petaLibrary Policies

Backup and Archive

Data Protection/Backups Policy:
Data protection on the petaLibrary has recently been modified. Now there are two protection mechanisms in place. A nightly snapshot is taken @ ~ 12:00 AM to protect against accidental file deletion and allow for recovery of most data loss events. Also, data is replicated to an separate storage device on a nightly basis. This second replicate would be used if there were major issues with the petaLibrary.

Usage

Groups, departments, or researchers can request access for several projects, but it will be up to the Research Office and ARCC to determine acceptable allocations of the petaLibrary.

Citing the petaLibrary

A requirement of all allocations and use of computing resources managed by ARCC , including the petaLibrary, is to acknowledge ARCC support for your research. Our ability to identify supported scientific results helps ensure continued support from the State of Wyoming, federal agencies and other sources for future HPC/HPS systems.

For projects on the petaLibrary

Citation formats. We request that you cite your use of the petaLibrary with the following citation format, based on the source of your allocation and modified as needed to conform with citation style guidelines. Most important, please include the Archival Resource Key (ARK) — http://n2t.net/ark:/85786/m4z59r — (similar to a DOI) that is unique to the petaLibrary.

Example:

Advanced Research Computing Center. 2016. petLibrary: DDN GridScaler 7K, DDN WOS 7K. Laramie, WY: University of Wyoming. http://n2t.net/ark:/85786/m4z59r.

ARCC Resouces

For reference, the ARKs for ARCC resources are:

Mount Moran: http://n2t.net/ark:/85786/m4159c
petaLibrary: http://n2t.net/ark:/85786/m4z59r