Safe Replication Sample Clauses

Safe Replication. Data replication imposes the following requirements on the AAI.  Consistent (federated) identities are needed.  Delegation is necessary.  Support for automated services (services which can authenticate themselves to other services without human intervention) is required.  Consistent access control management across all replicas (as well as potentially other security attributes) is necessary.  Community managers need to manage access control permissions.  Data centres must be authenticated (host/service certificates).  Access is logged – so persistent, unique, and non-reusable user ids are required. Traceability may be required.  The technology must work with iRODS (also for automated services).
AutoNDA by SimpleDocs
Safe Replication. The ”Safe Replication” service enables EUDAT communities to easily create replicas of their scientific datasets in multiple data centres. This service can be considered as the fundamental service in EUDAT for storing data reliably, accessible and persistently in an environment of distributed repositories in different administrative domains. The degree of reliability, accessibility and persistency depends of the the variety of storage technologies used, the number of replicas and the quality of assurance that the centres are offering. While deliverable D4.1.1 provides more information about the requirements associated with such a service, deliverable D5.1.1 outlines several technology areas that are required, along with potential candidates. This section is based on these two documents and describes the implementation of the early candidate services in order to realize the “Safe Replication” service.
Safe Replication. The Safe Replication services are based on the use of the policy engine iRODS and various micro- services. In the different community islands, a total of seven partner sites (e.g. community and service provider data centres) have set up pilot iRODS instances to test cross-site replication. After solving some network issues (e.g. opening ports within a firewall), the basic tests that were conducted were successful. Some performance issues were found which proved to be due to some configurations and the calculation of checksums. After some optimizations, the performance has been improved. The next steps are to move the pilot iRODS instances to production systems, which are integrated both with the mass storage systems of the partners, and with local and EUDAT operations. After setting up the basic core services, the task force has focused on building the PID micro-service to automatically register PIDs to DOs on ingest and to keep track of replicas. Part of the PID building process has included discussions on the replication policies, because these influenced both the registration of the replicas and linking the replicas to the original DO. This issue lead to the use of the RoR field which always points back to the original DO. The PID micro-service has been implemented and has been successfully demonstrated in the CLARIN island. The next step is to extend the tests to the other islands. For the registration of PIDs, EUDAT is going to use EPIC handle service, and hence EUDAT is negotiating with the EPIC consortium to develop an MoU. In its initial phase, the Safe Replication service is considered to be a data management tool that enables community data managers to define and apply the community replication policies. Because the number of users requiring direct access is limited and user level access is still provided via community specific services and portals, this phase of the Safe Replication does not depend on a federated AAI solution. It is expected that the safe replication candidate service will be handed over to the operations team in M12 of the EUDAT project (that is, September 2012).

Related to Safe Replication

  • Third Party Software/Open Source Nothing in this Agreement shall restrict, limit or otherwise affect any rights or obligations You may have, or conditions to which You may be subject, under any applicable open source licenses to any open source code contained in the Software. The Software may include or be bundled with other software programs licensed under different terms and/or licensed by a licensor other than Licensor. Use of any software programs accompanied by a separate license agreement is governed by that separate license agreement. Any third party software that may be provided with the Software is included for use at Your option.

  • Required hardware and software The minimum system requirements for using the DocuSign system may change over time. The current system requirements are found here: xxxxx://xxxxxxx.xxxxxxxx.xxx/guides/signer-guide- signing-system-requirements. Acknowledging your access and consent to receive and sign documents electronically To confirm to us that you can access this information electronically, which will be similar to other electronic notices and disclosures that we will provide to you, please confirm that you have read this ERSD, and (i) that you are able to print on paper or electronically save this ERSD for your future reference and access; or (ii) that you are able to email this ERSD to an email address where you will be able to print on paper or save it for your future reference and access. Further, if you consent to receiving notices and disclosures exclusively in electronic format as described herein, then select the check-box next to ‘I agree to use electronic records and signatures’ before clicking ‘CONTINUE’ within the DocuSign system. By selecting the check-box next to ‘I agree to use electronic records and signatures’, you confirm that: • You can access and read this Electronic Record and Signature Disclosure; and • You can print on paper this Electronic Record and Signature Disclosure, or save or send this Electronic Record and Disclosure to a location where you can print it, for future reference and access; and

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Inputs 921 The following resources constitute a suitable, but neither exhaustive nor normative suite of the process inputs:

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Trunk Group Architecture and Traffic Routing The Parties shall jointly engineer and configure Local/IntraLATA Trunks over the physical Interconnection arrangements as follows:

  • Accessories, Spare Parts and Tools 1. In determining whether all the non-originating materials used in the production of a good undergo the applicable change in tariff classification or a specific manufacturing or processing operation set out in Annex 2, accessories, spare parts or tools delivered with the good that form part of the good's standard accessories, spare parts or tools, shall be disregarded, provided that:

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.