Page Menu

Web Application Hosting

The Cloud Services team can provide you with reliable, scalable, and cost-effective computing resources for hosting your web applications. Using Amazon’s cloud computing platform (AWS), we handle planning, architecting, deployment, and maintenance of your computing infrastructure. We also work with the Information Security team to ensure your web application is compliant and secure. 

Use Cases:

  • Website Hosting: Host static or dynamic websites on cloud servers. 
  • Application Deployment: Deploy and host custom or third-party research web applications. 
  • Collaborative Tools: Deploy collaborative tools, project management platforms, or communication applications. 

AWS Resources Utilized: 


ETL Workloads

Extract, transform, and load (ETL) is the process of combining data from multiple sources and applies a set of business rules to clean, organize, and store the raw data for consumption in your analytics and/or machine learning (ML) processes. The Cloud Services team can help design and host the infrastructure you need to support your ETL workloads, using either Amazon’s purpose-built services or a custom-built compute framework hosting your ETL tools. 

Use Cases: 

  • Data Warehousing: Often used to populate data warehouses with data from different source systems, centralizing and optimizing storage of data for analytical purposes. 
  • Data Cleansing and Quality Improvement: ETL processes can include data cleansing and quality improvement tasks, ensuring the data loaded into the target system is accurate, consistent, and free of errors.
  • Data Masking and Anonymization: ETL processes can be used to mask or anonymize sensitive information in compliance with data privacy regulations, such as HIPPA. 

AWS Resources Utilized:  


Analytics Computing Environments

The Cloud Services team can architect and deploy the computing infrastructure you require to gain more visibility into your data. Combined with ETL workloads and Data Warehousing, we build the framework that enables you to derive actionable insights from your data. 

Use Cases: 

  • Data Exploration and Discovery: Tools for data scientists to explore datasets and help uncover valuable insights. 

AWS Resources Utilized:  


AI/Machine Learning

The Cloud Services team can assist with building, training, and deploying your Artificial Intelligence or Machine Learning models in the cloud. If you are not a machine learning expert, there are AI/ML solutions that use pre-trained models to perform tasks like image or text analysis and audio transcription. The Cloud Services team provides guidance on how AI/ML solutions such as large language models (LLMs) can be used to automate repetitive tasks like data entry, classification, summarization, and content generation.  

AWS Resources Utilized:  


Secure Virtual Desktop Environments

The Cloud Services team can work with you to understand your processing or analysis requirements and build a secure virtual desktop environment tailored for your use case. One advantage of hosting your virtual environment in the cloud is that the environment can scale to support many users, multiple operating systems, and a variety of software. Our secure virtual desktop solutions allow you to access data securely, perform analysis, and publish results using the tools and workflow that works for you. 

Use cases: 

  • Compliance and Data Protection: Ensure compliance with data protection regulations by centralizing data, and segmenting computing infrastructure, within a secure virtual environment. 
  • Contractor and Temporary Access: Provide temporary or contractor employees with secure access to a virtual desktop environment, ensuring that sensitive data is protected and access is limited to the required task

AWS Resources Utilized:  


Custom Secure Computing Environments on AWS

Our Cloud Services team collaborates with the Information Security experts to deliver tailored solutions that prioritize the security and compliance needs of your project. From creating isolated networked resources to implementing fine-grained access controls, we ensure computing environments are secure and compliance with HIPAA regulations. 

Use Cases:

  • Protected Data Repositories: Create secure environments within a custom VPC to store and process highly sensitive data securely. 
  • Role-Based Access for Collaborative Research Teams: Implement IAM policies to facilitate collaborative research efforts, allowing controlled access to resources while maintaining data confidentiality. 
  • Compliance-Driven Encryption:Use KMS encryption to ensure compliance with healthcare regulations, providing a secure framework for handling sensitive research data. 

AWS Resources Utilized: 

Frequent Downloads: 

Instructions: 

Containerized Application Hosting on AWS

Leveraging the capabilities of Amazon Web Services (AWS)-based containerized application hosting solutions, our Cloud Services team is committed to providing reliable, scalable, and cost-effective solutions for your containerized applications. From planning and architecture to deployment and ongoing maintenance, we handle every aspect of your containerized infrastructure. Collaborating closely with the Information Security team, we prioritize compliance and security, ensuring your applications thrive in the cloud environment. 

Use Cases: 

  • Microservices Architecture for Research Projects: Break down your research projects into manageable microservices, deploying them independently for efficient processing and analysis. 
  • Real-time Data Analysis: Utilize containerized applications for real-time analysis of clinical trial data, allowing researchers to make informed decisions promptly. 
  • Secure Collaboration Platforms: Host collaborative platforms that facilitate secure data sharing and analysis among different research teams involved in clinical studies. 
  • Continuous Integration and Deployment (CI/CD) for Collaborative Projects: Streamline your collaborative projects with robust CI/CD pipelines, facilitating continuous innovation.

AWS Resources Utilized: