Glossary

Closed Source Software / Not Open Source Software

Software with source code which is not publicly available for general distribution. For this type of software, the Export Control Classification Number (ECCN) is requested. If the code is subject to a different export control jurisdiction (e.g. Department of State, ITAR) please indicate an appropriate categorization.

Export Control Classification Number (ECCN)

US Department of Commerce Export Control Classification Number. If an application software package is export controlled, list the applicable ECCN. This is requested for all software that is Not Open Source. If the code is subject to a different export control jurisdiction (e.g. Department of State ITAR, Nuclear Regulatory Commission Controls) please indicate an appropriate categorization.

Health Data

The term Health Data is interpreted rather broadly; it includes any part of a patient’s medical record or payment history. In particular, the US Health Insurance Portability and Accountability Act (HIPAA) defines Protected Health Information (PHI) that must be treated with great care.

For more information on HIPAA and PHI see Health Information Privacy from the U.S. Department of Health & Human Services.

National Security Decision Directive (NSDD) 189

National Security Decision Directive (NSDD) Number 189 is a federal directive that establishes national policy for controlling the flow of science, technology, and engineering information produced in federally-funded fundamental research at colleges, universities, and laboratories. NSDD 189 defines “Fundamental Research” as:

Basic and applied research in science and engineering, the results of which ordinarily are published and shared broadly within the scientific community, as distinguished from proprietary research and from industrial development, design, production, and product utilization, the results of which ordinarily are restricted for proprietary or national security reasons.

“Publicly Available Information” is defined as information obtainable free of charge (other than minor shipping or copying fees) and without restriction; which is available via the internet, journal publications, text books, articles, newspapers, magazines, etc.

Open Source Software

Open Source software is publicly available software (source code) which is available for general distribution either for free or at a price that does not exceed the cost of reproduction and distribution. Frequently, this Open Source software is distributed under a license that grants the user the rights to use, copy, modify, prepare derivative works, and distribute that software without having to make royalty payments. Such distribution may include original or modified source code, other formats, and any derivative works thereof.

Proprietary Data

Proprietary Data are data which embody trade secrets developed at private expense, where such data (a) are not generally known or available from other sources without obligation concerning their confidentiality; (b) have not been made available by the owner to others without obligation concerning their confidentiality; and (c) are not already available to the Government without obligation concerning their confidentiality.

Sensitive or Restricted Information

Principal Investigators are responsible for knowing whether their project uses or generates sensitive or restricted information. Department of Energy systems contain data only related to scientific research.

Sensitive Information: This includes, but is not limited to, personally-identifiable information (PII). PII is information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual.

Restricted Information: This includes, but is not limited to, classified information, unclassified controlled nuclear information (UCNI), naval nuclear propulsion information (NNPI), the design or development of nuclear, biological, or chemical weapons or of any weapons of mass destruction. Use of OLCF resources to store, manipulate, or remotely access classified information is prohibited.

For more information contact the DOE at:

Office of Domestic and International Energy Policy
US Department of Energy
Washington DC 20585
Strong Scaling

How time-to-solution of a computation varies with the number of processors for a fixed total problem size. Use the examples below as a guide when providing this kind of parallel performance data.

nProc

Time to Solution, Actual

Time to Solution, Ideal

64

9600.00

9600.00

128

5333.33

4800.00

256

3000.00

2400.00

512

1714.29

1200.00

1024

1000.00

600.00

strong scaling example graph 1

nProc

Time to Solution, Actual

Time to Solution, Ideal

64

64.00

64.00

128

115.20

128.00

256

204.80

256.00

512

358.40

512.00

1024

614.40

1024.00

strong scaling example graph 2
Weak Scaling

How time-to-solution of a computation varies with the number of processors for a fixed per processor problem size. Use the example below as a guide when providing this kind of parallel performance data.

nProc

Time to Solution, Actual

Time to Solution, Ideal

64

10.50

10.50

128

10.45

10.50

256

10.42

10.50

512

10.40

10.50

1024

10.43

10.50

weak scaling example graph