PetaLibrary Storage Service MOU
|
|
|
- Randell Wilson
- 10 years ago
- Views:
Transcription
1 University of Colorado Boulder Research Computing PetaLibrary Storage Service MOU 1. INTRODUCTION This is the memorandum of understanding (MOU) for the Research Computing (RC) PetaLibrary Storage Service. It includes both a Service Level Agreement (services provided to the customer) and an End User Agreement (terms agreed to by the customer). 2. DESCRIPTION OF SERVICE The PetaLibrary is a National Science Foundation-subsidized service for the storage and archival of research data. It is available to any US-based researcher affiliated with the University of Colorado Boulder. 2.1 Service Classes: Two main classes of storage are available: Active for data that is frequently written or read directly accessible (read/write) from computational resources within the CU RC environment accessible from outside the CU RC environment only via specific data transfer protocols (scp, sftp, gridftp/globusonline) through designated gateway nodes mounted as /work/<projectname> not designed for highly I/O-intensive or massively parallel usage snapshots (on-disk incremental backups) can be enabled Archive for data that is used infrequently accessible only via specific data transfer protocols (scp, sftp, gridftp/globusonline) through designated gateway nodes mounted as /archive/<projectname>
2 2.2 Service Details: We offer five specific storage services. Each customer project will be associated with one of these services. Storage space must be pre-purchased, with a minimum purchase of 2 TB for 1 year. Active - single copy on disk Appropriate for non-critical data No protection against accidental file deletion unless snapshots are enabled No protection against catastrophic failure of the primary storage system Active with replication - as above but with files replicated at least once a day to a disk system in a different building Appropriate for data that would be difficult to recreate Some protection against accidental file deletion Good protection against catastrophic failure of the primary storage system Good protection against loss of the primary data center Replication happens at least once per day Active plus one copy on tape - a single copy of each file is saved to tape Appropriate for data that would be difficult to recreate Good protection against catastrophic failure of the primary storage system Does not allow restoring all files to a point in time ; rather, only the most recent version of each file is saved on tape Recovery of data from tape can only be done by RC technical staff Copy to tape is made once per day Does not work well with many (hundreds of thousands) of small (under 128 KB) files Archive - single copy in hierarchical storage management (HSM) Appropriate for non-critical data that is used infrequently Recently-used files are stored on disk Files that have not been accessed recently are automatically migrated to tape Files that have been migrated to tape are still visible in the HSM file system and can be accessed via the usual interface, but there will be a delay of at least several minutes while they are read from tape A maximum of 30% of the project s pre-purchased data space can be resident on disk at any time The maximum size of an individual file is 2 TB. The average file size must be greater than 100 MB (enforced via a limit on the total number of files: 10,000 files per TB of space purchased.) It may be necessary to tar or zip your data to fit these requirements No protection against accidental file deletion No protection against mechanical failure of a tape cartridge Archive plus one copy on tape Appropriate for data that would be difficult to recreate but that is used infrequently Good protection against mechanical failure of a tape cartridge
3 Does not allow restoring all files to a point in time ; rather, only the most recent version of each file is saved on tape Recovery of data from tape can only be done by RC technical staff 3. END-USER EXPECTATIONS 3.1 Usage: See Appendix A for the End User Agreement, which must be signed and returned to RC by the PI before a project can be set up. 3.2 User/Group Administration: Every research group using the PetaLibrary Service may provide RC with up to two official contacts: the Principal Investigator (PI) and an alternate Point Of Contact (POC) person. The PI must be a CU-Boulder faculty member. These two people are the only ones authorized to make changes to the set of users that comprise a group, to add or remove users on the access list, or to request other changes on behalf of the project. Any change request that may impact a group will have to come through the PI or POC. Without such approval, RC and OIT will not act on group-level requests. Change and service requests must be made through the RC ticketing system. The PI and POC should verify their list of users on a yearly basis. Note that while IdentiKey passwords may be terminated after a person leaves the university, his or her files will be retained in the PetaLibrary Service. This is done to ensure that shared files do not accidentally become unusable by a research group when one user account becomes inactive. It does place an additional burden on the PI and POC to purge old data periodically. The PetaLibrary Service relies on CU-Boulder's IdentiKey and LDAP infrastructure. All users must have a valid IdentiKey and their LDAP record must accurately reflect their school/department affiliation. RC will work with OIT and your department administrators to clean up the LDAP records, if needed. The IdentiKey requirement implies that all users are CU-Boulder faculty, students, staff, or affiliates. Note that any CU-Boulder faculty member can sponsor a non-cu person as an affiliate, and then add them to the service. RC cannot act as the sponsor. 3.4 Costs/Fees: The cost to the PetaLibrary end users is heavily subsidized. End users pay actual media costs for disk/tape space plus a modest overhead (for datacenter rent and similar costs.) Please see Appendix B for the costs of the different services.
4 3.5 Ownership of Media: The disks and tapes that your data resides on belong to RC and may not be removed from the PetaLibrary. 4. SERVICE EXPECTATIONS 4.1 Service levels: We define two levels of service: Sensitive, where service is provided from Monday through Friday 8am to 5pm, including after-hours support on those weekdays with best effort. There is no guarantee of weekend or holiday support, though RC will try to respond to incidents impacting the operation of the service with best effort. Tolerant, where service is provided during business hours only, Monday through Friday, 8am to 5pm. RC will operate the PetaLibrary Service as a hybrid between the Sensitive and Tolerant service levels. The backend storage systems and gateway nodes will be Sensitive. Customerinitiated support requests (e.g., group membership or permission changes) will be Tolerant. While every reasonable and good faith effort will be made to ensure the reliability and availability of the PetaLibrary and of the files stored on it, access to data in the PetaLibrary may be affected by circumstances outside of the control of Research Computing. 4.2 Accessing storage: Active storage is directly accessible for read/write via NFS from computational resources within the CU RC environment, including login and compute nodes. It is also directly accessible from login and compute nodes in the blanca ( condo ) cluster. Archive storage is directly accessible for read/write within the CU RC environment from the login nodes only. Access via the login nodes is provided to facilitate movement of data from other RC storage; it is emphatically not to be used for frequent reads/writes of archived data. To access Active or Archive storage from outside of RC, it is necessary to use scp, sftp, or rsync through login.rc.colorado.edu, or gridftp/globus through colorado#gridftp. gridftp/globus will almost always provide much higher throughput than scp, sftp, or rsync, and is the preferred protocol for any but the smallest transfers. All of these methods require authentication via RC s One Time Password (OTP) system. If a customer requires automated transfers that would be awkward with OTP authentication, access through a datamover node using scp (with ssh keys) can be provided to hosts within the CU-Boulder campus network.
5 All Active or Archive projects are also eligible to use the Globus Sharing service, in which Globus Online can be used to provide read and/or write access to your data space to anyone with a Globus account. A CU Identikey or RC OTP is not necessary for Sharing access. RC will sponsor one free Globus Plus account (for Sharing administration) per PetaLibrary project. 4.3 Duration of Service: The hardware infrastructure supporting the PetaLibrary Service is funded initially through a National Science Foundation grant. This support ends May 30, Operation of the PetaLibrary beyond that date may be contingent on continued NSF or University funding and cooperation. In the event that RC ceases to provide the PetaLibrary or any comparable resource, RC will give at least 60 days advance notice. It will be the responsibility of the customer to transfer their data to other storage resources within that time window. 4.4 Amount of storage available: The existing PetaLibrary infrastructure can support 650 TB of Active storage and about 1100 TB of Archive storage. In order to provide the service to a reasonably wide set of customers, initial buy-ins will be limited to 75 TB of Active storage and 100 TB of Archive storage. Customers who are Co-PIs on the NSF grant will get priority when requesting space. When it becomes more clear which services have the highest demand, RC can purchase additional infrastructure to support those services. 4.5 Reporting: A report detailing the project s current storage usage will be ed within 10 days after the end of each month to the PI and the POC. At least once per year, RC will provide a list of users to all PIs and POCs showing the names and IdentiKeys for every user who has access to the project s data. 4.6 Maintenance: Planned maintenance of the RC infrastructure, including the PetaLibrary hardware, will take place on the first Wednesday each month. RC will broadcast the announcement on the rcannounce list (which all users are strongly encouraged to join) and the RC web site. 4.7 Change management: RC will try to announce to all PetaLibrary customers any major changes to the system a minimum of 30 days in advance. Exceptions may be critical security updates and bug fixes that improve the stability of the system significantly.
6 4.8 Performance: RC will provide suggested throughput performance targets for each service type; however, since the PetaLibrary is a shared infrastructure actual performance may vary depending on workload from other customers. 4.9 Refunds: We are not able to process refunds or pro-rate the PetaLibrary fee for any time lost due to repairs or maintenance events (planned or otherwise), nor for any datacenter-related down time User training: Training on file transfer to and from the PetaLibrary is part of our RC workshop series. RC can schedule a 30 minute consultation session to help customer groups learn to use the PetaLibrary most efficiently. 5. HELP/SUPPORT REQUESTS PetaLibrary Service users may make help and support requests through the RC ticket system. While RC will make every effort to respond to and resolve support requests, those support requests which require domain-specific knowledge or expertise may not be able to be handled by RC alone. In these cases, the support request may be forwarded to the POC for assistance.
7 APPENDIX A: End User Agreement University of Colorado Boulder PetaLibrary use agreement I, the undersigned, agree that my use of and access to the digital storage facility known as the University of Colorado Boulder PetaLibrary shall be in accordance with all of the following stipulations: I will not store on the PetaLibrary any files that are US government classified, or subject to the US federal Health Insurance Portability and Accountability Act (HIPAA), the US federal Family Educational Rights and Privacy Act (FERPA), the International Traffic in Arms Regulations (ITAR), or other restrictions described at IT Policies: University of Colorado System Administrative Policies CU-Boulder Policies and Guidelines OIT Campus-wide IT Policies Health Insurance Portability and Accountability Act (HIPAA): Family Educational Rights and Privacy Act (FERPA): International Traffic in Arms Regulations (ITAR): CU-Boulder Private and Restricted Data Security Requirements: I will not store on, or distribute from, the PetaLibrary any files that are copyrighted, except with the express permission of the copyright owner. If any of the files that I store on the PetaLibrary are subject to one or more agreements with any Institutional Review Board (IRB), including but not limited to the IRB of the University, then I will take full responsibility for ensuring full compliance with such agreement(s). If I am collaborating with colleagues who are at institutions outside of the United States of America (that is, outside of both US states and US territories), then I will take full responsibility for ensuring that those colleagues do not access the PetaLibrary themselves, but rather I and/or or other members of my team who are at US institutions will access the PetaLibrary on behalf of the entire team.
8 I understand that, if and when I cease to be employed by and/or a student at an institution in the United States of America, then access to my files on the PetaLibrary will be available only to those of my collaborators who are employed by and/or students at US institutions. I will take full responsibility for ensuring that my use of the PetaLibrary is in full compliance with the most current version of the University s Acceptable Use Policy, currently accessible at If I am one of the Principal/Co-Principal investigators of a team, then I will take full responsibility for ensuring that any other members of the team are likewise in full compliance. I will provide the RC with a yearly report of research activities supported by the PetaLibrary and I will acknowledge the PetaLibrary in publications as following: This work was supported in part by the Scalable Petascale Storage Infrastructure funded by NSF under grant OCI I understand that the ability of the University to provide the PetaLibrary is contingent on continued National Science Foundation funding and cooperation; that the University provides the PetaLibrary on an as-is basis, and while every reasonable and good faith effort will be made to ensure the reliability and availability of the PetaLibrary and of the files stored on it, the Research Computing at CU Boulder makes no guarantees with respect to its reliability or continued availability. In the event that Research Computing ceases providing the PetaLibrary or any comparable resource, then I will take full responsibility for transferring any and all relevant files to other storage resources, and in a timely manner. I will take full responsibility for ensuring that I keep abreast of and comply with changes to any of the relevant laws, policies and circumstances described above. (Please initial to demonstrate agreement with each of the above statements.) Signature: Date: Print Name: Institution: Contact Information: Phone:
9 APPENDIX B: Order Form Please scan and to Project name: (should be specific to group or project; will be used in directory path; should not change over life of project; cannot include spaces. Good example: smith_mri. Bad example: labdata.) Service Cost/TB/yr TB (min 2) Years (min 1; max 5*) Total Cost Active $70 Active plus replication Active plus one copy on tape $140 $90 Archive (HSM) $40 Archive plus one copy on tape $50 Requested start date Speedtype to charge Speedtype owner Project PI IdentiKey Dept Project POC IdentiKey Dept Do you want snapshots enabled (Active options only)? Y / N I have read and agree to the PetaLibrary Storage Service MoU. Signature of PI Date * Cannot extend beyond May 30, 2018.
Best Practices for Research Data Management. October 30, 2014
Best Practices for Research Data Management October 30, 2014 Presenters Andrew Johnson Research Data Librarian University Libraries Shelley Knuth Research Data Specialist Research Computing Outline What
Globus and the Centralized Research Data Infrastructure at CU Boulder
Globus and the Centralized Research Data Infrastructure at CU Boulder Daniel Milroy, [email protected] Conan Moore, [email protected] Thomas Hauser, [email protected] Peter Ruprecht,
SUNY Learning Network Service Level Agreement Blackboard Learn Application and Hosting Services
SUNY Learning Network Service Level Agreement Blackboard Learn Application and Hosting Services Scope The SUNY Learning Network (SLN) offers SUNY campuses a managed hosting environment for the Blackboard
Berkeley Research Computing. Town Hall Meeting Savio Overview
Berkeley Research Computing Town Hall Meeting Savio Overview SAVIO - The Need Has Been Stated Inception and design was based on a specific need articulated by Eliot Quataert and nine other faculty: Dear
Research Technologies Data Storage for HPC
Research Technologies Data Storage for HPC Supercomputing for Everyone February 17-18, 2014 Research Technologies High Performance File Systems [email protected] Indiana University Intro to HPC on Big
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
Multi-Terabyte Archives for Medical Imaging Applications
Multi-Terabyte Archives for Medical Imaging Applications This paper describes how Windows servers running XenData Archive Series software provide an attractive solution for storing and retrieving multiple
Application Brief: Using Titan for MS SQL
Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical
Enterprise UNIX Services - Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
IBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle
Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle Agenda Introduction Database Architecture Direct NFS Client NFS Server
ESXi Cluster Services - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between the customer and IST Infrastructure Services (IST-IS) to document: The technology services IST-IS provides to the customer The targets
The syslog-ng Store Box 3 LTS
The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance
Hitachi NAS Platform and Hitachi Content Platform with ESRI Image
W H I T E P A P E R Hitachi NAS Platform and Hitachi Content Platform with ESRI Image Aciduisismodo Extension to ArcGIS Dolore Server Eolore for Dionseq Geographic Uatummy Information Odolorem Systems
University Systems Desktop Support Service Level Commitment
University Systems Desktop Support Service Level Commitment The Purpose of this Service Level Commitment (SLC) is to formally define the level of service University Systems will provide to UVic faculty,
The safer, easier way to help you pass any IT exams. Exam : E20-895. Backup Recovery - Avamar Expert Exam for Implementation Engineers.
http://www.51- pass.com Exam : E20-895 Title : Backup Recovery - Avamar Expert Exam for Implementation Engineers Version : Demo 1 / 7 1.An EMC Avamar customer is currently using a 2 TB Avamar Virtual Edition
Isilon OneFS. Version 7.2.1. OneFS Migration Tools Guide
Isilon OneFS Version 7.2.1 OneFS Migration Tools Guide Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information in this publication is accurate
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
CTERA Portal Datacenter Edition
Administrator Guide CTERA Portal Datacenter Edition November 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any
PSU Hyland OnBase Document Imaging and Workflow Services Level Memorandum of Understanding
PSU Hyland OnBase Document Imaging and Workflow Services Level Memorandum of Understanding Table of Contents -I. Summary -II. Service Description-Scope of OnBase Document Imaging and Workflow Service Integration
Cloud-based Managed Services for SAP. Service Catalogue
Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...
Service Level Agreement. Server Hosting
Service Level Agreement Server Hosting Institute for Quantitative Social Science (IQSS) and Harvard MIT Data Center (HMDC) 15 October 2009 1. Overview This service level agreement defines the baseline
It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore
It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore All trademark names are the property of their respective companies. This publication
CENG Information Technology Services University of North Texas
CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS
Advice for Virtualizing Exchange 2010 Server Roles
E-Guide Advice for Virtualizing Exchange 2010 Server Roles When virtualizing Exchange Server 2010, it's important to correctly configure virtual machines (VMs) that will host certain Exchange Server roles
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
The syslog-ng Store Box 3 F2
The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Best Practices for Data Management. RMACC HPC Symposium, 8/13/2014
Best Practices for Data Management RMACC HPC Symposium, 8/13/2014 Presenters Andrew Johnson Research Data Librarian CU-Boulder Libraries Shelley Knuth Research Data Specialist CU-Boulder Research Computing
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
IT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
DATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
Confidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129
Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the
Enterprise File Service
` Service Definition Enterprise File Service Draft Version 1.6 Signoff: Name Role Signature & Date Mark Fortini Director, IT infrastructure Services Page 1 of 22 16/03/2011 Document Control Information
DATA CENTER SERVICE CATALOG
DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI
Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services
CUSTOMER SUCCESS STORY Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CLIENT PROFILE Industry: IT services Company: Broadcloud Staff: 40-plus BUSINESS
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
How To Support A Client On A Contract With Bps Resolver
Service Level Agreement for Vendor-Hosted Solution Introduction This Vendor-Hosted Service Level Agreement ( SLA ) describes certain performance and security components regarding the services provided
Appendix C Pricing Index DIR Contract Number DIR-TSO-2724
Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers
Guideline for E-mail Services
Guideline for E-mail Services Under the Policy on Information Technology, the Vice-President and Provost is authorized to establish guidelines for information technology services at the University of Toronto.
syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com
syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.
For more information, please visit the IST Service Catalog at http://ist.berkeley.edu/services/is/calweb-iis
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windows Team to document: The technology services the Enterprise Windows Team provides to the customer The targets
Quick Start - NetApp File Archiver
Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
ensurcloud Service Level Agreement (SLA)
ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and
BACKUP SOLUTIONS FOR SCHOOLS. Advice and Guidance. ICT Services 42 New Union Street Coventry CV1 2HN
BACKUP SOLUTIONS FOR SCHOOLS Advice and Guidance ICT Services 42 New Union Street Coventry CV1 2HN Revision History and Approval Date Author Version Comments Approval 26/02/2014 Alison York 1.00 Initial
Systems Support - Standard
1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
Backup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level -ORACLE TIMESTEN 11gR1 CASE STUDY Oracle TimesTen In-Memory Database and Shared Disk HA Implementation
XenData Archive Series Software Technical Overview
XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic
How To Use A Microsoft Microsoft Database Server 2012
OFFICIAL MICROSOFT LEARNING PRODUCT 10775A Lab Instructions and Lab Answer Key: Administering Microsoft SQL Server 2012 Database Information in this document, including URL and other Internet Web site
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein
IBM Global Technology Services September 2007. NAS systems scale out to meet growing storage demand.
IBM Global Technology Services September 2007 NAS systems scale out to meet Page 2 Contents 2 Introduction 2 Understanding the traditional NAS role 3 Gaining NAS benefits 4 NAS shortcomings in enterprise
1. Backup and Recovery Policy
POLICY TITLE: POLICY #: IT - 2 DATE DRAFTED: 09/23/05 APPROVED DATE: 09/23/05 REVISION DATE: BRIEF DESCRIPTION: Backup and Recovery Policy Minimum requirements for the creation and retention of computer
Service Level Agreement (SLA)
Service Level Agreement (SLA) Between [Add your department and acronym ()] Technology Systems Division (TSD) Information Technology Unit (ITU) and XYZ For XYZ Service Document Version History Version #
Backup to the Cloud Service Definition
Backup to the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Backup to the Cloud service to enable organisations
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
About Backing Up a Cisco Unity System
CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues
Backup and Recovery With Isilon IQ Clustered Storage
Backup and Recovery With Isilon IQ Clustered Storage An Isilon Systems Best Practices Guide August 2007 ISILON SYSTEMS 1 Table of Contents 1. Assumptions... 4 2. Introduction... 4 3. Data Protection Strategies...
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
Diagram 1: Islands of storage across a digital broadcast workflow
XOR MEDIA CLOUD AQUA Big Data and Traditional Storage The era of big data imposes new challenges on the storage technology industry. As companies accumulate massive amounts of data from video, sound, database,
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers
Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers What You Will Learn This document describes how you can use Cisco Wide Area Application Services (WAAS) Software
Office of Information Technology Hosted Services Service Level Agreement FY2009
Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support
Big Data Analytics Service Definition G-Cloud 7
Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated
Sentinel Platform/Managed IT Services Agreement Page 1 of 6. 1. Term of Agreement
Page 1 of 6 1. Term of Agreement This Agreement between, herein referred to as Client, and Word of Mouth Computers and Electronics, LLC hereinafter referred to as Service Provider, is effective on the
Hyper-V backup implementation guide
Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V
Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University
Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University 1 Backup & Recovery Goals and Challenges Traditional/EMU s Old Environment Avamar Key Features EMU
Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey
Exchange Data Protection: To the DAG and Beyond Whitepaper by Brien Posey Exchange is Mission Critical Ask a network administrator to name their most mission critical applications and Exchange Server is
Education and Workforce Development Cabinet POLICY/PROCEDURE. Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012
Education and Workforce Development Cabinet POLICY/PROCEDURE Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012 Subject: Backup Procedures Tower and Server Farms Policy:
