SlideShare a Scribd company logo
1 of 19
Download to read offline
GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3
Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital
Preservation]
Policies, change management
and quality assurance
Fabio Corubolo - University of Liverpool
IDCC, Amsterdam, 25 February 2016
● Preservation can be integrated into existing
organization ecosystem instead of standing separate
● Policies are important both for preservation, and
other objectives
● Use existing infrastructure - save on costs
PERICLES on preservation, policies
●Managing and enforcing policy in the overall
infrastructure, is qualified, hard work
●Good management requires Quality Assurance
●Change an obsolescence is constant
●Practice can deviate from policy
Why are we doing this ?
●Notice when practice starts to deviate from policies
http://arstechnica.com/tech-policy/2015/08/cops-decide-to-collect-less-license-plate-data-after-80gb-drive-got-full/
Real life example
Policies:
What drives an organisation:
● access should be free
● confidential data should
not leave the organisation
“high and intermediate level natural language descriptions of an institution’s
aims/goals, with what constraints.”
What do we mean with Policy
POLICY ID 2:
"Project data must be preserved in at least 3
internal copies and in 1 external (in a trusted
external organisation) copy ”
POLICY ID 1:
"Project data must be preserved for 10 years”
type: bit preservation
Quality Assurance:
Validates that policies are respected and ecosystem
is in a consistent state
“Program for the systematic monitoring and
]evaluation of the various aspects of a project,
service, [...] to ensure [...] quality” (Webster)
Change management:
● Manages changes in the ecosystem
● Rule: if a file changes,
re run any policy that applies to it
(e.g. replication, data calibration)
… QA and change management
QA method:
TEST the existence of X
copies of the data in the
tape libraries
Change management :
Rule: process data with
latest auxiliary data
1. The manual approach
1. The structured, automated approach
Two ways to implement policies
● Use arbitrary language, infrastructure, and approach
● Manually ensure that the policy is respected
● When change happens, hope for the best; or re-
validate policy implementation
The Manual approach
+ simple to implement
+ straightforward
+ does not require language/system choices
+ can mix into existing policy implementation
- fragile
- manual
- limited guarantee of correctness
The Manual approach- pros and
cons
● Strictly define what policy is: a precise policy model
● Specific language and methods to implement policies
● Precise mapping allows automated processing
The Automated approach
+ automated
+ precise
- limits the expressivity of policies
- does not mix in existing systems and architectures
- can require full “buy in”, reimplementation
The Automated: pros and cons
● Use the existing system architecture, model it with
the ecosystem model, and add automated methods
● When possible: use an automated approach based on
the ecosystem/LRM and rules
● Where more convenient: use semi-automated
approach, and enrich it with QA and with the
ecosystem model
Policies in PERICLES
Automated:
● Define policies using the Ecosystem model, and map
to rules (Automated)
● Rule driven change management
● Ecosystem analysis allows to take into account
dependencies and change of differnet type
Depending on the use case:
Semi-automated:
● Implement the policy as you wish, in existing system
● Map to the ecosystem model
● Define QA methods for policy
● Allows automated validation via QA methods, and
change management based on the ecosystem model
Depending on the use case:
Science scenario model
Discussion on existing scenarios for
● Policy implementation
● Quality assurance
● Change management
Breakout group
1. Does the scenario relate to problems in your institution?
2. Is there anything missing?
3. How are you currently implementing policies in your
institution?
4. Are you using frameworks supporting policy
implementation? Are they being helpful?
5. Are policies implemented using formal languages (rule
languages)?
6. Could you describe what QA procedures are in place?
Questions (1/2)
7. Do you think the approach we described for policy QA would
be useful in your case?
8. Do you see this could help in validating that practice does
not deviate from the guidelines?
9. Do you see any advantage in implementing QA procedures
that validate policy application ?
10.Are you aware of other approaches for policy validation we
should consider?
Questions (2/2)
Thank you!

More Related Content

Viewers also liked

PERICLES Preserving space data
PERICLES Preserving space dataPERICLES Preserving space data
PERICLES Preserving space dataPERICLES_FP7
 
IPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPIPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPFabio Corubolo
 
PERICLES Domain-specific ontological representations and ontology evolution
PERICLES Domain-specific ontological representations and ontology evolutionPERICLES Domain-specific ontological representations and ontology evolution
PERICLES Domain-specific ontological representations and ontology evolutionPERICLES_FP7
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES_FP7
 
PERICLES Reflexive LRM
PERICLES Reflexive LRMPERICLES Reflexive LRM
PERICLES Reflexive LRMPERICLES_FP7
 
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...PERICLES_FP7
 
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES_FP7
 
Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016PERICLES_FP7
 
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES_FP7
 

Viewers also liked (9)

PERICLES Preserving space data
PERICLES Preserving space dataPERICLES Preserving space data
PERICLES Preserving space data
 
IPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPIPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDP
 
PERICLES Domain-specific ontological representations and ontology evolution
PERICLES Domain-specific ontological representations and ontology evolutionPERICLES Domain-specific ontological representations and ontology evolution
PERICLES Domain-specific ontological representations and ontology evolution
 
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
PERICLES Domain Specific Modelling - ‘Eye of the Storm: Preserving Digital Co...
 
PERICLES Reflexive LRM
PERICLES Reflexive LRMPERICLES Reflexive LRM
PERICLES Reflexive LRM
 
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
PERICLES Building Digital Ecosystem Models - ‘Eye of the Storm: Preserving Di...
 
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
PERICLES Process Compiler - ‘Eye of the Storm: Preserving Digital Content in ...
 
Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016Automatic policy application and change management - Acting on Change 2016
Automatic policy application and change management - Acting on Change 2016
 
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
PERICLES Workflow for the automated updating of Digital Ecosystem Models with...
 

Similar to PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Continuum

PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES_FP7
 
Policy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshopPolicy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshopFabio Corubolo
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES_FP7
 
Creating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptxCreating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptxMohit Rajvanshi
 
Digital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPEDigital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPESCAPE Project
 
Agile methodology
Agile methodologyAgile methodology
Agile methodologyC.P. Maurya
 
The DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and SucceedThe DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and SucceedPuppet
 
Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914Richard Platt
 
Using CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMSUsing CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMSPECB
 
How to create a test strategy.pptx
How to create a test strategy.pptxHow to create a test strategy.pptx
How to create a test strategy.pptxtmbekwa756
 
Regenstrief Gopher CPOE 2013: Advances in CDS and Provider Collaboration
Regenstrief Gopher CPOE 2013: Advances in CDS and Provider CollaborationRegenstrief Gopher CPOE 2013: Advances in CDS and Provider Collaboration
Regenstrief Gopher CPOE 2013: Advances in CDS and Provider CollaborationJon Duke, MD, MS
 
Bse 3105 lecture 5-evolution of legacy systems
Bse 3105  lecture 5-evolution of legacy systemsBse 3105  lecture 5-evolution of legacy systems
Bse 3105 lecture 5-evolution of legacy systemsAlonzee Tash
 
Scott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation SuccessScott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation SuccessLavaConConference
 
Management information system
Management information systemManagement information system
Management information systemAjilal
 
Data Analytics Strategy
Data Analytics StrategyData Analytics Strategy
Data Analytics StrategyeHealthCareers
 

Similar to PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Continuum (20)

PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016
 
Policy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshopPolicy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshop
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...
 
CV_KannanK
CV_KannanKCV_KannanK
CV_KannanK
 
Creating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptxCreating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptx
 
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
 
Digital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPEDigital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPE
 
Agile methodology
Agile methodologyAgile methodology
Agile methodology
 
Clinical commissioning v1.5
Clinical commissioning  v1.5Clinical commissioning  v1.5
Clinical commissioning v1.5
 
The DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and SucceedThe DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and Succeed
 
Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914
 
Clinical commissioning kinetik
Clinical commissioning  kinetikClinical commissioning  kinetik
Clinical commissioning kinetik
 
Using CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMSUsing CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMS
 
How to create a test strategy.pptx
How to create a test strategy.pptxHow to create a test strategy.pptx
How to create a test strategy.pptx
 
Regenstrief Gopher CPOE 2013: Advances in CDS and Provider Collaboration
Regenstrief Gopher CPOE 2013: Advances in CDS and Provider CollaborationRegenstrief Gopher CPOE 2013: Advances in CDS and Provider Collaboration
Regenstrief Gopher CPOE 2013: Advances in CDS and Provider Collaboration
 
Bse 3105 lecture 5-evolution of legacy systems
Bse 3105  lecture 5-evolution of legacy systemsBse 3105  lecture 5-evolution of legacy systems
Bse 3105 lecture 5-evolution of legacy systems
 
Theory Driven Evaluation.pptx
Theory Driven Evaluation.pptxTheory Driven Evaluation.pptx
Theory Driven Evaluation.pptx
 
Scott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation SuccessScott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation Success
 
Management information system
Management information systemManagement information system
Management information system
 
Data Analytics Strategy
Data Analytics StrategyData Analytics Strategy
Data Analytics Strategy
 

More from PERICLES_FP7

Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17PERICLES_FP7
 
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...PERICLES_FP7
 
Technical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshopTechnical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshopPERICLES_FP7
 
ForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information ModelForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information ModelPERICLES_FP7
 
Data quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspectiveData quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspectivePERICLES_FP7
 
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...PERICLES_FP7
 
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...PERICLES_FP7
 
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016PERICLES_FP7
 
Filling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangePERICLES_FP7
 
Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...PERICLES_FP7
 
Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016PERICLES_FP7
 
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...PERICLES_FP7
 
Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016PERICLES_FP7
 
Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...PERICLES_FP7
 
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES_FP7
 
Semi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-termSemi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-termPERICLES_FP7
 
The PeriCAT Framework
The PeriCAT FrameworkThe PeriCAT Framework
The PeriCAT FrameworkPERICLES_FP7
 
PERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES_FP7
 
PERICLES Information Packaging Techniques
PERICLES  Information Packaging TechniquesPERICLES  Information Packaging Techniques
PERICLES Information Packaging TechniquesPERICLES_FP7
 
PERICLES Decapsulation and Restoration
PERICLES Decapsulation and RestorationPERICLES Decapsulation and Restoration
PERICLES Decapsulation and RestorationPERICLES_FP7
 

More from PERICLES_FP7 (20)

Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17Digital Ecosystem and Process Compiler - IDCC17
Digital Ecosystem and Process Compiler - IDCC17
 
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
Technical Appraisal of Complex Digital Objects in Evolving Environments - IDC...
 
Technical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshopTechnical appraisal and change impact analysis - IDCC17 workshop
Technical appraisal and change impact analysis - IDCC17 workshop
 
ForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information ModelForgetIT: human memory inspired Information Model
ForgetIT: human memory inspired Information Model
 
Data quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspectiveData quality, preservation and access: a DANS perspective
Data quality, preservation and access: a DANS perspective
 
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
Proactive Evolution management in Data-centric SW ecosystems - Acting on Chan...
 
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
Digital Preservation in the era of Big Data - The Diachron Platform - Acting ...
 
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
Detecting Semantic Drift for ontology maintenance - Acting on Change 2016
 
Filling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on ChangeFilling the Digital Preservation Gap - Acting on Change
Filling the Digital Preservation Gap - Acting on Change
 
Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...Risk assessment for preservation in the active life of complex digital object...
Risk assessment for preservation in the active life of complex digital object...
 
Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016Technical Appraisal Tool, MICE - Acting on Change 2016
Technical Appraisal Tool, MICE - Acting on Change 2016
 
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...Capability gap - Preservation isn't just throwing tools at the problem - Acti...
Capability gap - Preservation isn't just throwing tools at the problem - Acti...
 
Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016Reproducibile scientific workflows - Acting on Change 2016
Reproducibile scientific workflows - Acting on Change 2016
 
Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...Pro-active solutions for higher reproducibility of scientific experiments - A...
Pro-active solutions for higher reproducibility of scientific experiments - A...
 
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
 
Semi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-termSemi-automated metadata extraction in the long-term
Semi-automated metadata extraction in the long-term
 
The PeriCAT Framework
The PeriCAT FrameworkThe PeriCAT Framework
The PeriCAT Framework
 
PERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) TechniquePERICLES - Choice of Information Encapsulation (IE) Technique
PERICLES - Choice of Information Encapsulation (IE) Technique
 
PERICLES Information Packaging Techniques
PERICLES  Information Packaging TechniquesPERICLES  Information Packaging Techniques
PERICLES Information Packaging Techniques
 
PERICLES Decapsulation and Restoration
PERICLES Decapsulation and RestorationPERICLES Decapsulation and Restoration
PERICLES Decapsulation and Restoration
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

PERICLES workshop (IDCC 2016) - Policy and Quality Assurance in the Data Continuum

  • 1. GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3 Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital Preservation] Policies, change management and quality assurance Fabio Corubolo - University of Liverpool IDCC, Amsterdam, 25 February 2016
  • 2. ● Preservation can be integrated into existing organization ecosystem instead of standing separate ● Policies are important both for preservation, and other objectives ● Use existing infrastructure - save on costs PERICLES on preservation, policies
  • 3. ●Managing and enforcing policy in the overall infrastructure, is qualified, hard work ●Good management requires Quality Assurance ●Change an obsolescence is constant ●Practice can deviate from policy Why are we doing this ?
  • 4. ●Notice when practice starts to deviate from policies http://arstechnica.com/tech-policy/2015/08/cops-decide-to-collect-less-license-plate-data-after-80gb-drive-got-full/ Real life example
  • 5. Policies: What drives an organisation: ● access should be free ● confidential data should not leave the organisation “high and intermediate level natural language descriptions of an institution’s aims/goals, with what constraints.” What do we mean with Policy POLICY ID 2: "Project data must be preserved in at least 3 internal copies and in 1 external (in a trusted external organisation) copy ” POLICY ID 1: "Project data must be preserved for 10 years” type: bit preservation
  • 6. Quality Assurance: Validates that policies are respected and ecosystem is in a consistent state “Program for the systematic monitoring and ]evaluation of the various aspects of a project, service, [...] to ensure [...] quality” (Webster) Change management: ● Manages changes in the ecosystem ● Rule: if a file changes, re run any policy that applies to it (e.g. replication, data calibration) … QA and change management QA method: TEST the existence of X copies of the data in the tape libraries Change management : Rule: process data with latest auxiliary data
  • 7. 1. The manual approach 1. The structured, automated approach Two ways to implement policies
  • 8. ● Use arbitrary language, infrastructure, and approach ● Manually ensure that the policy is respected ● When change happens, hope for the best; or re- validate policy implementation The Manual approach
  • 9. + simple to implement + straightforward + does not require language/system choices + can mix into existing policy implementation - fragile - manual - limited guarantee of correctness The Manual approach- pros and cons
  • 10. ● Strictly define what policy is: a precise policy model ● Specific language and methods to implement policies ● Precise mapping allows automated processing The Automated approach
  • 11. + automated + precise - limits the expressivity of policies - does not mix in existing systems and architectures - can require full “buy in”, reimplementation The Automated: pros and cons
  • 12. ● Use the existing system architecture, model it with the ecosystem model, and add automated methods ● When possible: use an automated approach based on the ecosystem/LRM and rules ● Where more convenient: use semi-automated approach, and enrich it with QA and with the ecosystem model Policies in PERICLES
  • 13. Automated: ● Define policies using the Ecosystem model, and map to rules (Automated) ● Rule driven change management ● Ecosystem analysis allows to take into account dependencies and change of differnet type Depending on the use case:
  • 14. Semi-automated: ● Implement the policy as you wish, in existing system ● Map to the ecosystem model ● Define QA methods for policy ● Allows automated validation via QA methods, and change management based on the ecosystem model Depending on the use case:
  • 16. Discussion on existing scenarios for ● Policy implementation ● Quality assurance ● Change management Breakout group
  • 17. 1. Does the scenario relate to problems in your institution? 2. Is there anything missing? 3. How are you currently implementing policies in your institution? 4. Are you using frameworks supporting policy implementation? Are they being helpful? 5. Are policies implemented using formal languages (rule languages)? 6. Could you describe what QA procedures are in place? Questions (1/2)
  • 18. 7. Do you think the approach we described for policy QA would be useful in your case? 8. Do you see this could help in validating that practice does not deviate from the guidelines? 9. Do you see any advantage in implementing QA procedures that validate policy application ? 10.Are you aware of other approaches for policy validation we should consider? Questions (2/2)