Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Data Management Plan Section I. Types of Data Data produced as a result of the proposed project is expected to include publications, research posters, collaborative material such as a wiki or training materials, system data (which also includes user's usage history on the resource - the number of jobs run, the number of service units charged, the account the service units were charged to, the wall-time used executing the jobs, and the total time jobs waited to execute), and temporary data created during the execution of the project. Text documents including technical papers, theses, posters, and software documentation are expected to include figures in the form of tables and graphs. Further, research data in various scientific domain fields is expected to be produced by this system in the form of data sets, visualization sets, and other outputs. However, publication, dissemination, or release of these results or data sets will be the responsibility of the individual researcher. Resources can be provided by the members to assist researchers in publishing their data or results in appropriate formats. Section II. Data and Metadata Standards Textual/graphical documents will be made available in at least one of the following formats: plain text, PDF, HTML, MS Word, LaTeX due to their widespread use in business and academia. Section III. Policies for access and sharing and provisions for appropriate protection privacy Access to, sharing, and distributing of documents will be via web sites both locally and through the XSEDE User Portal (XUP) and publishing in conferences, journals, and monographs. Clemson University and the XUP/XDMoD will be the primary sites for storing and disseminating results of the proposed project. Documents will be made available as soon as they are published or otherwise released but in no case more than 6 months after created. The original author of each document or his or her institution will retain ownership of the IP. See Section V for details on facilities provided for distributing and protecting the data. Ethical and privacy issues are not anticipated in this project. Section IV. Policies and provisions for re-use, re-distribution All data is expected to be reusable and redistributable with proper attribution to the authors. Published papers will typically have copyrights as required by the publisher. Section V. Plans for Archiving and Preservation of access These data elements will be maintained for the required minimum of 3 years, or longer as demand dictates. In the event one or more of the PIs/application leads leave Clemson or one of the partner universities prior to this time the data will be moved to the relocating PI's new institution, and/or the original institution will maintain the data for the required duration. Data will be stored and archived utilizing the university’s central data center storage resources. Data storage will be under the protection of Clemson and will be modifiable only through a valid login ID that utilizes strong password requirements. Data encryption and host-based firewalls are available. The proposed system provides a rich set of storage capabilities that enable the user community to deploy diverse data plans that are appropriate to their research. The local high performance parallel file systems, block storage for VM environments and home directories are all connected to both archive nodes. Researchers can keep their data on long-term tape backed up storage at two sites. When a file is migrated to tape two copes are made on different tapes. Files can be at one site or two at the request of the researcher. The VM environment can be used to deploy storage gateways that link storage in the system with external sites for ingest of new data and exporting of existing data. The data center is staffed by CCIT on a 24-hour basis from a state of the art network operations center 1 within the ITC. Clemson’s data storage systems are monitored in Clemson’s Network Operations Center (NOC). The NOC utilizes cutting edge technology, equipment, and monitoring tools to proactively monitor the network infrastructure and critical computing systems and services provided by the university community, overseeing functionality, capacity and performance. The NOC operates 24x7x365 to provide top-level support and customer service to the university's research and academic communities and our affiliated partners. The data centers are physically protected by 24-7 surveillance cameras that are actively monitored and recorded. Monitoring of security anomalies is done via but not limited to Security Incident and Event Management based solutions with auto-reporting to the NOC and Clemson’s security team should an event occur. Access to the facility is protected by card access with a role-based scheme as to authorization. Additional layers of access are afforded to the machine room in which personnel have to demonstrate need, and participate in proper training that is renewed annually on applicable state and federal regulations (i.e., HIPAA, FERPA, FPPA, etc.). 2