Near-real-time storage
Used for commonly accessed datasets. Near-real-time storage
c Is readily available
c Is reliable
c Works with data discovery tools
Archival storage
Used for datasets that are no longer active.
c Appropriate data are kept for historical reasons and to fulfill future requests for his-
torical data
c For any media used for long-term storage, lifetime of media and duration of readabil-
ity of media is considered in storage plan
c Storage tapes of any kind are regularly validated and medium of storage upgraded as
needed.
Backup storage
Used to recover from accidental data loss, unauthorized tampering, and disaster recovery
c Backup storage media type has been carefully considered
c Backup processes are validated regularly by checking readability of data
Network architecture
Network operating speed
10-Mb networks are no longer fast enough to serve the needs of most medium- to large-
sized offices
c 100-Mb network is in place
c There is at least a plan to put a 100-Mb network in place
Centralized vs. distributed storage and manipulation of data
See also Data Sharing: Version Control
c
Centralized storage scheme is in place (EDMS software or other)
c
100-Mb network architecture is in place
c
GD&S technical committee is highly sensitive to this issue
c
GD&S community is highly sensitive to this issue
Network protocols
c Microsoft networking (Windows PCs) is in place OR
c TCP/IP (UNIX, desktop and server PCs, and Macintosh computers, as well as older
legacy computers) is in place OR
c SAMBA (UNIXWindows networking) is in place
System security
System security standard operating procedures
c Data backups are included in our formal system security plan.
c All systems on which data are stored or processed have official accreditation per
Army Regulations.
Passwords and network security
c Creation and distribution of passwords is dealt with at District or Division level by
experienced system administrators.
c A person trained in security is responsible for monitoring the health of computer sys-
tems and running intrusion detection software
21