October 31, 2011 | Ian Foster

In our work with many hundreds of researchers who work in smaller labs, we’ve learned a few things about what is likely to be adopted and what is likely to go nowhere. For these scientists, who represent the majority of researchers working today, cyberinfrastructure can’t be delivered by providing software to be installed in a lab: they too often lack the local infrastructure and expertise.

June 16, 2011 | Bryce Allen

In the Transfer Web Interface (Web GUI), when you first access an endpoint you are prompted for your MyProxy username and passphrase. Once you provide this information, you can browse your files and perform transfers to and from the endpoint. This blog post is about what happens behind the scenes to make that happen.