Integration to data management Sample Clauses

Integration to data management. E-ARK web and the Access Software Platform E-ARK Web, which provide the data, the metadata and the services invoked by the Access Software Platform, provides data management via the Lily open source data management platform21. Xxxx combines big data storage, indexing and search, and unifies Apache HBase22, Hadoop23 and Solr24 into an integrated data platform that includes APIs25, a high-level data model and schema language, real-time indexing and the powerful search capacities of Apache Solr. The data management is seen as the technical component for maintaining IPs. One the one hand, there is the distributed AIP storage component and the dm-file-ingest service (Hadoop-MapReduce-Job)26 which allows uploading AIPs into an HDFS (Hadoop Distributed File System) storage cluster in order to make these available for distributed file ingest into the Lily repository. Using scheduled processing, new files added to the distributed storage for AIPs are automatically unpackaged, 15 Lightweight Directory Access Protocol xxxxx://xx.xxxxxxxxx.xxx/wiki/Lightweight_Directory_Access_Protocol 16 Active Directory xxxxx://xx.xxxxxxxxx.xxx/wiki/Active_Directory 17 Kerberos xxxxx://xx.xxxxxxxxx.xxx/wiki/Kerberos_(protocol) 18 Phyton xxxxx://xx.xxxxxxxxx.xxx/wiki/Python_(programming_language) 19 Encoded Archival Description. A non-proprietary de facto standard for the encoding of Finding Aids for use in a networked (online) environment. 20 The PREMIS Data Dictionary for Preservation Metadata is the international standard for metadata to support the preservation of Digital Objects and ensure their long-term usability. (xxxxx://xxx.xxx.xxx/standards/premis/v3/) 21 Xxxx xxxx://xxx.xxxxxxxxxxx.xxx/lily/index.html 22 Apache HBase xxxx://xxxxx.xxxxxx.xxx/ 23 Hadoop Distributed File System xxxxx://xxxxxx.xxxxxx.xxx/ 24 Apache Solr xxxx://xxxxxx.xxxxxx.xxx/solr/ 25 Aplication Programming Interface xxxxx://xx.xxxxxxxxx.xxx/wiki/Application_programming_interface 26 dm-file-ingest xxxxx://xxxxxx.xxx/eark-project/dm-file-ingest ingested, and indexed by the dm-file-ingest service. In this way, the Lily repository always has a complete directory of all files contained in the AIPs. On the other hand, there are various storage areas, such as the Local Storage to upload additional files from other sources by using the local file system, the Working Area, which is used in case an AIP must be transferred into a working environment where it can be unpackaged and modified, and the DIP storage, which ...
AutoNDA by SimpleDocs

Related to Integration to data management

  • Data Management Contractor will not use State data, including production data, for testing or development purposes unless authorized in writing by the State Chief Information Security Officer or delegate. Contractor will implement and maintain procedures to physically and logically segregate State data, unless otherwise explicitly authorized by the State Chief Information Security Officer or delegate.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • AIN Selective Carrier Routing for Operator Services, Directory Assistance and Repair Centers 4.3.1 BellSouth will provide AIN Selective Carrier Routing at the request of <<customer_name>>. AIN Selective Carrier Routing will provide <<customer_name>> with the capability of routing operator calls, 0+ and 0- and 0+ NPA (LNPA) 555-1212 directory assistance, 1+411 directory assistance and 611 repair center calls to pre-selected destinations.

Time is Money Join Law Insider Premium to draft better contracts faster.