SlideShare a Scribd company logo
ICPSR AT 50:Facilitating Research and Data SharingPart III: Data ManagementIASSIST Vancouver, BCMay 31, 2011
Data Management begins at 11:45
Data Management AgendaData Management PlansComputing & Data Sharing in Secure EnvironmentsManaging Restricted Contracts
The Statement Heard Round the Research World:The National Science Foundation has released a new requirement for proposal submissions regarding the management of data generated using NSF support. Starting in January, 2011, all proposals must include a data management plan (DMP). The plan should be short, no more than two pages, and will be submitted as a supplementary document. The plan will need to address two main topics: What data are generated by your research? What is your plan for managing the data?
Data Management in DemandICPSR conducts webinars on data management plans:November 8, 2010: 134 attendJanuary 12, 2011:  535 attendFebruary 17, 2011: 71 attend
ICPSR’s DMP Web Sitewww.icpsr.umich.edu/ICPSR/dmp/
Guidelines for Download
ICPSR’s DMP Blog - FAQshttp://datamanagementplans.blogspot.com/
ICPSR’s DMP StatisticsJanuary 2011: 3,984 viewsJanuary – April 2011: 7,802 viewsWhere are they coming from?5,527 Direct (bookmarked, etc.)3,370 from Google search878 from NSF
Improving Data ManagementPotential increase in demand for data management services as a result of grant/contract requirementsIncrease in demand for processing, analysis, and distribution of sensitive dataResulted in improvements focused on secure computing and data sharing environments at ICPSR
Three Angles of SecuritySecure IngestSecure Computing in the CloudSecure Online Application & Tracking
ICPSRSecure Data ServicesWe'd tell you more, but then we'd have to kill you.
Two services; one platformSecure Data EnvironmentServes ICPSR staff
Protects against accidental data leakage
Uses firewalls, virtualized workstations to access content
Keeps the bad guys out Virtual Data EnclaveServes ICPSR users
Protects against accidental data leakage
Uses firewalls, virtualized workstations to access content
Keeps the bad guys outOne technology platform to rule them all
Technology componentsNeeded to stand up the services quickly and with little working capital for investment
Selected a strategy of investing in storage, and "renting" access and security servicesEMC NS 120 Network Attached Storage deviceUniversity of Michigan "desktop virtualization" product, the Virtual Desktop Infrastructure (VDI) serviceUniversity of Michigan "firewall virtualization" product, the Virtual Firewall service
EMC NAS Leverages existing infrastructure at ICPSR and experience with EMC products
Two NAS units (NS 120 model)
Private NAS - home to all secure data
Semi-Private NAS - home to all other content, such as web site content, downloadable files, etc
Each unit is attached to a different virtual network (VLAN); more on this laterStaff install EMC fiber-channel-attached storage
Virtual Desktop Infrastructure ServiceUniversity of Michigan service
Information Technology Services is the provider
Virtualization as a Service (VaaS)
ICPSR was a pilot user
Enables access to content on the Private NAS via virtualized environment

More Related Content

ICPSR Data Managment

Editor's Notes

  1. The setting: as we’ve seen, increased demand for systems that manage and store sensitive (restricted) data.In January 2011, NSF requires 2-page data management plan as part of proposals.Data management has become a popular topic.
  2. Explore live.Note that recording of DMP webinar is on this page.
  3. 22 pages of guidelines and references even including a sample plan available for download.
  4. FAQs consolidated from the webinars and from continuing discussions on DMPs into a blog where researchers and grant writers can read and contribute.
  5. Keywords: data management plan; icpsr; icpsr data management planWhat will all this mean? Some things are clear, some things are unknown. Let’s talk about what’s clear.
  6. Ingest refers to improvements in our internal (staff) computing systems – the VDEComputing in the cloud – our external (data user) computing systems – the SDEDistribution & Application – the RCS
  7. The Restricted Use Contracting System (RCS) is built to serve three audiences:It enables processors to set up contracts for studies/datasets with restricted data, allowing them to enter terms of use into the system and indicate preferences as to contract behavior.It enables end users to apply for data electronically, tracking their paperwork and facilitating a somewhat complex process.It enables user support to manage individual contracts with users: verifying complete paperwork, transmitting data, and sending follow-up reminders.
  8. Let’s take a peek into the RCS Portal – the data (end) user view at least.It’s a good idea to take a look at the FAQs and the application checklist first.
  9. Wrap up