{"id":64,"date":"2015-06-25T05:40:03","date_gmt":"2015-06-25T05:40:03","guid":{"rendered":"http:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/?p=64"},"modified":"2015-06-25T05:40:03","modified_gmt":"2015-06-25T05:40:03","slug":"presenting-the-data-vault","status":"publish","type":"post","link":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/2015\/06\/25\/presenting-the-data-vault\/","title":{"rendered":"Presenting the Data Vault"},"content":{"rendered":"<p>Blog post by University of Manchester project developer Tom Higgins:<\/p>\n<p class=\"p1\"><span class=\"s1\">Yesterday I gave a short presentation on the Data Vault project at an event in Lancaster:<\/span><\/p>\n<p class=\"p2\"><span class=\"s2\"><a href=\"https:\/\/www.eventbrite.co.uk\/e\/research-data-management-solutions-for-your-needs-tickets-17100593335\">https:\/\/www.eventbrite.co.uk\/e\/research-data-management-solutions-for-your-needs-tickets-17100593335<\/a><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">I based this on the original pitch with a few updates reflecting the work we\u2019ve done over the last couple of months.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Here\u2019s some of the feedback and questions from the event \u2013 I think a lot of these are more relevant for \u201cphase 2 and beyond\u201d than the current prototyping:<\/span><\/p>\n<ul>\n<li class=\"p1\"><span class=\"s1\">How does the Data Vault differ from iRODS? Perhaps the policy model from iRODS could be useful or iRODS could serve as a back-end. There was a comment that iRODS may be more useful where the researcher\u2019s workflow is known and can be encoded into the system (e.g. it\u2019s deeply involved in the day-to-day active data).<\/span><\/li>\n<li class=\"p1\">Archivematica (being explored by a project in York) can handle many preservation activities but has a specialist user interface which is not suitable for researchers to use directly. Perhaps a Data Vault could be used to ingest data and hand it over the Archivematica for preservation.<\/li>\n<li class=\"p1\">How would a Data Vault handle sensitive data? Would it be need to be certified? What if the \u201cback-end\u201d was using a certified storage system \u2013 would that ease the burden at all? I mentioned that perhaps both a \u201cgeneral\u201d and a locked-down \u201csensitive\u201d instance of the software could be run in parallel.<\/li>\n<li class=\"p1\">How could a Data Vault handle a dataset that is changing over time? Perhaps snapshots could be captured periodically &#8211; would this use a lot of storage space?<\/li>\n<li class=\"p1\">Could data be ingested from instruments automatically? I think this is an interesting one because the researcher will presumably want to access the data on active storage too (e.g. just ingesting into the vault isn\u2019t particularly useful since you\u2019d then need to pull it back out to actually work with the data, but you may want to have a frozen copy of the raw data too).<\/li>\n<li class=\"p1\">How could a Data Vault handle complex data e.g. from a database or an object store? In the simple case a user could export their data (e.g. in a backup format) and store that data (similar to how they might back up a database to a USB drive). Does it make sense for the a vault to try to understand complex data?<\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">Here are some examples of \u201cActive\u201d and \u201cArchive\u201d systems which might be useful targets for integration:<\/span><\/p>\n<ul>\n<li class=\"p3\"><span class=\"s1\">Box<\/span><\/li>\n<li class=\"p3\">Hitachi Content Platform<\/li>\n<li class=\"p3\">DuraCloud<\/li>\n<li class=\"p3\">iRODS<\/li>\n<li class=\"p3\">Archivematica<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Blog post by University of Manchester project developer Tom Higgins: Yesterday I gave a short presentation on the Data Vault project at an event in Lancaster: https:\/\/www.eventbrite.co.uk\/e\/research-data-management-solutions-for-your-needs-tickets-17100593335 I based this on the original pitch with a few updates reflecting the &hellip; <a href=\"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/2015\/06\/25\/presenting-the-data-vault\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/posts\/64"}],"collection":[{"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":1,"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/posts\/64\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/libraryblogs.is.ed.ac.uk\/jiscdatavault\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}