have to give them the full credit for having to tackle many such requests at the same time. Being nice will get you further on the long run. It will also show to your supervisor that you are capable of creatively handling difficult situations.
New contributor
Tagging onto this answer: When following up, use multiple modes if possible. For example, start with the ticketing system, but do the first follow up by phone. Being nice and tech-savvy on the phone can work wonders with some IT departments.
– krubo
Mar 22 at 18:25
1
As an experienced computer tech, I'd have to add that the IT dept. might already have an agreed upon Service Level Agreement (SLA) as to how soon tickets need to be addressed. Some can be as long as a week or to. The OP stating they need to get their software in only 2 days may require extra steps, signatures, or could just be flat out denied due to this prior SLA. I'd suggest the OP finds out what the Standard Operating Procedure (SOP) is before stating any time limits. And being nice is always a good way to stay off the bad side of the IT dept., cause that's a bad side to be on.
– computercarguy
Mar 22 at 20:49
1
And you need to remember that the SLA is based on the worst-case workload that IT can reasonably expect. In my organization, we promise through an SLA that a reasonable VM will be created within two weeks. In practice, the timeframe is generally within two day and that's only because we have to depend on two other outside groups for part of the process. Also, if installation of your software involves installing multiple cutting-edge packages that affect other users, understand that IT has to support everybody, not just your research needs.
– Doug O'Neal
yesterday
add a comment |
You should also be managing your requests.
I mean: track when you raised the request, ask for news after a reasonable period of time (two working days), repeat that max three times. In the first follow-up you can make it clear why this is important to you. For IT staff it might sound like 'I want this tool installed', but if you detail the deadline you have and why this ticket is crucial for your work, they might understand. After the third time, get your supervisor involved. Ask him/her to escalate the request in a conversation with an IT service manager.
Don't be happy with simply solving the ticket, try to see if IT can communicate what time of service level agreement they aim to respect. Maybe installing something requires internal permissions (release management) which, for instance, makes it impossible to install stuff on a Friday, or an afternoon, or if you don't have a rollback (meaning you have to backup the entire server setup before touching anything), etc.
Managing the request also means making sure your requirements are superclear. If you think you might need a package ask them to install it. Run these installations yourself in a VM that is identical to the production setup and provide them with the commands to actually install the tools. All these things you can manage.
At all times, and I must stress that, be nice. Just be nice. Unless you have reasons to suspect someone is trolling you, you have to give them the full credit for having to tackle many such requests at the same time. Being nice will get you further on the long run. It will also show to your supervisor that you are capable of creatively handling difficult situations.
New contributor
You should also be managing your requests.
I mean: track when you raised the request, ask for news after a reasonable period of time (two working days), repeat that max three times. In the first follow-up you can make it clear why this is important to you. For IT staff it might sound like 'I want this tool installed', but if you detail the deadline you have and why this ticket is crucial for your work, they might understand. After the third time, get your supervisor involved. Ask him/her to escalate the request in a conversation with an IT service manager.
Don't be happy with simply solving the ticket, try to see if IT can communicate what time of service level agreement they aim to respect. Maybe installing something requires internal permissions (release management) which, for instance, makes it impossible to install stuff on a Friday, or an afternoon, or if you don't have a rollback (meaning you have to backup the entire server setup before touching anything), etc.
Managing the request also means making sure your requirements are superclear. If you think you might need a package ask them to install it. Run these installations yourself in a VM that is identical to the production setup and provide them with the commands to actually install the tools. All these things you can manage.
At all times, and I must stress that, be nice. Just be nice. Unless you have reasons to suspect someone is trolling you, you have to give them the full credit for having to tackle many such requests at the same time. Being nice will get you further on the long run. It will also show to your supervisor that you are capable of creatively handling difficult situations.
New contributor
New contributor
answered Mar 22 at 15:18
my.backmy.back
1718
1718
New contributor
New contributor
Tagging onto this answer: When following up, use multiple modes if possible. For example, start with the ticketing system, but do the first follow up by phone. Being nice and tech-savvy on the phone can work wonders with some IT departments.
– krubo
Mar 22 at 18:25
1
As an experienced computer tech, I'd have to add that the IT dept. might already have an agreed upon Service Level Agreement (SLA) as to how soon tickets need to be addressed. Some can be as long as a week or to. The OP stating they need to get their software in only 2 days may require extra steps, signatures, or could just be flat out denied due to this prior SLA. I'd suggest the OP finds out what the Standard Operating Procedure (SOP) is before stating any time limits. And being nice is always a good way to stay off the bad side of the IT dept., cause that's a bad side to be on.
– computercarguy
Mar 22 at 20:49
1
And you need to remember that the SLA is based on the worst-case workload that IT can reasonably expect. In my organization, we promise through an SLA that a reasonable VM will be created within two weeks. In practice, the timeframe is generally within two day and that's only because we have to depend on two other outside groups for part of the process. Also, if installation of your software involves installing multiple cutting-edge packages that affect other users, understand that IT has to support everybody, not just your research needs.
– Doug O'Neal
yesterday
add a comment |
Tagging onto this answer: When following up, use multiple modes if possible. For example, start with the ticketing system, but do the first follow up by phone. Being nice and tech-savvy on the phone can work wonders with some IT departments.
– krubo
Mar 22 at 18:25
1
As an experienced computer tech, I'd have to add that the IT dept. might already have an agreed upon Service Level Agreement (SLA) as to how soon tickets need to be addressed. Some can be as long as a week or to. The OP stating they need to get their software in only 2 days may require extra steps, signatures, or could just be flat out denied due to this prior SLA. I'd suggest the OP finds out what the Standard Operating Procedure (SOP) is before stating any time limits. And being nice is always a good way to stay off the bad side of the IT dept., cause that's a bad side to be on.
– computercarguy
Mar 22 at 20:49
1
And you need to remember that the SLA is based on the worst-case workload that IT can reasonably expect. In my organization, we promise through an SLA that a reasonable VM will be created within two weeks. In practice, the timeframe is generally within two day and that's only because we have to depend on two other outside groups for part of the process. Also, if installation of your software involves installing multiple cutting-edge packages that affect other users, understand that IT has to support everybody, not just your research needs.
– Doug O'Neal
yesterday
Tagging onto this answer: When following up, use multiple modes if possible. For example, start with the ticketing system, but do the first follow up by phone. Being nice and tech-savvy on the phone can work wonders with some IT departments.
– krubo
Mar 22 at 18:25
Tagging onto this answer: When following up, use multiple modes if possible. For example, start with the ticketing system, but do the first follow up by phone. Being nice and tech-savvy on the phone can work wonders with some IT departments.
– krubo
Mar 22 at 18:25
1
1
As an experienced computer tech, I'd have to add that the IT dept. might already have an agreed upon Service Level Agreement (SLA) as to how soon tickets need to be addressed. Some can be as long as a week or to. The OP stating they need to get their software in only 2 days may require extra steps, signatures, or could just be flat out denied due to this prior SLA. I'd suggest the OP finds out what the Standard Operating Procedure (SOP) is before stating any time limits. And being nice is always a good way to stay off the bad side of the IT dept., cause that's a bad side to be on.
– computercarguy
Mar 22 at 20:49
As an experienced computer tech, I'd have to add that the IT dept. might already have an agreed upon Service Level Agreement (SLA) as to how soon tickets need to be addressed. Some can be as long as a week or to. The OP stating they need to get their software in only 2 days may require extra steps, signatures, or could just be flat out denied due to this prior SLA. I'd suggest the OP finds out what the Standard Operating Procedure (SOP) is before stating any time limits. And being nice is always a good way to stay off the bad side of the IT dept., cause that's a bad side to be on.
– computercarguy
Mar 22 at 20:49
1
1
And you need to remember that the SLA is based on the worst-case workload that IT can reasonably expect. In my organization, we promise through an SLA that a reasonable VM will be created within two weeks. In practice, the timeframe is generally within two day and that's only because we have to depend on two other outside groups for part of the process. Also, if installation of your software involves installing multiple cutting-edge packages that affect other users, understand that IT has to support everybody, not just your research needs.
– Doug O'Neal
yesterday
And you need to remember that the SLA is based on the worst-case workload that IT can reasonably expect. In my organization, we promise through an SLA that a reasonable VM will be created within two weeks. In practice, the timeframe is generally within two day and that's only because we have to depend on two other outside groups for part of the process. Also, if installation of your software involves installing multiple cutting-edge packages that affect other users, understand that IT has to support everybody, not just your research needs.
– Doug O'Neal
yesterday
add a comment |
Adding this since nobody's mentioned it yet: You could ask your supervisor about having a meeting between you, your supervisor and someone from IT. Maybe even invite them to lunch if it's appropriate to your institution and situation. In case they're overwhelmed by tickets and/or they feel like your tickets come in from a faceless ticket-generator, it could help to meet the real researcher behind them. And you can meet the real person handling the tickets, and see if there's any way you can make your tickets more straightforward for them.
add a comment |
Adding this since nobody's mentioned it yet: You could ask your supervisor about having a meeting between you, your supervisor and someone from IT. Maybe even invite them to lunch if it's appropriate to your institution and situation. In case they're overwhelmed by tickets and/or they feel like your tickets come in from a faceless ticket-generator, it could help to meet the real researcher behind them. And you can meet the real person handling the tickets, and see if there's any way you can make your tickets more straightforward for them.
add a comment |
Adding this since nobody's mentioned it yet: You could ask your supervisor about having a meeting between you, your supervisor and someone from IT. Maybe even invite them to lunch if it's appropriate to your institution and situation. In case they're overwhelmed by tickets and/or they feel like your tickets come in from a faceless ticket-generator, it could help to meet the real researcher behind them. And you can meet the real person handling the tickets, and see if there's any way you can make your tickets more straightforward for them.
Adding this since nobody's mentioned it yet: You could ask your supervisor about having a meeting between you, your supervisor and someone from IT. Maybe even invite them to lunch if it's appropriate to your institution and situation. In case they're overwhelmed by tickets and/or they feel like your tickets come in from a faceless ticket-generator, it could help to meet the real researcher behind them. And you can meet the real person handling the tickets, and see if there's any way you can make your tickets more straightforward for them.
answered Mar 22 at 18:32
krubokrubo
1763
1763
add a comment |
add a comment |
Talk to your supervisor ("promotor"?) about the issue, and suggest that you should get a server that you manage. Depending on circumstances, you can agree on a physical server, an upgrade to you workstation / laptop to make it usable as a server, or even a server instance which is completely external to your institution, like Amazon AWS.
If your supervisor insists that you must use the existing IT infrastructure, send your support requests to them the next day after contacting IT. Don't wait for two weeks. Either helping you with these requests is not much of a burden, or your supervisor will grow tired of this and do something about it.
add a comment |
Talk to your supervisor ("promotor"?) about the issue, and suggest that you should get a server that you manage. Depending on circumstances, you can agree on a physical server, an upgrade to you workstation / laptop to make it usable as a server, or even a server instance which is completely external to your institution, like Amazon AWS.
If your supervisor insists that you must use the existing IT infrastructure, send your support requests to them the next day after contacting IT. Don't wait for two weeks. Either helping you with these requests is not much of a burden, or your supervisor will grow tired of this and do something about it.
add a comment |
Talk to your supervisor ("promotor"?) about the issue, and suggest that you should get a server that you manage. Depending on circumstances, you can agree on a physical server, an upgrade to you workstation / laptop to make it usable as a server, or even a server instance which is completely external to your institution, like Amazon AWS.
If your supervisor insists that you must use the existing IT infrastructure, send your support requests to them the next day after contacting IT. Don't wait for two weeks. Either helping you with these requests is not much of a burden, or your supervisor will grow tired of this and do something about it.
Talk to your supervisor ("promotor"?) about the issue, and suggest that you should get a server that you manage. Depending on circumstances, you can agree on a physical server, an upgrade to you workstation / laptop to make it usable as a server, or even a server instance which is completely external to your institution, like Amazon AWS.
If your supervisor insists that you must use the existing IT infrastructure, send your support requests to them the next day after contacting IT. Don't wait for two weeks. Either helping you with these requests is not much of a burden, or your supervisor will grow tired of this and do something about it.
answered Mar 22 at 12:20
Dmitry GrigoryevDmitry Grigoryev
3,787626
3,787626
add a comment |
add a comment |
my.back had a good answer, and it sounds like this may be the way to go when working through a bureaucracy where some of the solutions which involve some variation of "use your own hardware" just aren't practical. To add to this, I've found the following technique useful when dealing with a department or person who is willing to help, but does things on their own time.
- CC your supervisor on every request. This gives your supervisor a chance to give you feedback if you request something that you might not have realized was not necessarily what you need, or should be asking, but also lacking a response from your supervisor, it let's the person doing the thing that needs to be done know that your supervisor is aware of the request. (make sure you follow the advice given by my.back when making this initial request as far as why you need it, and when you need it)
- When you don't get a response within a reasonable amount of time, send the request again, but make sure you that you put in the request itself "Second Request", making sure to again cc your supervisor on the request. This lets them know that you still do need this thing to be done, it tends to have an effect of increasing the urgency of the IT professional for your task. Repeat as necessary, making sure to put your request number in the request each time.
In my experience a second request is generally all that is needed when using this technique unless the department is just completely swamped. The tricky part is to figure out what time frame is reasonable to complete such a request, and since organizations differ, it's not one that can be answered here. I would suggest getting to know the folks who are completing your task, so that you can get an idea of what they go through, and so they can see you aren't just asking for ridiculous things and just being demanding all the time, because sometimes it's hard to see the world through other people's eyes without some context.
New contributor
add a comment |
my.back had a good answer, and it sounds like this may be the way to go when working through a bureaucracy where some of the solutions which involve some variation of "use your own hardware" just aren't practical. To add to this, I've found the following technique useful when dealing with a department or person who is willing to help, but does things on their own time.
- CC your supervisor on every request. This gives your supervisor a chance to give you feedback if you request something that you might not have realized was not necessarily what you need, or should be asking, but also lacking a response from your supervisor, it let's the person doing the thing that needs to be done know that your supervisor is aware of the request. (make sure you follow the advice given by my.back when making this initial request as far as why you need it, and when you need it)
- When you don't get a response within a reasonable amount of time, send the request again, but make sure you that you put in the request itself "Second Request", making sure to again cc your supervisor on the request. This lets them know that you still do need this thing to be done, it tends to have an effect of increasing the urgency of the IT professional for your task. Repeat as necessary, making sure to put your request number in the request each time.
In my experience a second request is generally all that is needed when using this technique unless the department is just completely swamped. The tricky part is to figure out what time frame is reasonable to complete such a request, and since organizations differ, it's not one that can be answered here. I would suggest getting to know the folks who are completing your task, so that you can get an idea of what they go through, and so they can see you aren't just asking for ridiculous things and just being demanding all the time, because sometimes it's hard to see the world through other people's eyes without some context.
New contributor
add a comment |
my.back had a good answer, and it sounds like this may be the way to go when working through a bureaucracy where some of the solutions which involve some variation of "use your own hardware" just aren't practical. To add to this, I've found the following technique useful when dealing with a department or person who is willing to help, but does things on their own time.
- CC your supervisor on every request. This gives your supervisor a chance to give you feedback if you request something that you might not have realized was not necessarily what you need, or should be asking, but also lacking a response from your supervisor, it let's the person doing the thing that needs to be done know that your supervisor is aware of the request. (make sure you follow the advice given by my.back when making this initial request as far as why you need it, and when you need it)
- When you don't get a response within a reasonable amount of time, send the request again, but make sure you that you put in the request itself "Second Request", making sure to again cc your supervisor on the request. This lets them know that you still do need this thing to be done, it tends to have an effect of increasing the urgency of the IT professional for your task. Repeat as necessary, making sure to put your request number in the request each time.
In my experience a second request is generally all that is needed when using this technique unless the department is just completely swamped. The tricky part is to figure out what time frame is reasonable to complete such a request, and since organizations differ, it's not one that can be answered here. I would suggest getting to know the folks who are completing your task, so that you can get an idea of what they go through, and so they can see you aren't just asking for ridiculous things and just being demanding all the time, because sometimes it's hard to see the world through other people's eyes without some context.
New contributor
my.back had a good answer, and it sounds like this may be the way to go when working through a bureaucracy where some of the solutions which involve some variation of "use your own hardware" just aren't practical. To add to this, I've found the following technique useful when dealing with a department or person who is willing to help, but does things on their own time.
- CC your supervisor on every request. This gives your supervisor a chance to give you feedback if you request something that you might not have realized was not necessarily what you need, or should be asking, but also lacking a response from your supervisor, it let's the person doing the thing that needs to be done know that your supervisor is aware of the request. (make sure you follow the advice given by my.back when making this initial request as far as why you need it, and when you need it)
- When you don't get a response within a reasonable amount of time, send the request again, but make sure you that you put in the request itself "Second Request", making sure to again cc your supervisor on the request. This lets them know that you still do need this thing to be done, it tends to have an effect of increasing the urgency of the IT professional for your task. Repeat as necessary, making sure to put your request number in the request each time.
In my experience a second request is generally all that is needed when using this technique unless the department is just completely swamped. The tricky part is to figure out what time frame is reasonable to complete such a request, and since organizations differ, it's not one that can be answered here. I would suggest getting to know the folks who are completing your task, so that you can get an idea of what they go through, and so they can see you aren't just asking for ridiculous things and just being demanding all the time, because sometimes it's hard to see the world through other people's eyes without some context.
New contributor
edited Mar 22 at 18:51
299792458
2,68321435
2,68321435
New contributor
answered Mar 22 at 18:39
Ted DelezeneTed Delezene
1012
1012
New contributor
New contributor
add a comment |
add a comment |
A simple solution, just always make the requests through your promotor. Maybe explain to them the pattern you have noticed if they ask why you are going through them consistently.
Alternatively maybe they are doing something different, ask them how they get the IT department to resolve the issues quickly.
New contributor
add a comment |
A simple solution, just always make the requests through your promotor. Maybe explain to them the pattern you have noticed if they ask why you are going through them consistently.
Alternatively maybe they are doing something different, ask them how they get the IT department to resolve the issues quickly.
New contributor
add a comment |
A simple solution, just always make the requests through your promotor. Maybe explain to them the pattern you have noticed if they ask why you are going through them consistently.
Alternatively maybe they are doing something different, ask them how they get the IT department to resolve the issues quickly.
New contributor
A simple solution, just always make the requests through your promotor. Maybe explain to them the pattern you have noticed if they ask why you are going through them consistently.
Alternatively maybe they are doing something different, ask them how they get the IT department to resolve the issues quickly.
New contributor
New contributor
answered Mar 22 at 19:24
Captain ManCaptain Man
1054
1054
New contributor
New contributor
add a comment |
add a comment |
protected by Alexandros Mar 22 at 23:01
Thank you for your interest in this question.
Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).
Would you like to answer one of these unanswered questions instead?
15
Is there any chance of you installing your required software in your home directory rather than as root?
– thosphor
Mar 21 at 13:58
67
Having been on the IT department side of this, and in case you're curious, the most likely reason for their behavior is that they have a lot of more urgent work that they are catching up on, and only once someone higher up the ladder makes your request urgent does it get ahead of all the other things. To the detriment of the work on other things. So for what it's worth, they are probably not ignoring you for any personal reason, they are just scrambling to keep the servers running.
– Todd Wilcox
Mar 21 at 14:21
11
In the meantime, you could try to have things working in your computer, with a smaller dataset. This way, you know exactly what you need to make your thing work and you can go to your professor to ask them to ask IT to install all you need at once, instead of doing the cycle you describe.
– user4052054
Mar 21 at 14:25
8
Does anybody not have this experience? This is what IT departments do. It's the easiest way to meet their objective of "reducing expenditure."
– alephzero
Mar 21 at 18:32
11
Almost every IT department is under-staffed, because management treads it like facility management: you have to have it, but it has no business value. They do not notice the problems, because their requests are always fulfilled immediately.
– Chris
Mar 22 at 8:03