Telescope: an interactive tool for managing large-scale analysis from mobile devices

Abstract Background In today's world of big data, computational analysis has become a key driver of biomedical research. High-performance computational facilities are capable of processing considerable volumes of data, yet often lack an easy-to-use interface to guide the user in supervising and adjusting bioinformatics analysis via a tablet or smartphone. Results To address this gap we proposed Telescope, a novel tool that interfaces with high-performance computational clusters to deliver an intuitive user interface for controlling and monitoring bioinformatics analyses in real-time. By leveraging last generation technology now ubiquitous to most researchers (such as smartphones), Telescope delivers a friendly user experience and manages conectivity and encryption under the hood. Conclusions Telescope helps to mitigate the digital divide between wet and computational laboratories in contemporary biology. By delivering convenience and ease of use through a user experience not relying on expertise with computational clusters, Telescope can help researchers close the feedback loop between bioinformatics and experimental work with minimal impact on the performance of computational tools. Telescope is freely available at https://github.com/Mangul-Lab-USC/telescope.

[1]  Jonathan D. Wren Bioinformatics programs are 31-fold over-represented among the highest impact scientific papers of the past two decades , 2016, Bioinform..

[2]  Eleazar Eskin,et al.  Challenges and recommendations to improve the installability and archival stability of omics computational tools , 2019, PLoS biology.

[3]  Geir Kjetil Sandve,et al.  Galaxy Portal: interacting with the galaxy platform through mobile devices , 2016, Bioinform..

[4]  Eleazar Eskin,et al.  A comprehensive analysis of the usability and archival stability of omics computational tools and resources , 2018, bioRxiv.

[5]  Eleazar Eskin,et al.  Addressing the Digital Divide in Contemporary Biology: Lessons from Teaching UNIX. , 2017, Trends in biotechnology.

[6]  Andy B. Yoo,et al.  Approved for Public Release; Further Dissemination Unlimited X-ray Pulse Compression Using Strained Crystals X-ray Pulse Compression Using Strained Crystals , 2002 .

[7]  J. Dudley,et al.  Precision Medicine for Relapsed Multiple Myeloma on the Basis of an Integrative Multiomics Approach , 2018, JCO precision oncology.

[8]  B. Smith,et al.  Individual differences in learning and biogenic amine levels influence the behavioural division between foraging honeybee scouts and recruits , 2018, The Journal of animal ecology.

[9]  Serghei Mangul,et al.  Interpreting and integrating big data in the life sciences. , 2019, Emerging topics in life sciences.

[10]  Wolfgang Gentzsch,et al.  Sun Grid Engine: towards creating a compute power grid , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[11]  Burton S. Kaliski,et al.  PKCS #5: Password-Based Cryptography Specification Version 2.1 , 2017, RFC.

[12]  Dick Hardt,et al.  The OAuth 2.0 Authorization Framework , 2012, RFC.

[13]  Ryan D. Hernandez,et al.  ROP: dumpster diving in RNA-sequencing to find the source of 1 trillion reads across diverse adult human tissues , 2018, Genome Biology.

[14]  Jacob Beal,et al.  Reproducibility of Fluorescent Expression from Engineered Biological Constructs in E. coli , 2016, PloS one.

[15]  F. Markowetz All biology is computational biology , 2017, PLoS biology.

[16]  M. Pellegrini,et al.  An in situ high-throughput screen identifies inhibitors of intracellular Burkholderia pseudomallei with therapeutic efficacy , 2019, Proceedings of the National Academy of Sciences.

[17]  Burton S. Kaliski,et al.  PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.

[18]  Brian J. Archer,et al.  NOTCH1 is a mechanosensor in adult arteries , 2017, Nature Communications.

[19]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.