66,048 research outputs found
To share or not to share: Publication and quality assurance of research data outputs. A report commissioned by the Research Information Network
A study on current practices with respect to data creation, use, sharing and publication in eight research disciplines (systems biology, genomics, astronomy, chemical crystallography, rural economy and land use, classics, climate science and social and public health science). The study looked at data creation and care, motivations for sharing data, discovery, access and usability of datasets and quality assurance of data in each discipline
Raising the visibility of protected data: A pilot data catalog project
Sharing research data that is protected for legal, regulatory, or contractual reasons can be challenging and current mechanisms for doing so may act as barriers to researchers and discourage data sharing. Additionally, the infrastructure commonly used for open data repositories does not easily support responsible sharing of protected data. This chapter presents a case study of an academic university library’s work to configure the existing institutional data repository to function as a data catalog. By engaging in this project, university librarians strive to enhance visibility and access to protected datasets produced at the institution and cultivate a data sharing culture
Leveraging OpenStack and Ceph for a Controlled-Access Data Cloud
While traditional HPC has and continues to satisfy most workflows, a new
generation of researchers has emerged looking for sophisticated, scalable,
on-demand, and self-service control of compute infrastructure in a cloud-like
environment. Many also seek safe harbors to operate on or store sensitive
and/or controlled-access data in a high capacity environment.
To cater to these modern users, the Minnesota Supercomputing Institute
designed and deployed Stratus, a locally-hosted cloud environment powered by
the OpenStack platform, and backed by Ceph storage. The subscription-based
service complements existing HPC systems by satisfying the following unmet
needs of our users: a) on-demand availability of compute resources, b)
long-running jobs (i.e., days), c) container-based computing with
Docker, and d) adequate security controls to comply with controlled-access data
requirements.
This document provides an in-depth look at the design of Stratus with respect
to security and compliance with the NIH's controlled-access data policy.
Emphasis is placed on lessons learned while integrating OpenStack and Ceph
features into a so-called "walled garden", and how those technologies
influenced the security design. Many features of Stratus, including tiered
secure storage with the introduction of a controlled-access data "cache",
fault-tolerant live-migrations, and fully integrated two-factor authentication,
depend on recent OpenStack and Ceph features.Comment: 7 pages, 5 figures, PEARC '18: Practice and Experience in Advanced
Research Computing, July 22--26, 2018, Pittsburgh, PA, US
Recommended from our members
3-D pain drawings-mobile data collection using a PDA
A large number of the adult population suffers from some kind of back pain during their lifetime. Part of the process of diagnosing and treating such back pain is for a clinician to
collect information as to the type and location of the pain that is being suffered.Traditional approaches to gathering and visualizing this pain data have relied on simple 2-D representations of the human body, where different types of sensation are recorded with various monochrome symbols. Although patients have been shown to prefer such drawings to traditional questionnaires, these pain drawings can be limited in their ability to accurately record pain. The work described in this paper proposes an alternative that uses a 3-D representation of the human body, which can be marked in color to visualize and record the pain data. This study has shown that the new approach is a promising development in this area of medical practice and has been positively received by patients and clinicians alike
Participatory Transformations
Learning, in its many forms, from the classroom to independent study, is being transformed by new practices emerging around Internet use. Conversation, participation and community have become watchwords for the processes of learning promised by the Internet and accomplished via technologies such as bulletin boards, wikis, blogs, social software and repositories, devices such as laptops, cell phones and digital cameras, and infrastructures of internet connection, telephone, wireless and broadband. This chapter discusses the impact of emergent, participatory trends on education. In learning and teaching participatory trends harbinge a radical transformation in who learns from whom, where, under what circumstances, and for what and whose purpose. They bring changes in where we find information, who we learn from, how learning progresses, and how we contribute to our learning and the learning of others. These trends indicate a transformation to "ubiquitous learning" ??? a continuous anytime, anywhere, anyone contribution and retrieval of learning materials and advice on and through the Internet and its technologies, niches and social spaces.not peer reviewe
- …