SlideShare a Scribd company logo
1 of 19
GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3
Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital
Preservation]
Policies, change management
and quality assurance
Fabio Corubolo - University of Liverpool
IDCC, Amsterdam, 25 February 2016
● Preservation can be integrated into existing
organization ecosystem instead of standing separate
● Policies are important both for preservation, and
other objectives
● Use existing infrastructure - save on costs
PERICLES on preservation, policies
●Managing and enforcing policy in the overall
infrastructure, is qualified, hard work
●Good management requires Quality Assurance
●Change an obsolescence is constant
●Practice can deviate from policy
Why are we doing this ?
●Notice when practice starts to deviate from policies
http://arstechnica.com/tech-policy/2015/08/cops-decide-to-collect-less-license-plate-data-after-80gb-drive-got-full/
Real life example
Policies:
What drives an organisation:
● access should be free
● confidential data should
not leave the organisation
“high and intermediate level natural language descriptions of an institution’s
aims/goals, with what constraints.”
What do we mean with Policy
POLICY ID 2:
"Project data must be preserved in at least 3
internal copies and in 1 external (in a trusted
external organisation) copy ”
POLICY ID 1:
"Project data must be preserved for 10 years”
type: bit preservation
Quality Assurance:
Validates that policies are respected and ecosystem
is in a consistent state
“Program for the systematic monitoring and
]evaluation of the various aspects of a project,
service, [...] to ensure [...] quality” (Webster)
Change management:
● Manages changes in the ecosystem
● Rule: if a file changes,
re run any policy that applies to it
(e.g. replication, data calibration)
… QA and change management
QA method:
TEST the existence of X
copies of the data in the
tape libraries
Change management :
Rule: process data with
latest auxiliary data
1. The manual approach
1. The structured, automated approach
Two ways to implement policies
● Use arbitrary language, infrastructure, and approach
● Manually ensure that the policy is respected
● When change happens, hope for the best; or re-
validate policy implementation
The Manual approach
+ simple to implement
+ straightforward
+ does not require language/system choices
+ can mix into existing policy implementation
- fragile
- manual
- limited guarantee of correctness
The Manual approach- pros and
cons
● Strictly define what policy is: a precise policy model
● Specific language and methods to implement policies
● Precise mapping allows automated processing
The Automated approach
+ automated
+ precise
- limits the expressivity of policies
- does not mix in existing systems and architectures
- can require full “buy in”, reimplementation
The Automated: pros and cons
● Use the existing system architecture, model it with
the ecosystem model, and add automated methods
● When possible: use an automated approach based on
the ecosystem/LRM and rules
● Where more convenient: use semi-automated
approach, and enrich it with QA and with the
ecosystem model
Policies in PERICLES
Automated:
● Define policies using the Ecosystem model, and map
to rules (Automated)
● Rule driven change management
● Ecosystem analysis allows to take into account
dependencies and change of differnet type
Depending on the use case:
Semi-automated:
● Implement the policy as you wish, in existing system
● Map to the ecosystem model
● Define QA methods for policy
● Allows automated validation via QA methods, and
change management based on the ecosystem model
Depending on the use case:
Science scenario model
Discussion on existing scenarios for
● Policy implementation
● Quality assurance
● Change management
Breakout group
1. Does the scenario relate to problems in your institution?
2. Is there anything missing?
3. How are you currently implementing policies in your
institution?
4. Are you using frameworks supporting policy
implementation? Are they being helpful?
5. Are policies implemented using formal languages (rule
languages)?
6. Could you describe what QA procedures are in place?
Questions (1/2)
7. Do you think the approach we described for policy QA would
be useful in your case?
8. Do you see this could help in validating that practice does
not deviate from the guidelines?
9. Do you see any advantage in implementing QA procedures
that validate policy application ?
10.Are you aware of other approaches for policy validation we
should consider?
Questions (2/2)
Thank you!

More Related Content

Similar to IDCC2016 - Policy and Quality Assurance in PERICLES

PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES_FP7
 
Policy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshopPolicy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshopFabio Corubolo
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES_FP7
 
Creating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptxCreating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptxMohit Rajvanshi
 
Digital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPEDigital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPESCAPE Project
 
Agile methodology
Agile methodologyAgile methodology
Agile methodologyC.P. Maurya
 
The DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and SucceedThe DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and SucceedPuppet
 
Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914Richard Platt
 
Using CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMSUsing CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMSPECB
 
How to create a test strategy.pptx
How to create a test strategy.pptxHow to create a test strategy.pptx
How to create a test strategy.pptxtmbekwa756
 
Bse 3105 lecture 5-evolution of legacy systems
Bse 3105  lecture 5-evolution of legacy systemsBse 3105  lecture 5-evolution of legacy systems
Bse 3105 lecture 5-evolution of legacy systemsAlonzee Tash
 
Scott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation SuccessScott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation SuccessLavaConConference
 
Management information system
Management information systemManagement information system
Management information systemAjilal
 
Data Analytics Strategy
Data Analytics StrategyData Analytics Strategy
Data Analytics StrategyeHealthCareers
 
Systems Migration
Systems MigrationSystems Migration
Systems Migrationrichchihlee
 

Similar to IDCC2016 - Policy and Quality Assurance in PERICLES (20)

PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016PERICLES Modelling Policies - Acting on Change 2016
PERICLES Modelling Policies - Acting on Change 2016
 
Policy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshopPolicy derivation and Quality Assurance workshop
Policy derivation and Quality Assurance workshop
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...
 
CV_KannanK
CV_KannanKCV_KannanK
CV_KannanK
 
Creating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptxCreating Functional Testing Strategy.pptx
Creating Functional Testing Strategy.pptx
 
Information System (IS) life cycle.pptx
Information System (IS) life cycle.pptxInformation System (IS) life cycle.pptx
Information System (IS) life cycle.pptx
 
Digital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPEDigital Preservation Policies - SCAPE
Digital Preservation Policies - SCAPE
 
Agile methodology
Agile methodologyAgile methodology
Agile methodology
 
Clinical commissioning v1.5
Clinical commissioning  v1.5Clinical commissioning  v1.5
Clinical commissioning v1.5
 
The DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and SucceedThe DevOps Playbook: How to Start, Scale, and Succeed
The DevOps Playbook: How to Start, Scale, and Succeed
 
Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914Continuous improvement methods summary by the sig rev052914
Continuous improvement methods summary by the sig rev052914
 
Clinical commissioning kinetik
Clinical commissioning  kinetikClinical commissioning  kinetik
Clinical commissioning kinetik
 
Using CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMSUsing CMMI Process Management Practices to Build and Maintain a QMS
Using CMMI Process Management Practices to Build and Maintain a QMS
 
How to create a test strategy.pptx
How to create a test strategy.pptxHow to create a test strategy.pptx
How to create a test strategy.pptx
 
Bse 3105 lecture 5-evolution of legacy systems
Bse 3105  lecture 5-evolution of legacy systemsBse 3105  lecture 5-evolution of legacy systems
Bse 3105 lecture 5-evolution of legacy systems
 
Theory Driven Evaluation.pptx
Theory Driven Evaluation.pptxTheory Driven Evaluation.pptx
Theory Driven Evaluation.pptx
 
Scott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation SuccessScott Youngbloom - Guide to CCMS Implementation Success
Scott Youngbloom - Guide to CCMS Implementation Success
 
Management information system
Management information systemManagement information system
Management information system
 
Data Analytics Strategy
Data Analytics StrategyData Analytics Strategy
Data Analytics Strategy
 
Systems Migration
Systems MigrationSystems Migration
Systems Migration
 

More from Fabio Corubolo

Pericles in practice 2 automatic policy application
Pericles in practice 2 automatic policy applicationPericles in practice 2 automatic policy application
Pericles in practice 2 automatic policy applicationFabio Corubolo
 
Pet tutorial script 2 - file information
Pet tutorial script   2 - file informationPet tutorial script   2 - file information
Pet tutorial script 2 - file informationFabio Corubolo
 
Pet tutorial script 1 - system info
Pet tutorial script   1 - system infoPet tutorial script   1 - system info
Pet tutorial script 1 - system infoFabio Corubolo
 
Pet demo script 3 - monitoring document access
Pet demo script   3 - monitoring document accessPet demo script   3 - monitoring document access
Pet demo script 3 - monitoring document accessFabio Corubolo
 
Slides for IDCC PET presentation
Slides for IDCC PET presentationSlides for IDCC PET presentation
Slides for IDCC PET presentationFabio Corubolo
 
IPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPIPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPFabio Corubolo
 

More from Fabio Corubolo (6)

Pericles in practice 2 automatic policy application
Pericles in practice 2 automatic policy applicationPericles in practice 2 automatic policy application
Pericles in practice 2 automatic policy application
 
Pet tutorial script 2 - file information
Pet tutorial script   2 - file informationPet tutorial script   2 - file information
Pet tutorial script 2 - file information
 
Pet tutorial script 1 - system info
Pet tutorial script   1 - system infoPet tutorial script   1 - system info
Pet tutorial script 1 - system info
 
Pet demo script 3 - monitoring document access
Pet demo script   3 - monitoring document accessPet demo script   3 - monitoring document access
Pet demo script 3 - monitoring document access
 
Slides for IDCC PET presentation
Slides for IDCC PET presentationSlides for IDCC PET presentation
Slides for IDCC PET presentation
 
IPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDPIPRES 2014 paper presentation: significant environment information for LTDP
IPRES 2014 paper presentation: significant environment information for LTDP
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

IDCC2016 - Policy and Quality Assurance in PERICLES

  • 1. GRANT AGREEMENT: 601138 | SCHEME FP7 ICT 2011.4.3 Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics [Digital Preservation] Policies, change management and quality assurance Fabio Corubolo - University of Liverpool IDCC, Amsterdam, 25 February 2016
  • 2. ● Preservation can be integrated into existing organization ecosystem instead of standing separate ● Policies are important both for preservation, and other objectives ● Use existing infrastructure - save on costs PERICLES on preservation, policies
  • 3. ●Managing and enforcing policy in the overall infrastructure, is qualified, hard work ●Good management requires Quality Assurance ●Change an obsolescence is constant ●Practice can deviate from policy Why are we doing this ?
  • 4. ●Notice when practice starts to deviate from policies http://arstechnica.com/tech-policy/2015/08/cops-decide-to-collect-less-license-plate-data-after-80gb-drive-got-full/ Real life example
  • 5. Policies: What drives an organisation: ● access should be free ● confidential data should not leave the organisation “high and intermediate level natural language descriptions of an institution’s aims/goals, with what constraints.” What do we mean with Policy POLICY ID 2: "Project data must be preserved in at least 3 internal copies and in 1 external (in a trusted external organisation) copy ” POLICY ID 1: "Project data must be preserved for 10 years” type: bit preservation
  • 6. Quality Assurance: Validates that policies are respected and ecosystem is in a consistent state “Program for the systematic monitoring and ]evaluation of the various aspects of a project, service, [...] to ensure [...] quality” (Webster) Change management: ● Manages changes in the ecosystem ● Rule: if a file changes, re run any policy that applies to it (e.g. replication, data calibration) … QA and change management QA method: TEST the existence of X copies of the data in the tape libraries Change management : Rule: process data with latest auxiliary data
  • 7. 1. The manual approach 1. The structured, automated approach Two ways to implement policies
  • 8. ● Use arbitrary language, infrastructure, and approach ● Manually ensure that the policy is respected ● When change happens, hope for the best; or re- validate policy implementation The Manual approach
  • 9. + simple to implement + straightforward + does not require language/system choices + can mix into existing policy implementation - fragile - manual - limited guarantee of correctness The Manual approach- pros and cons
  • 10. ● Strictly define what policy is: a precise policy model ● Specific language and methods to implement policies ● Precise mapping allows automated processing The Automated approach
  • 11. + automated + precise - limits the expressivity of policies - does not mix in existing systems and architectures - can require full “buy in”, reimplementation The Automated: pros and cons
  • 12. ● Use the existing system architecture, model it with the ecosystem model, and add automated methods ● When possible: use an automated approach based on the ecosystem/LRM and rules ● Where more convenient: use semi-automated approach, and enrich it with QA and with the ecosystem model Policies in PERICLES
  • 13. Automated: ● Define policies using the Ecosystem model, and map to rules (Automated) ● Rule driven change management ● Ecosystem analysis allows to take into account dependencies and change of differnet type Depending on the use case:
  • 14. Semi-automated: ● Implement the policy as you wish, in existing system ● Map to the ecosystem model ● Define QA methods for policy ● Allows automated validation via QA methods, and change management based on the ecosystem model Depending on the use case:
  • 16. Discussion on existing scenarios for ● Policy implementation ● Quality assurance ● Change management Breakout group
  • 17. 1. Does the scenario relate to problems in your institution? 2. Is there anything missing? 3. How are you currently implementing policies in your institution? 4. Are you using frameworks supporting policy implementation? Are they being helpful? 5. Are policies implemented using formal languages (rule languages)? 6. Could you describe what QA procedures are in place? Questions (1/2)
  • 18. 7. Do you think the approach we described for policy QA would be useful in your case? 8. Do you see this could help in validating that practice does not deviate from the guidelines? 9. Do you see any advantage in implementing QA procedures that validate policy application ? 10.Are you aware of other approaches for policy validation we should consider? Questions (2/2)

Editor's Notes

  1. Managing digital ecosystems is currently repetitive and time consuming work, requiring specialised knowledge and continuous monitoring of the state to guarantee correct functioning with respect to the policies and guidelines, management principles and decisions. We want to validate the correct application of policies to the ecosystem.