Research of a Data Management Framework for University Cloud Computing

Neuroforum ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Michael Hanke ◽  
Franco Pestilli ◽  
Adina S. Wagner ◽  
Christopher J. Markiewicz ◽  
Jean-Baptiste Poline ◽  
...  

Abstract Decentralized research data management (dRDM) systems handle digital research objects across participating nodes without critically relying on central services. We present four perspectives in defense of dRDM, illustrating that, in contrast to centralized or federated research data management solutions, a dRDM system based on heterogeneous but interoperable components can offer a sustainable, resilient, inclusive, and adaptive infrastructure for scientific stakeholders: An individual scientist or laboratory, a research institute, a domain data archive or cloud computing platform, and a collaborative multisite consortium. All perspectives share the use of a common, self-contained, portable data structure as an abstraction from current technology and service choices. In conjunction, the four perspectives review how varying requirements of independent scientific stakeholders can be addressed by a scalable, uniform dRDM solution and present a working system as an exemplary implementation.


2012 ◽  
Vol 12 (11) ◽  
pp. 1237-1242 ◽  
Author(s):  
Walter Cedeno ◽  
Simson Alex ◽  
Edward P. Jaeger ◽  
Dimitris K. Agrafiotis ◽  
Victor S. Lobanov

2017 ◽  
Author(s):  
Andrei Tsaregorodstsev ◽  

Author(s):  
Kyuseok Shim ◽  
Sang Kyun Cha ◽  
Lei Chen ◽  
Wook-Shin Han ◽  
Divesh Srivastava ◽  
...  

Author(s):  
Dennis Guster ◽  
Olivia F. Lee

Currently, organizations are increasingly aware of the need to protect their computer infrastructure to maintain continuity of operations. This process involves a number of different concerns including: managing natural disasters, equipment failure, and security breaches, poor data management, inadequate design, and complex/impractical design. The purpose of this article is to delineate how virtualization of hosts and cloud computing can be used to address the concerns resulting in improved computer infrastructure that can easily be restored following a natural disaster and which features fault tolerant hosts/components, isolates applications security attacks, is simpler in design, and is easier to manage. Further, because this technology has been out for a number of years and its capabilities have matured an attempt has been made to describe those capabilities as well as document successful applications.


Sign in / Sign up

Export Citation Format

Share Document