Data archiving Sample Clauses

Data archiving. As noted above, hydroacoustic surveys typically produce several hundred megabytes of data and so a substantial and robust data archiving system is essential. The safe storage of such data is essential not only in order to allow analyses to be repeated with contemporary software using variations in analytical parameters, but also to allow them to be revisited with future developments in analytical software which may allow their analysis in new ways. In addition, unless read into dedicated playback or analysis software which can be cumbersome when large volumes of files are being managed, raw data files are largely uninformative other than perhaps the date and time of their collection being incorporated into the file name. Consequently, archived raw data files should be accompanied by metadata files. The latter can be as simple as spreadsheets, or as complex as a relational database or geographic information system. Acknowledgements Many people have contributed to our understanding and practicing of hydroacoustics through informative discussions and exchanges of information over many years. Although these individuals are too numerous to name in full here, we would like to record our particular thanks to Xxxxx Xxxx (University of Oslo, Norway), Xxxxxx Xxxxxxxxxx (BioSonics Inc., U.S.A.), Xxx Xxxxxx (BioSonics Inc., U.S.A.), Xxxxxxxxxx Xxxxxxxxx (Inland Fisheries Institute, Poland), Xxx Xxxxxxx (Environment Agency, U.K.), Xxx Xxxxxxxxxxxx (Myriax Software Pty Ltd, Australia), Xxxxx Xxxxxxx (Xxxxxx Xxxxxxxxx Maritime AS, Norway), Xxx Xxxxxxx (Biology Centre of the Academy of Sciences , Czech Republic), Xxx XxXxxxx (BioSonics Inc., U.S.A.), Xxxxxxx Xxxxxx (Lindem Data Acquisition and University of Oslo, Norway), Xxxxx Xxxxxx (Hydroacoustic Technology Inc., U.S.A.) and Xxxx Xxxxxx (Myriax Software Pty Ltd, Australia). Xxxxx Xxxx and Xxx Xxxxxxx also kindly commented on a draft of this document. However, this acknowledgement does not imply that any of these individuals or their organisations necessarily agree with all of the contents of this article and any errors or opinions expressed here remain our own. Finally, we thank Xxxxx Xxxxxxxx for creating the figures. References Xxxxx, X.X. 1995. Stream ecology. Structure and function of running waters. Xxxxxxx & Xxxx, London, 388 pp. Aglen, A. 1983. Random errors of acoustic fish abundance estimates in relation to the survey grid density applied. FAO Fisheries Report 300: 293-298. Xxxx, X., Xxxxxx, X. and Xxxxxxx, X....
AutoNDA by SimpleDocs
Data archiving. The Collaboration Board shall elaborate in due time a data archiving strategy and long term data access, evaluate its cost and will propose to the Financial Board its implementation.
Data archiving. It is advised that original data will be archived on a hard disk (on a laptop/desktop PC) at the partner’s institution. The lead researcher in charge will make additional backup copies of the data at least once a week on a remote hard disk. This remote hard disk then will be kept in a secure area (possibly outside the laboratory – for data redundancy reasons). Processed data is also to be uploaded to the FTP site (see section 6.5.1), which will act as an additional back-up and system to share information between the partners.
Data archiving. Hubspan reserves the right to archive certain data beginning 60 days after transaction date. Hubspan Service Level Agreement This Service Level Agreement provides definitions used throughout the document, defines Priority Levels relative to Technical Support, and includes details relative to Technical Support Services. In addition, this document defines exclusions to Hubspan’s Service.
Data archiving. 7.1 Subject to the pre-existing obligations above, storage of data is the responsibility of the User/Establishment to whom it belongs. Unless the Instruct-XXXX Centre explicitly offers a data archive service, Users are responsible for copying and making arrangements for the long-term storage of the Experimental Data. In this latter case the facility will collect and maintain an accountable proof of the transfer of the data to the user, for verification purposes.
Data archiving. The use case is about implementing data archiving for raw data from experiments to an external facility and the restore of the data. STFC38 has worked in this use case, both as a provider of storage to be used for archiving (ECHO Storage at STFC) and for investigating solutions to perform efficient backup. Initially the Rucio39 and FTS40 services have been evaluated in order to move data from ILL as a facility selected as pilot. Both services are available in the EOSC portal41, 42and offered by STFC as a provider. In order to use Rucio and FTS, there has been the need to install a gridftp server on the ILL facility as the data transfer is implemented only between storage endpoints. After the initial tests, the archive solution via Rucio has been discarded due to the need to ingest datasets inside the Rucio database which is a requirement to perform the data archiving operations. The usage of rclone43 has then been piloted, given that the storage at STFC offers also an S3 interface which is easily accessible via that tool. The pilot via rclone has given successful results in terms of usability and performance, and the amount of data archived at STFC storage has reached 200 TB.

Related to Data archiving

  • Archiving You may make one copy of the Software solely for archival purposes. If the Software is an upgrade, you may use the Software only in conjunction with upgraded product. If you receive your first copy of the Software electronically, and a second copy on media afterward, the second copy can be used for archival purposes only. For all Neevia Tech products, you agree that you will only use our software on a server and all applications that will access the server will reside on the server and you will not permit remote access to the software except through your application residing on the server. You agree to surrender your license(s) if you violate this agreement. If you violate this agreement, you will not receive a refund upon termination of this license. You agree not to utilize our software to violate the copyright of any third parties. If you do violate the copyright of a third party utilizing our software, you agree to hold Neevia Tech harmless and will indemnify Neevia Tech for any such activity even if the violation is unintentional. COPYRIGHT The Software is owned by Neevia Tech and/or its suppliers, and is protected by the copyright and trademark laws of the United States and related applicable laws. You may not copy the Software except as set forth in the "License" section. Any copies that you are permitted to make pursuant to this Agreement must contain the same copyright and other proprietary notices that appear on or in the Software. You may not rent, lease, sub-license, transfer, or sell the Software. You may not modify, translate, reverse engineer, decompile, disassemble, or create derivative works based on the Software, except to the extent applicable law expressly prohibits such foregoing restriction. You may use the trademarks to identify the Software owner's name, or to identify printed output produced by the Software. Such use of any trademark does not give you any rights of ownership in that trademark. NO WARRANTY LICENSED SOFTWARE (S) - "AS IS" The Software is provided AS IS. NEEVIA TECH AND ITS SUPPLIERS MAKE NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE MERCHANTABILITY, QUALITY, NONINFRINGEMENT OF THIRD PARTY RIGHTS, FITNESS FOR A PARTICULAR PURPOSE, AND THOSE ARISING BY STATUTE OR OTHERWISE IN LAW OR FROM A COURSE OF DEALING OR USAGE OF TRADE. THE ENTIRE RISK AS TO THE QUALITY, RESULTS BY USING THE SOFTWARE, AND PERFORMANCE OF THE SOFTWARE IS WITH THE END USER. Some states or jurisdictions do not allow the exclusion or limitation of incidental, consequential or special damages, or the exclusion of implied warranties or limitations on how long an implied warranty may last, so the above limitations may not apply to you or your company.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • Data Analysis In the meeting, the analysis that has led the College President to conclude that a reduction- in-force in the FSA at that College may be necessary will be shared. The analysis will include but is not limited to the following: ● Relationship of the FSA to the mission, vision, values, and strategic plan of the College and district ● External requirement for the services provided by the FSA such as accreditation or intergovernmental agreements ● Annual instructional load (as applicable) ● Percentage of annual instructional load taught by Residential Faculty (as applicable) ● Fall 45th-day FTSE inclusive of dual enrollment ● Number of Residential Faculty teaching/working in the FSA ● Number of Residential Faculty whose primary FSA is the FSA being analyzed ● Revenue trends over five years for the FSA including but not limited to tuition and fees ● Expenditure trends over five years for the FSA including but not limited to personnel and capital ● Account balances for any fees accounts within the FSA ● Cost/benefit analysis of reducing all non-Residential Faculty plus one Residential Faculty within the FSA ● An explanation of the problem that reducing the number of faculty in the FSA would solve ● The list of potential Residential Faculty that are at risk of layoff as determined by the Vice Chancellor of Human Resources ● Other relevant information, as requested

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.