Your personalized Software Library includes software installations that are needed for reliable access to your data. Your software is hosted in Intact Digital private data centres and enables secure and convenient use of the software through virtual desktops.
We take special care with software that requires obsolete operating systems and pose security risks. We ensure that it can be used safely and reliably for as long as your business requires.
Featured event: European Bioanalysis Forum (EBF) 13th Open Symposium
17-20 November 2020
Poster: Long-term readability of data: Legacy software virtualization case-study.
EBF Open Symposium, 19 November 2020, 16:00-17:30 CET.
Software Library is designed to address key challenges that businesses face due to technology obsolescence. We work with you to ensure that the hosted software and its remote access fully support use scenarios and documentation requirements.
Protect your investment in software technologies and valuable data
Validate and transfer knowledge through re-producible analyses of data
Meet regulatory requirements for retention and readability of data
Support effective use of past data and analyses to enable innovation
Our proven processes and techniques enable secure and reliable use of unsupported software. Our technical experts
1. Identify your software requirements and optimal way to install and maintain it
2. Document installation, validation and usage to adhere to regulations and industry standards
3. Test and maintain installations during ongoing use.
Adding new installations to your Software Library involves four stages.
1. Software is installed within securely managed virtual machines.
2. Virtual desktops provide secure remote access to software and data.
3. Software installation is validated and data analyses is reliably reproduced.
4. Virtual environments and software installations are monitored and maintained.
Software applications are installed within securely managed virtual machines.
Virtual desktops provide secure remote access to software and data.
Software installations are validated and data analyses are reliably reproduced.
Virtual environments and software installations are monitored and maintained.
Software Library supports the use of software installations with easy access to software installation files, software documentation, and records of software use. It includes the Management Portal, Library Portal and Digital Vault.
Together they support a number of use scenarios, including a systematic and principled approach to system decommissioning and full compliance with regulations related to the retention and long-term readability of data. Data from digital archives and project repositories can be safely transferred to the Software Library for use with secure software installations and removed upon the task completion.
The management portal includes detailed records of software technologies included in the Software Library, user account information, license information, and regular service and usage reports.
The library portal hosts customized digital desktops for completion of specific user tasks using the virtualized software technologies.
The vault stores software technology files, installers, system and user documentation, installation documents created during the virtualization process and installation images of the virtualized software.
Software Library supports use scenarios across industry sectors where digital content and programs produce lasting value and are essential for knowledge transfer and validation.
In Bioanalysis, Software Library is used by labs to comply with Good Laboratory Practices (GLP) and ensure readability of raw data stored in e-Archives. Software Library contains specialized applications that are required during GLP audits to reproduce data analyses from research studies conducted as much as ten or more years earlier. The software installations are validated and approved for study reproducibility and maintained for long-term use.
We offer flexible subscription plans to meet your long-term needs.
Your Software Library expands over time as software technologies become obsolete.
Easily add new software, enrol new users, and specify access privileges.