1. Data classification
What's the classification of your data? show definitions
In order to protect the security and integrity of WCM data, as well as to comply with applicable state and federal laws and regulations, all WCM data must be classified as either high risk (confidential), moderate risk (restricted), or low risk (public).
For clarification, please seepolicy - 11.03 Data Classification. If you have questions, the ITS service desk can find you the right person to answer them.
2. Quantity
How much data do you have and how fast will it grow? explain
Knowing how much data you have today and how fast it grows helps service providers with the initial onboarding and on-going capacity planning activities.
Please note while Box offers unlimited storage, the individual file size limit is 5GB and will require same storage space available on local end-point device if file synchronization is used.
3. Resiliency
What sort of additional protection would your data need? explain
The value and importance of the data may change over time. Within an application, there might be clear separation between short term scratch data and long term archival data. In some cases, choosing two separate services to match the needs may be more cost effective.
Replication protects against equipment failure: each addition or deletion of a file is mirrored at a remote site within seconds. Remote mirror can be accessed in D/R scenario but cannot be used to restore deleted data.
Backup protects against corruption or unintended user deletion. Previous versions can be kept with options for local or remote storage depending on your needs. Restoration is not self-service.
4. Performance
Are there special performance needs? explain
Users with very specific technical requirements may needs special high performance storage. Performance of the storage system is impacted by both the peak transaction rate and the sustained transfer rate. Typically users need one or the other and rarely need both. While all of the NFS/CIFS share and block options are capable of much higher performance, most storage systems are shared so special preparation by the service provider maybe required to support a single application with really high sustained demand.
5. Sharing
Do you need to share data regularly so that others have access to the same files? explain
Sharing large data sets with external people oustide of institution involves ID creation and access provision from the service providers. For a stable team, this is usually not an issue. Unacceptable delay may occur if large number of adhoc requests are made with short notices.
Sharing small and low risk data sets can also be accomplished by copying the data to BOX or similar services that is designed for sharing.
6. Method of access
How are you expecting to work with data? explain
Consider the generation, analysis, sharing and archiving of the data over the life cycle of the data. In some cases it may be desirable to utilize different services for different stage of the data life cycle.