Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
vrw:start [2024/06/12 12:57] – marguerite | vrw:start [2024/06/26 08:37] (current) – marguerite | ||
---|---|---|---|
Line 5: | Line 5: | ||
The virtual research workspace is a virtualized desktop environment where researchers can conduct data analyses jointly and securely. | The virtual research workspace is a virtualized desktop environment where researchers can conduct data analyses jointly and securely. | ||
- | ===== Jointly ===== | + | * Partnerships are possible with researchers from within the organization or from other institutions worldwide. |
+ | * The VRW service consists of applications & data storage and is available 24/7*. | ||
+ | * The virtual environment can be provided with additional memory, extra powerful processing facilities and/or heavy graphics support as required. | ||
+ | ==== Typical use of the VRW: ==== | ||
+ | |||
+ | This environment can be applied when restrictive requirements are imposed on data sets security, or when additional privacy measures are required. | ||
- | Partnerships are possible with researchers | + | ==== A highly secured, role-based, collaborative environment for researchers |
+ | You can log in to the VRW from an existing (own institution) federated account using multi-factor authentication. To ensure that there is no pollution | ||
+ | In brief the VRW is a highly secured, role-based, collaborative environment specifically targeted at researchers who work with sensitive data. | ||
- | ===== **High Availability** ===== | ||
- | These services (applications & data) are available 24/ | ||
- | |||
- | ===== **Flexible** ===== | ||
- | The virtual environment can be provided with additional memory, extra powerful processing facilities and/or heavy graphics support as required. | ||
- | |||
- | ===== **Securely** ===== | ||
- | This environment can also be applied when restrictive requirements are imposed on data sets security, or when additional privacy measures are required. | ||