Sciweavers

3451 search results - page 14 / 691
» Security of Backup Data
Sort
View
ICDCS
2008
IEEE
14 years 1 months ago
Can We Really Recover Data if Storage Subsystem Fails?
This paper presents a theoretical and experimental study on the limitations of copy-on-write snapshots and incremental backups in terms of data recoverability. We provide mathemat...
Weijun Xiao, Qing Yang
SIGUCCS
2004
ACM
14 years 25 days ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
FC
2005
Springer
157views Cryptology» more  FC 2005»
14 years 28 days ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
CN
2008
76views more  CN 2008»
13 years 7 months ago
Efficient path protection in bi-directional WDM systems
Bi-directional WDM transmission is a technique that allows data to be transmitted simultaneously in both directions of a fiber, with different sets of wavelength channels for each...
Ji Li, Kwan L. Yeung, Chun-Kit Chan
FAST
2008
13 years 9 months ago
Avoiding the Disk Bottleneck in the Data Domain Deduplication File System
Disk-based deduplication storage has emerged as the new-generation storage system for enterprise data protection to replace tape libraries. Deduplication removes redundant data se...
Benjamin Zhu, Kai Li, R. Hugo Patterson