You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
To navigate through the Ribbon, use standard browser navigation keys. To skip between groups, use Ctrl+LEFT or Ctrl+RIGHT. To jump to the first Ribbon tab use Ctrl+[. To jump to the last selected command use Ctrl+]. To activate a command, use Enter.
Tab 1 of 3.
Tab 2 of 3.
Tab 3 of 3.
Research Data management (RDM)
Software as a Service (SaaS)
RDM in de praktijk
Pool van experts
RDM in de praktijk
Software as a Service (SaaS)
The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure.11 The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email) or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited userspecific application configuration settings.
A repository in which data are stored and accessed in ways that maintain their integrity and quality whilst meeting relevant ethical and legal controls on their use and dissemination.
A Science DMZ (Data Management Zone) is a framework, model, and best practice to set up a high-performing, scalable and secure portion of a network to facilitate data-intensive science applications and does not include support for general-purpose networking (such as web surfing, email, etc.)—this traffic belongs behind the enterprise firewall and on the general-purpose network. By separating the high-performance science network from the general-purpose network, each network can respectively be optimized without interfering with the other.
Use of data or biospecimens in a way that differs from the original purpose for which they were generated or collected.
Secure Shell (SSH)
A network protocol for operating non-web based IT services securely over the internet. SSH uses public-keys to authenticate the remote computer and if necessary the user. SSH verifies whether the user offering the public key associated with the user’s identity also owns the matching private key.
Security Assertion Markup Language (SAML)
An XML-based protocol for exchanging authentication and authorization data between identity providers and service providers in order to access web-based IT services.
Self Assessment of Vendor solutions
Assessment of vendor solutions
by vendors itself to determine the value for research of their products.
(One can even imagine this self-assessment will be part of the application process a vendor has to go through in order to have their product included in the service catalogue.)
A catalogue for data management facilities for researchers. It aims to help researchers to make a reasoned choice when planning for the management and the storage of their data. Additionally, the information that is accumulated to fill the catalogue should help to identify potential gaps or other shortcomings within the facilities which have been described.
Service Provider (SP)
The owner of an IT service.
A project that clearly demonstrates the functionality in a for the target group meaningful way.
See also: Showcase Approach,
An approach where users are an integral part of the team working towards delivering the functionality of the showcase. It is not necessary that the problem is fully understood or defined at start, the focus is on maximizing the team’s ability to deliver quickly, to respond to emerging requirements and to adapt to evolving technologies and changes in community.
Social ID authentication
Using a social media accounts such as Facebook or LinkedIn for authentication.
From the German 'soll' versus 'ist': 'as should be' versus 'as is'. The architecture aimed for (versus the current architecture, IST architecture).
Solution Building Block
A candidate solution which conforms to the specification of an Architecture Building Block (ABB).
The term storage management encompasses the technologies and processes organizations use to maximize or improve the performance of their data storage resources. It is a broad category that includes virtualization, replication, mirroring, security, compression, traffic analysis, process automation, storage provisioning and related techniques.
Rule based storage management
Student Information System (SIS)
This is an information system to manage student/teacher data within educational/scientific institutes. Is also a main source of group information.
The public authority (or authorities) in a given jurisdiction responsible for monitoring the application of law and administrative measures adopted pursuant to data privacy, data protection and data security.
National federation of identity providers (institutions) and a web-based IT service integrator.
A group management tool to create and manage groups. Services connected to SURFconext can use this group information, e.g. to decide who is allowed access to the IT service and to decide certain rights within a IT service.
The systematic collection, monitoring and dissemination of health data to assist in planning, implementation and evaluation of an action or intervention such as research or public health.