IRS Home | Logout

CARC Request

Use this page to request accounts and/or projects on CARC Machines. For more information click here
To obtain an account/project you must complete the following tasks:

Request Information

User access on the CARC systems is assigned through a project. Thus to request an account you must identify yourself and identify the project with which the account is to be associated. The project must have already been requested and approved before you can make an account request.

Account requests are created in the following order

  1. Determine who you are
    In this step you will be asked to provide information about yourself so that we can mail you your username and password. Important messages may also be sent to you via email. You will also specify a default login name. There are two ways that you can provide this information:
    • If you already have an account at CARC, you can search and select your information record.
    • If you do not have an account at CARC, you will need to fill in the new information form.
  2. Select the project
    You can select the project that you are looking for by browsing this section. If a PI has asked you to request an account, you can also order by PI name, etc.
  3. Configure account information
    In this step you can specify how often information about your usage should be sent to you. You may request a login name that differs from your default, or indicate that the account you are requesting be your default account for billing (ie the project you selected will be billed by default for usage on the machine/login_name pair).
  4. Once you have completed these steps the system will confirm that your requests have been submitted
  5. .
Project requests follow this order
  1. Determine who you are
    In this step you specify who the PI of the project is. The email address will be used to send usage reports concerning your project as well as important system messages concerning your projects state.
  2. There are two ways that you can provide this information:
    • If you already have an account at CARC, you can search and select your information record
    • If you do not have an account at CARC, you will need to fill in the new information form
  3. Enter project information
    Here you enter details about your project. Please specify machine requirements in the special request box. Otherwise, when your project is approved, user services will allocate resources as they see fit. You may also specify that you do not want an account automatically set up for the project pi, by deselecting the appropriate checkbox
  4. Once you have submitted this information, the system will confirm that your request has been submitted
Note: If you are requesting an account on a project that does not exist in the database, and you are not the principal investigator(PI), please have the PI create the project first, so that your account request will be for the right project!

To check the status of an requested account please email
If you have comments or questions about the Integrated Report System or the account creation process, please send mail to:

0. Read and agree to CARC usage agreement
1. Input or select personal contact data (name, etc)
2. Input new project data or select the project
3. Input new account information

For a project to be accepted at CARC, you must accept the account usage policy shown below.

"Good Neighbor" Use Policy

The Center for Advanced Research Computing
University of New Mexico

The following guidelines for the appropriate use of HSC@UNM computing facilities are to be followed by all users. These guidelines are meant to ensure the security of user accounts as well as equitable access to our computing facilities by all users.

Acceptable Use

By accepting an CARC account, I agree that:

  • I will be responsible for all use of this computer account.
  • I will use the computer account for High Performance Computing purposes and not for commercial purposes.
  • I will not use the computer account to engage in any form of illegal software copying or other copyright infringement.
  • I will not attempt to access accounts, files or information belonging to other users without their knowledge and consent.
  • I understand the monitoring of user activity on the CARC machines may occur.



Users are provided an initial Default Password in their new user packet. You should change your password the first time you login and periodically thereafter. If it is necessary for you to request a password change from us (for example, when you have forgotten your current password), your password will be set to this default. It is important that you keep this form in a secure place for your reference. If you do not have this form available, you will be required to wait until a duplicate can be mailed to you via U.S. mail. CARC does NOT provide passwords by phone, fax, or electronic mail.

General Considerations

The following considerations apply to running codes on any CARC computer.

  • Users must regularly monitor their jobs to ensure that they are not overburdening or hanging the machine they are using. This is especially important for machines that are being used interactively. Under UNIX, the ps, lsps, and vmstat commands provide useful information about CPU utilization and the amount of paging (memory utilization) that is going on in a system.
  • Jobs running for long periods on machines that are used interactively should be run with their priority reduced 10 units or more. (See the man pages for the nice and renice commands.)
  • Users should not lock the screen on terminals/computers intended for public use when they are to be left unattended for more than a few moments.
  • Users should keep an Xterm window (console window) open to receive system messages.
  • All users should maintain current .plan, and if necessary, .forward files for their CARC accounts. These will allow us to provide you with timely notification of system shutdowns, changes to software, etc. They also allow us to contact you should a program you are running cause a problem with the system. The .plan file should provide your name, current contact information (day and evening phone numbers), and a brief description of the work you are doing at the CARC. Your .plan file should also state whether or not your CARC account is your primary account for reading E-mail. If your CARC account is not your primary mail account, you should also set up a .forward file to ensure that a copy of all your messages are forwarded to your primary account.
  • Access times. Access hours at the CARC are in general divided into 2 categories: prime time and non-prime time. During prime hours, which run from 8am to 5pm on weekdays, priority access is given to workshops or classes, students doing class work, parallel code development, and production computation in that order. During non-prime hours, which begin 15 minutes after the end of prime hours and end 15 minutes before the start of prime hours, priority is generally given to production computation, code development, and systems maintenance in that order.

Security Considerations

  • No passwords, for CARC or any other machines, whether inside or outside the University, are to be kept in a personal file on the CARC file system such as the .rhosts file, .netrc file, unless the file is encrypted with strong encryption (e.g. DES or public key encryption). Violation of this condition may lead to immediate and permanent expulsion from CARC systems. Any such violation will also be reported to NCSA, since it is anticipated that this condition will apply as well to any accounts eventually granted on other CARC or PACI partner machines. For security reasons, it is strongly recommended that users adhere to this policy on all network machines on which he or she has accounts.
  • For your own protection and that of the CARC community, the CARC password shall consist of a minimum of 8 characters with no repeats. At least one character should be a non-alphabetic character. The user's name should not appear as any part of the password. Adherence to this policy will be spot-checked with standard password-breaking security programs.
  • Users making insecure remote connections (e.g., telnet and rlogin) or remote mail services should make it a practice to regularly change their passwords. Once every three months is suggested. If possible users should use secure connections, e.g. SSH (secure shell), etc.

Use of the Linux Cluster

The Linux cluster is located in the workshop area, and consists of 11 PC's running Linux. The primary purpose of the Linux cluster is as an educational and research tool. In the first role, they operate as terminals for workshops and classes. In the second role, they operate as a cluster for parallel computing research and development. Use of the Linux cluster for production computation is a secondary purpose.

During regular working hours, and perhaps a few hours on either side, users should not use the Linux cluster for computations. An exception to this may be possible during scheduled university holidays, but only with the consent of the system administrators.

Use of servers

Systems that are designated as file servers, web servers, and name servers should never be used for doing computations. In general, users should avoid using them at all. The only exception to the latter rule is when you are moving a large file to or from the CARC file system, or between partitions on the CARC file system. In this case, it is probably advantageous, because of the reduced network traffic, to perform this operation directly on the file server. Consult the CARC User's Guide on the CARC web site for information about servers.

I have read and agree to adhere to the CARC usage policy

Copyright (c) 2001-2005. The University of New Mexico. All rights reserved.