 Right now, I'm on a Windows machine. Well, first of all, I'm now going to give a demo of the connection to the Triton cluster, so the one for Alpha. So this is what we need to know for tomorrow. Yeah, exactly, because basically, as you heard earlier, you may have even seen some pictures in HackMD, the idea that the cluster is a collection of these computing nodes, multiple computers, and right now, with this terminal that you see here, this is just my local laptop. And right now, I could run some software, but it would just run here locally, but instead, you know, tomorrow you will see how we can connect to these remote machines and from there run things by, for example, requesting more memory or more computing power and things like that. So what we need to test now is that our account actually works to connect to the cluster. I highly recommend the people from Essex University, Tampere University, and Oulu to go to the Zoom and find a breakout room with the people from your university because... After or before they see our demo. Even now, because in a way maybe they're relevant for Essex University, there is Tecometza for Tampere, we have Mika Antila, and for Oulu, what's this made of? They can give you this demo, like I'm giving it to the other people. But anyway, for those who want to see how we connected Alto, so right now this is an Alto machine, and so my username that I see in the terminal is the username that I also have at Alto. If you are not sure, if you type OMI, it actually tells you what is your username. So if the command OMI is not going to show your Alto username, then you know that you're not an Alto machine, which means that you need to specify your username because otherwise, you know, if the username for me in this machine were being Enrico, then when I try to tell to the remote machine that I'm the user Enrico, they will be like, sorry, we don't have anyone with this username. So then, now the command that we use to connect to a remote cluster from the terminal is the command SSH. And specifically, if I would have a different username, I would need to type my username and the name of the remote machine. So the name of the machine is like, it looks basically something like you would type for looking for a website. So this is a so-called URL, and specifically for our Triton cluster is Triton.alto.t. And then I put the username in front of it. Of course, this is useless in this case because I'm already on a machine while the username is the same. But you know, if you want to be explicit, you can put your username there. Then I would press enter and because this is not the first time that I'm going to do it, I will just be able to connect and log in and see the login screen. But most likely in your case, if this is the first time you do it, you will be asked, this is the kind of fingerprint of the remote server do you want to continue and then you will need to type yes. And then after that, it might ask for your password. Now, in the case, in my case, because I've already connected to the cluster and I even exchanged my SSH keys with the cluster, then I can log in basically without using any password. And now I press enter and the demo effect kicks in. So what could be wrong? I rewrite the game, it's like here. Metcorkerror. Okay. I'm also one thing that I did mention that I'm in the so-called alto VPN. So I'm at the campus actually. So after these goals, I would show you how to do it if you were not in the VPN. So right now you see that the terminal has changed. Now these colors and these other things might relate to the settings of your terminal. But if I'm typing the common host name, which basically I'm asking the machine, tell me your name, and here it's login3.britone.alto.v. This is the so-called login node. That is one node, but it's not a computing node. This is just for entering the cluster. And tomorrow from here you can edit your files. You can run Python scripts or any other scripts. Yeah. So what if you aren't on the university network? Yeah. So if you're not on the VPN, then you need to kind of jump first on another host first. You basically need to reach the alto network. And one way of doing it, for example, is to SSH to one of these SSH nodes that are available for everyone at alto with an alto account. So now I start fresh again. I'm back to my laptop. One of these nodes is kosh. So kosh.alto.v. This is shared by everyone, even by the students. Then there will be another one, which is talto.alto.v. That is only for those who have a wide personal basic. But let's try kosh, which should be the most accessible one. And let's see if the demo effect kicks in again. So same story. This is the first time that you connect to this login node of the alto network. You will ask, do you trust this machine? And you will need to type yes. Here I've been already connected many times, so I didn't need to type this. And now I'm inside kosh. So basically I'm in a different node on a different machine. And then from here I could then SSH to write the talto.v. And what does this fingerprint thing mean? Well, that's a good question. I mean, the idea is that we are now trusting that the name, you know, when I type this. No. What happened? Well, I guess I can... Actually, this is a good moment that I wanted to share something in our workflows. And then maybe Rich and you can prepare terminal to talk about fingerprints. But basically, you might have seen this picture already in the HakenD, but this is where we are right now, so that we are on the internet and we are connected to the internet from wherever you are. And then if you are familiar with what is a VPN, you can connect to the VPN so that you're inside the alto network. And then you can SSH to this node, talto.v, like I did. Or if you're not on the internet, then you can access one of these other nodes. There's Brute and Force for students, there's Magy Amor, Koch and others. And then again, you can go inside the alto network and then go to the Triton cluster. Yeah. So now if you want to talk about the keys, I think you can steal this. There's not really much I wanted to say other than you see this message saying do you want to accept the fingerprint? You should click yes. And that means that every time you connect from then on, you know you're connecting the same thing. And that means that SSH is secure from then on. And if you want to verify, some people would also go and make sure these numbers match what it should be to make sure you're connecting the right thing. But this is basically a good thing. Click yes and if it ever changes, there's a way you can change this. And like remove what the memory. So maybe now this is a good moment for you to actually try to connect your cluster. How does someone know when they're done and they can leave? So if you're able to run the common SSH Triton.alto.fee and type host name and see that the output of the common is Login3.triton.alto.fee for auto users, then you're basically done and ready for tomorrow. And now we can switch to the Zoom for those who have issues with connecting to the cluster. So there's many breakout room and helpers there. So there's one thing I'd like to show first. So at the bottom of HackMD, there is a feedback section. So please give us feedback. Please say one good thing and one thing to be improved of the course. Especially what can be improved. Yeah, that's what we need to know for next time. We don't want to live in this echo chamber here.