Speakers: Bourke Hutchinson

Bourke Hutchinson

Manager of Advanced Research Computing
Children’s Mercy Research Institute
Children’s Mercy Hospital

 

Bourke Hutchinson serves as the Manager of Advanced Research Computing in the Children’s Mercy Research Institute at Children’s Mercy Hospital (CMH). He earned his MS in Management of Information Systems from Friends University and his undergrad from Kansas University. Bourke began his professional career in local municipal government and spent 16 years with the City of Olathe. In 2017, Bourke joined the CMH Information Systems team as a Sr. DBA responsible for several hundred Microsoft SQL Server Instances containing thousands of databases. While serving in that role, he helped to implement several standard deployment, monitoring, and performance optimization methods. In 2018, Bourke joined the CMRI Advanced Research Computing Team as a Sr. DBA and then was promoted to the team’s manager in 2019. He and his team are currently responsible for 2 on-campus Datacenters which contain a High Performance Computing Cluster, approximately 4 Petabytes of Data, a Nutanix Virtualization Cluster, and many ancillary servers in support of the HPC Environments. Bourke and His team are also responsible for a large Microsoft Azure Cloud footprint in support of CMH’s Genomic Medicine Center.

 

Experiences in Moving Bioinformatic Workloads to the Cloud

Imagine moving the workloads, data, applications, processes, pipelines and integrations that have been familiar to you daily for the past 5-7 years.  Bourke will be sharing several of the experiences gained and lessons learned as he and his team continue to migrate the Genome Medicine Center operations at Children’s Mercy Hospital from a traditional on-prem physical High Performance Computing datacenter environment to the Microsoft Azure Cloud.  He will review the importance of having a security-first mindset by utilizing role-based access and multi-factor authentication, standardizing code management through source/version control, and the necessity of partnering with security professionals for vulnerability management and endpoint protection.