Infrastructure (hardware) DEVA Data Management Workshop Devil’s Hole Pupfish Project.

Slides:



Advertisements
Similar presentations
IRs: towards preservation services Steve Hitchcock Preserv Project Intelligence Agents Multimedia Group, School of Electronics and Computer Science (ECS),
Advertisements

Information Technology Awareness Wayne Donald IT Security Officer.
Key Word Challenge This is when a computer uses services provided by another organisation’s computer systems. A computer hardware system which acts as.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Accelerate Your Business RP IaaS (Infrastructure as a Service) IaaS.
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
Chapter Extension 17 Small-Scale Systems Development © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Copyright and Intellectual Property Design Issues by Jeremy Rowe
Different approaches to digital preservation Hilde van Wijngaarden Digital Preservation Officer Koninklijke Bibliotheek/ National Library of the Netherlands.
E-journal Publishing Strategies at Pitt Timothy S. Deliyannides Director, Office of Scholarly Communication and Publishing and Head, Information Technology.
MIT Libraries’ FileMaker Use Policy as an example local DLC policy.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
STEALTH Content Store for SharePoint using Windows Azure  Boosting your SharePoint to the MAX! "Optimizing your Business behind the scenes"
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Electronic Public Record What is it, and Where Can Agency Lawyers Find It?
Organizing Information Technology Resources
City of Seattle Office of the City Clerk Open Government = Access Challenges and Opportunities with Digital Records.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
NCSU Libraries TRLN Digital Preservation Seminar NCSU.
Presented For: Moana Company March 1, Content Introduction Microsoft Office 365 Microsoft Office Professional Recommendations Closure References.
Choosing Delivery Software for a Digital Library Jody DeRidder Digital Library Center University of Tennessee.
Workflow Description Roles and Responsibilities DEVA Data Management Workshop Devil’s Hole Pupfish Project Project Managemen t!?!
Cloud Computing Changing the way business computing is (will be) done.
VirtualizationAll-In-OneUpgrades Technical Consulting IntegrationSolution Manager.
Libraries, Archives, and Digital Preservation: The Reality of What We Must Do Leslie Johnston Acting Director, National Digital Information Infrastructure.
DLT Update Mairéad Martin June 28, DLT Infrastructure 1.Annual Lifecycle –170 DLT public workstations; 200 Library workstations, laptops, 17 printers.
Information Management (data transformation) Analysis Information Quality (IQ) Interpretation Reporting Records Management World Wide Web Consortium director.
Digital preservation activities at the NLW Sally McInnes 18 September 2009.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Overview Acquiring Data DEVA Data Management Workshop Devil’s Hole Pupfish Project Data Life Cycle.
CLOUD COMPUTING JAZ PATERNOSTER. DEFINITION Cloud computing is the use of ‘the cloud’ as a place to save files rather than in a personal computer, allowing.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
How to Implement an Institutional Repository: Part II A NASIG 2006 Pre-Conference May 4, 2006 Technical Issues.
Juan Ortega 12/15/09 NTS355. Microsoft Security Advisory (977544) Vulnerability in SMB Could Allow Denial of Service Flaw on SMBv2 supposedly opened two.
DEVA Data Management Workshop Devil’s Hole Pupfish Project Roles and Responsibilities.
Al Cornish, Systems Librarian Washington State University Libraries Preserving Access to Multimedia Collections.
Difference between DBMS and File System
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
OCLC ILLiad hosted service March 18 th, 2010 The who, what, why, when and how of ILLiad hosting.
Our Mission. Computer Purchasing Website Design and Development Services.
Master Expert Associat e Microsoft Certified Solutions Master (MCSM) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions Associate.
Simplifying IT, Empowering Business.
Secure Services Shared Hosted MS Exchange 2010.
Organizing and leading the IT function Two set of tensions guide policies for developing, deploying and managing IT systems. 1.Innovation and control a.How.
Ron Enger Southern Oregon Educational Service District Medford, Oregon Cliff Ehlinger Grant Wood Area Education Agency Cedar Rapids, Iowa December, 2006.
Disaster Recovery Prepared by Mark Lomas Mark Lomas IT Infrastructure Consultant Storage & Servers.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
BIS 303 Week 3 DQ 2 What is your organization’s policy regarding the replacement or upgrading of hardware and software? Are there scheduled replacements.
«My future profession»
Program Review Presentation May 5th, 2010
Business Continuity and the Disaster Recovery Center
Cloud Computing Cloud computing: (the Internet represents the Cloud).
Spectrum technologies
Information Technology (IT) Department
Document Scanning in Ontario:
Windows® MultiPoint™ Server 2010
Comparison June 2017.
Your Next LIMS: SaaS or On-Premise? Presented by:
Implementing an Institutional Repository: Part II
Policies and Procedures to Protect you, your Office and your Data
The Survival Plan.
Implementing an Institutional Repository: Part II
Revision PowerPoint By Nicole Davidson.
The Database Environment
How to Implement an Institutional Repository: Part II
Executive Sponsor: Tom Church, Cabinet Secretary
Presentation transcript:

Infrastructure (hardware) DEVA Data Management Workshop Devil’s Hole Pupfish Project

Infrastructure (hardware) DEVA Data Management Workshop Devil’s Hole Pupfish Project Effective maintenance of digital files depends on the proper management of a continuously changing infrastructure of hardware, software, file formats, and storage media. Major changes in hardware can be expected every 1-2 years and in software every 1-5 years (Vogt-O'Connor 2000).

Infrastructure DEVA Data Management Workshop Devil’s Hole Pupfish Project So where do you KEEP data and information, so you won’t loose it,but you don’t have to be continually updating and/or upgrading it?

DEVA Data Management Workshop Devil’s Hole Pupfish Project Use recognized, creditable, secure data and information depositories and repositories. Host it on web sites available through national level servers. Who supervise and maintain the hardware, that keep astride of the latest technologies, policies and guidelines.

DEVA Data Management Workshop Devil’s Hole Pupfish Project Typical “Park-like” Infrastructure

DEVA Data Management Workshop Devil’s Hole Pupfish Project Cost vs. Benefits $$ Technology changing at a rapid rate Costs over time Secure System Control Accessibility by others Keeping pace with new formats Lower cost for same technology Less secure Less maintenance and migration

DEVA Data Management Workshop Devil’s Hole Pupfish Project NPS GSS Standard Procedures for Backup, Storage, & Recovery Infrastructure - Policies and Guidance NPS General Support System, Backup Activity Plan. Oversight on Information Technology Department of Interior (DOI) National Park Service (NPS) Office of Management and Budget (OMB) National Institute of Standards and Technology (NIST)