This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
howto_retrieve_your_data [2024/02/07 11:42] miquel [Exemple de sessió per transferir dades] |
howto_retrieve_your_data [2024/02/07 15:01] (current) miquel [How to retrieve your data] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== How to recover | + | ====== How to retrieve |
- | < | + | < |
- | [[ informacio_recuperar_dades | Cóm recuperar les teves dades (en Català)]] | + | [[ informacio_recuperar_dades | Cóm recuperar les teves dades (en Català)]] | [[ https:// |
</ | </ | ||
- | Your data acquired on any of the NMR Service spectrometers are available at all times and from anywhere through our data server. To recover | + | Your data acquired on any of the NMR Service spectrometers are available at all times and from anywhere through our data server. To retrieve |
In order to preserve the privacy of the groups' | In order to preserve the privacy of the groups' | ||
Line 74: | Line 74: | ||
If you access our server from within the UAB, or from a research institute or company on campus that has its network integrated into the UAB network, you should have no problems connecting and downloading your data. | If you access our server from within the UAB, or from a research institute or company on campus that has its network integrated into the UAB network, you should have no problems connecting and downloading your data. | ||
- | Conversely, if you connect from an off-campus computer, and your institute or company has a firewall to protect its network, you will have to ask the people responsible for the firewall to configure it so that you can recover | + | Conversely, if you connect from an off-campus computer, and your institute or company has a firewall to protect its network, you will have to ask the people responsible for the firewall to configure it so that you can retrieve |
The configuration is very simple and does not entail an unacceptable security risk, the steps required are : | The configuration is very simple and does not entail an unacceptable security risk, the steps required are : |