• A diversely hosted system with globally distributed tertiary redundancy for high availability and to encourage global participation
  • Data protection through use of high-level security systems and protocols
  • Robust administration and system auditing processes
  • Validation of contributed data and results to minimize errors
  • Ease of access for authorized users coupled with robust and strictly administered access procedures
Share this with your followers...