Type : Bid Notification
Title: Tier 3 / 4 Secondary Data Center Hosting Facility Agency: Roswell Park Cancer Institute Corp. Issue Date: 07/12/2017 Due Date: 08/02/2017 Category: Information Technology - Consulting & Other Services Ad Type: General
Title: Tier 3 / 4 Secondary Data Center Hosting Facility Agency: Roswell Park Cancer Institute Corp. Issue Date: 07/12/2017 Due Date: 08/02/2017 Category: Information Technology - Consulting & Other Services Ad Type: General
ORDER FOR ONE YEAR OF EXTERNAL HOSTING AND TIER 2 HOSTING SUPPORT FOR SSA'S WEB CONTENT MANAGEMENT SYSTEM (WCMS), DRUPAL. Solicitation ID/Procurement Identifier: 28321320A00040034 Ultimate Completion Date: Sat Apr 02 17:00:00 GMT 2022
) to enter into a contract with a Respondent to provide: one time set-up to include installation of the ArchivesSpace software, on servers managed by vendor, including branding of the ArchivesSpace site with Institutional Member’s logo and hex colors; migration of all Member Institutions ArchivesSpace sites currently on LYRASIS-hosted ArchivesSpace to the vendor hosted ArchivesSpace; ongoing hosting and maintenance offered in a tier system to allow
CSB depends on the contract’s cohesive and continual services - the issue of a third-party provider(s) for key services is a major concern to the CSB. American Eagle can provide this hosting.The Tier 1 PCI compliant hosting facility, as operated and maintained by American Eagle, offers secure and reliable hosting services through in-house data centers.
If you provide a hosted solution, how would we access our data in the event the company goes out of business? 8.5 Describe the security model, including network, data, and application security. Detail the measures for securing and storing the college's confidential data. Detail the levels of encryption that the early alert system utilizes. 8.6 Describe the levels of access or restriction relating to the early alert users.
If you provide a hosted solution, how would we access our data in the event the company goes out of business? 8.5 Describe the security model, including network, data, and application security. Detail the measures for securing and storing the college's confidential data. Detail the levels of encryption that the early alert system utilizes. 8.6 Describe the levels of access or restriction relating to the early alert users.
If you provide a hosted solution, how would we access our data in the event the company goes out of business? 8.5 Describe the security model, including network, data, and application security. Detail the measures for securing and storing the college's confidential data. Detail the levels of encryption that the early alert system utilizes. 8.6 Describe the levels of access or restriction relating to the early alert users.