Purpose–The purpose of this paper is to examine the importance of beginning digital preservation efforts with restricted resources. Design/methodology/approach–The paper …
R Layton, PA Watters - Journal of Information Security and Applications, 2014 - Elsevier
Concerns are increasing that data breaches are occurring more frequently, as technologies like the web, social media and the cloud become more integrated within standard business …
Purpose The purpose of this study was to map the quantity (frequency), quality (impact) and structural indicators (correlations) of research produced on cloud computing in 48 countries …
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged …
The lowly state of the art for file system checking and repair does not match what is needed to keep important data available for users. Current file system checkers, such as e2fsck, are …
W Litwin, T Schwarz - Proceedings of the 2000 ACM SIGMOD …, 2000 - dl.acm.org
LH* RS is a new high-availability Scalable Distributed Data Structure (SDDS). The data storage scheme and the search performance of LH* RS are basically these of LH*. LH* RS …
Worms represent a substantial economic threat to the US computing infrastructure. An important question is how much damage might be caused, as this figure can serve as a …
W Xiao, J Ren, Q Yang - IEEE Transactions on Parallel and …, 2008 - ieeexplore.ieee.org
This paper presents a study of data storages for continuous data protection (CDP). After analyzing the existing data protection technologies, we propose a new disk array …
A Van Niekerk, R Rudman - Southern African Journal of …, 2019 - journals.co.za
Adopting Internet of Things (IoT) as part of a business's operations could generate value for a business through data generation and integration, as well as enhanced information …