Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| vrw:start [2024/06/12 12:57] – marguerite | vrw:start [2025/07/29 14:01] (current) – marguerite | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Virtual Research Workspace ====== | ====== Virtual Research Workspace ====== | ||
| - | {{ : | + | {{ : |
| The virtual research workspace is a virtualized desktop environment where researchers can conduct data analyses jointly and securely. | The virtual research workspace is a virtualized desktop environment where researchers can conduct data analyses jointly and securely. | ||
| - | ===== Jointly ===== | + | * Partnerships are possible with researchers from within the organization or from other institutions worldwide. |
| + | * The VRW service consists of applications & data storage and is available 24/7*. | ||
| + | * The virtual environment can be provided with additional memory, extra powerful processing facilities and/or heavy graphics support as required. | ||
| + | ==== Typical use of the VRW: ==== | ||
| + | |||
| + | This environment can be applied when restrictive requirements are imposed on data sets security, or when additional privacy measures are required. | ||
| - | Partnerships are possible with researchers | + | ==== A highly secured, role-based, collaborative environment for researchers |
| + | You can log in to the VRW from an existing (own institution) federated account using multi-factor authentication. To ensure that there is no pollution | ||
| + | In brief the VRW is a highly secured, role-based, collaborative environment specifically targeted at researchers who work with sensitive data. | ||
| - | ===== **High Availability** ===== | ||
| - | These services (applications & data) are available 24/ | ||
| - | |||
| - | ===== **Flexible** ===== | ||
| - | The virtual environment can be provided with additional memory, extra powerful processing facilities and/or heavy graphics support as required. | ||
| - | |||
| - | ===== **Securely** ===== | ||
| - | This environment can also be applied when restrictive requirements are imposed on data sets security, or when additional privacy measures are required. | ||