Please login to be able to save your searches and receive alerts for new content matching your search criteria.
We describe the data flow in the operation of the VEGA/CHARA instrument. After a brief summary of the main characteristics and scientific objectives of the VEGA instrument, we explain the standard procedure from the scientific idea up to the execution of the observation. Then, we describe the different steps done after the observation, from the raw data to the archives and the final products. Many tools are used and we show how the Virtual Observatory principles have been implemented for the interoperability of these software and databases.
Beijing’s quest for a more prominent role in a changing international order requires greater ability to shape global rules and norms in emerging strategic domains like cyberspace. Cross-border data flows, an important driving force behind the digital economy, give rise to growing concerns about potential threats to national security and individual privacy. In contrast with the Western approach that focuses on maximum data freedom, China’s proposal for cross-border data governance prioritizes security, order, and development. Contrary to outside expectations that Beijing’s restrictive data policies allow little room for international alignment on data security governance, China has shown sufficient flexibility and open-mindedness in major international initiatives for norm setting and institution building. Moreover, Beijing insists that as a global common, cyberspace should not become a new battlefield of great power competition, but instead help advance the shared interests of developing nations.