نتایج جستجو برای: backup coverage
تعداد نتایج: 92473 فیلتر نتایج به سال:
IEEE 802.22 WRAN standard does not specify algorithm for selecting operating channel from backup channel list and prioritizing the backup and candidate channels. Because all the channels in the backup and candidate channels list are not with the same properties, selecting channels randomly from the list may decrease the networks performance. We propose an approach of ranking channel according t...
Maintaining inter-actor connectivity is extremely crucial in mission-critical applications of Wireless Sensor and Actor Networks (WSANs), as actors have to quickly plan optimal coordinated responses to detected events. Failure of a critical actor partitions the inter-actor network into disjoint segments besides leaving a coverage hole, and thus hinders the network operation. This paper presents...
In the enterprise world, retaining data backups is the de-facto solution against data loss in the event of catastrophic failures. As backup software evolves to achieve faster backup and recovery times, however, backup systems deploying it become increasingly complex to administer. This complexity stems from optimizations targeted to specific applications, which increase the number of configurat...
Burt is a freely distributed parallel network backup system written at the University of Wisconsin, Madison. It is designed to backup large heterogeneous networks. It uses the Tcl scripting language and standard backup programs like dump(1) and GNUTar to enable backups of a wide variety of data sources, including UNIX and Windows NT workstations, AFS based storage, and others. It also uses Tcl ...
Introduction Fail-proof data backup and recovery is more critical to an organization’s survival than ever before as few businesses can survive for any period of time without their IT function. With so much reliance on electronic data, an organization can lose millions of dollars associated with lost data including its competitive advantage and credibility as in the case of security breaches. Im...
Database systems provide media recovery by talcing periodic backups and applying a recovery log to a backup to r’estore the failed media. A transaction-time database is one that retains multiple versions of data, recording with each version the time of the transaction that created it. Such a database provides access to historical versions based on transaction time, and permits reconstruction of...
Data protection is the process of backing up data in case of a data loss event. It is one of the most critical routine activities for every organization. Detecting abnormal backup jobs is important to prevent data protection failures and ensure the service quality. Given the large scale backup endpoints and the variety of backup jobs, from a backup-asa-service provider viewpoint, we need a scal...
Amid the Ukrainian War, heroes of intensive care unit (ICU) - doctors, nurses, respiratory therapists, and many others valiantly confront unprecedented challenges, showcasing resilience dedication in face adversity. Despite limited resources electricity backup issues, these health professionals worked tirelessly to provide life-saving critically ill patients, including those with gunshot wounds...
We present a system which enables a user to remove a le from both the le system and all the backup tapes on which the le is stored. The ability to remove les from all backup tapes is desirable in many cases. Our system erases information from the backup tape without actually writing on the tape. This is achieved by applying cryptography in a new way: a block cipher is used to enable the system ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید