Exploring the not-so-fundamental Life Sciences Research fundamentals

Slides:



Advertisements
Similar presentations
“From man to mouse” … Human PET microPET human mouse rat rat infant
Advertisements

INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
External Storage Devices 1. In what devices will you find flash memory? (collage of images) 2. Identify the costs/capacity of typical flash memory for.
P3- Represent how data flows around a computer system
Ch 7-1 Working with workgroups-1. Objectives Working with workgroups Creating a workgroup Determining whether to use centralized or group sharing.
SCHOOL OF INFORMATION UNIVERSITY OF MICHIGAN The Coming of Cyberinfrastructure Gary M. Olson.
Technology Round 7 Exploring I.C.T. in the Syllabus.
1 iPlant Data Store (iDS) Supporting the Lifecycle of Data Nirav Merchant 1.
Cloud Storage Maria Evans Tam Huynh Kieu Le Mark Singh.
Enabling Grids for E-sciencE Medical image processing web portal : Requirements analysis. An almost end user point of view … H. Benoit-Cattin,
Education in Global ICT
WPS ICT SYSTEM Current system and Future planning.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
1 Developing a Data Management Plan C&IT Resources for Data Storage and Data Security Patrick Gossman Deputy CIO for Research January 16, 2014.
Information & Communication TECHNOLOGY. International General Certificate of Secondary Education.
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
Research and Educational Networking and Cyberinfrastructure Russ Hobby, Internet2 Dan Updegrove, NLR University of Kentucky CI Days 22 February 2010.
TIA Technology & Standards Conference Call Complimentary Copies.
Innovations to Transition a Campus Core Cyberinfrastructure to Serve Diverse and Emerging Researcher Needs Prasad Calyam (Presenter), Jay Young, Paul Schopis.
Networking Relationships What is a computer network?
By Dinesh Bajracharya Nepal Components of Information system.
SERENATE NREN WORKSHOP SERENATE : extension of research networks into education and other user communities Sabine Jaume-Rajaonia RENATER TERENA Executive.
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
What is The Cloud?. The Cloud.
Identify internal hardware devices (e. g
Collaborative Services The Centralization Process at Duke Michael Pickett Duke University CSG
FIT03.05 Explain features of network maintenance.
COMPUTING ESSENTIALS 2012 MAKING IT WORK FOR YOU TIMOTHY J.O’LEARY & LINDA I.O’LEARY.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Chapter 9  Definition of terms  List advantages of client/server architecture  Explain three application components:
STORAGE LOCAL OR ONLINE. DATA STORAGE: DATA YOU STORE ONLINE FILES SUCH AS IMAGES, SPREADSHEETS, VIDEO OR MUSIC. ONLINE DATA STORAGE: WHEN FILES ARE STORES.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Lesson 3 Human Computer – Part 2 To understand the term “back-up” and why it is needed To explore the different methods of data storage and how we can.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
EARNEST Workshop Break-Out Session Berlin, 23./ Researchers’ Requirements Chair: Patrick Bressler Rapporteur: Hans Döbbeling.
HOW TO CHOOSE THE BEST CLOUD ACCOUNTING SOFTWARE? You can use cloud-based software from any device with an internet connection. Online accounting means.
1 User-Focused Engagement and Service Development Interactive Panel Discussion on Science Engagement TNC16 June 2016.
Adeyl Khan, Faculty, BBA, NSU 1. IT refers to the resources used by an organization to manage information that it needs in order to carry out its mission.
COMPUTER SCIENCE AND THE FOUNDATION OF KNOWLEDGE NURSING INFORMATICS CHAPTER 5 1.
CINO PROGRAM ADVISORY GROUP MEETING Ed Aractingi, Assistant Vice President for IT/Deputy Chief Information Officer, Marshall University Mark Cather, Chief.
Advocacy? What it is and how to make it work for you
Segmap Solutions Mapping segments.
MICROCOMPUTER HARDWARE (CONTINUED)
Cloud Computing Cloud computing: (the Internet represents the Cloud).
TF-RED – Coming Together to Develop Research Engagement Methods
Learning from failures
SURFnet, Community Manager Research
Google Drive.
Lab A: Installing and Configuring the Network Load Balancing Driver
Lossy Compression and File Formats
ICT meeting Business needs
Basic Computer Components
*current controlled assessment plans are unknown
Blockchain Technology and IoT Security Andy Wang March 21, 2018
STEM-Trek=Global & Grassroots
Connecting the Dots Kate Petersen ESnet Science Engagement
An Introduction to Cloud Computing
eInfrastructure the international dimension
Online software and backups
GCSE Computer Science.
Revision PowerPoint By Nicole Davidson.
European Computer Driving Licence Syllabus version 5.0

Presentation transcript:

Exploring the not-so-fundamental Life Sciences Research fundamentals Sylvia Kuijpers Relationship Manager Research + International Policy & Governance Internet2 Global Summit, 25 April 2017

Life Science clusters Molecular imaging MRI SPECT PET Molecular imaging Focus on performing the experiments with the techniques available Use of local and sometimes national compute clusters External hard drives used for transfer, back-up and storage of the output They don’t contact local ICT for help Main concerns Unstable servers when transferring data to compute Threat of losing precious data No quick & secure access to temporary students

Possibilities for NREN, Compute and eScience facilities Compatibility of network and compute facilities Improving research workflow (eScience) Optimizing code/software Optimizing data transfers Optimizing access to compute

Research engagement possibilities Understanding researchers Gathering requirements Improve services to accommodate their needs Adoption of cyberinfrastructure services by (more) researchers