while i am tempted toward the slurm approach, i wonder what
authenticates the slurm file(s)?

randy

Reply via email to