Appendix 1: Service Categories and Subcategories
Every service needs to be defined by a category and a subcategory in order to be easy accessible and discoverable by the end-user/customer. The following table is a result of analytical research and contains an initial proposal for current services included at the eInfraCentral Service Catalogue.
Categories | Subcategories |
---|---|
Networking | Direct Connect |
“ | Virtual Network |
“ | Load Balancer |
“ | Application Gateway |
“ | VPN Gateway |
“ | Exchange |
“ | Content Delivery Network |
“ | Traffic Manager |
“ | API Gateway |
“ | Other |
Compute | Job Execution |
“ | Virtual Machine Management |
“ | Container Management |
“ | Batch Processing |
“ | Serverless Applications Repository |
“ | Load Balancing |
“ | Other |
Storage | Data |
“ | Blob |
“ | File |
“ | Queue |
“ | Disk |
“ | Archive |
“ | Backup |
“ | Synchronised |
“ | Replicated |
“ | Recovery |
“ | Other |
Data | Mining |
“ | Access |
“ | Management |
“ | Transfer Management |
“ | Registration |
“ | Persistent Identifier |
“ | Interlinking |
“ | Publishing |
“ | Discovery |
“ | Anonymisation |
“ | Preservation |
“ | Brokering |
“ | Annotation |
“ | Validation |
“ | Other |
Software | Platform |
“ | Tool |
“ | Component |
“ | Algorithm |
“ | Developer |
“ | Other |
Application | Porting |
“ | Scaling |
“ | Education |
“ | Productivity |
“ | Business |
“ | Developer |
“ | Other |
Security | Authentication and Authorisation |
“ | Attacks protection |
“ | Coordination |
“ | Tools |
“ | Certification Authority |
“ | Identity |
“ | Other |
Analytics | Business Analytics |
“ | Web Analytics |
“ | Learning Analytics |
“ | Predictive Analytics |
“ | Machine Learning |
“ | Other |
Operations | Accounting |
“ | Helpdesk |
“ | Monitoring |
“ | Analysis |
“ | Configuration Management |
“ | Tools |
“ | Coordination |
“ | Order Management |
“ | Other |
Training | Online Courses |
“ | Open Registration Courses |
“ | In-house Courses |
“ | Tools |
“ | Platform |
“ | Other |
Consulting | Audit and Assessment of IT Service Management |
“ | Audit and Assessment of Information Security |
“ | High Performance Computing |
“ | Other |
Aggregator | Services |
“ | Data |
“ | Applications |
“ | Software |
“ | Publications |
“ | Services-Data |
“ | Services-Applications |
“ | Services-Software |
“ | Services-Publications |
“ | Data-Applications |
“ | Data-Software |
“ | Data-Publications |
“ | Applications-Software |
“ | Applications-Publications |
“ | Software-Publications |
“ | Services-Data-Applications |
“ | Services-Data-Software |
“ | Services-Data –Publications |
“ | Services-Applications-Software |
“ | Services-Applications-Publications |
“ | Services-Software-Applications |
“ | Services-Software-Publications |
“ | Data-Applications-Software |
“ | Data-Applications-Publications |
“ | Data-Software-Publications |
“ | Services-Data-Applications-Software |
“ | Services-Data-Applications-Publications |
“ | Services-Data-Software-Publications |
“ | Services-Software-Publications-Applications |
“ | Data-Software-Applications-Publications |
“ | Services-Data-Applications-Software-Publications |
Other |