Deduplication

Results: 215



#Item
151Data management plan / Metadata / Backup / Data deduplication / Data mining / Data management / Information / Data

Data Management Plan for Post-Graduate Research Projects Researcher: Project Title: Project Duration: Project Context:

Add to Reading List

Source URL: researchdata.ox.ac.uk

Language: English - Date: 2014-01-10 10:57:39
152Data / CPU cache / Solid-state drive / Write amplification / ZFS / Data deduplication / Hybrid array / VRPM / Cache / Computer hardware / Computing

PLC-Cache: Endurable SSD Cache for Deduplication-based Primary Storage Jian Liu1,2,3, Yunpeng Chai1,2*, Xiao Qin4, and Yuan Xiao2 1 Key Laboratory of Data Engineering and Knowledge Engineering, MOE, China

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:49:21
153Computer file formats / Data compression / Statistical inference / Disk file systems / File system / Sample / Data deduplication / File format / Estimation theory / Statistics / Sampling / Computing

The Case for Sampling on Very Large File Systems George Goldberg, Danny Harnik, Dmitry Sotnikov IBM Research–Haifa, {georgeg, dannyh,dmitrys}@il.ibm.com Abstract—Sampling has long been a prominent tool in statistics

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:49:22
154Solid-state drive / CPU cache / Cache algorithms / Write amplification / ZFS / Cache / Computer hardware / Computing

PLC-Cache: Endurable SSD Cache for Deduplication-based Primary Storage Jian Liu, Yunpeng Chai, Yuan Xiao Renmin University of China Xiao Qin Auburn University

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:50:51
155Data quality / Information science / Data deduplication / Data mining / Science / Data management / Information / Data

Casestudy-software-CASS[removed]indd

Add to Reading List

Source URL: www.melissadata.com

Language: English - Date: 2008-04-03 18:03:05
156Crime prevention / Information security / National security / Data deduplication / Information technology management / Public safety / Security / Data security / Computer security

DPP January 07 Partners meeting breakout session note guidelines

Add to Reading List

Source URL: digitalpreservation.gov

Language: English - Date: 2012-08-03 14:21:31
157Computing / Business intelligence / Information technology management / Data compression / Data deduplication / Data mining / Database / Data modeling / Data quality / Data management / Information / Data

Title: Big Data Life Cycle Proposal Background In recent years, much attention has been paid to Big Data and become a hot word from all walks of life. Big Data applications involve more widely, especially in areas such a

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-03-14 07:53:01
158Computing / Data deduplication / Data management / Archive formats / Digital preservation / Lossless data compression / RAR / Backup / Data compression / Information / Data

Microsoft PowerPoint - Bit_Level_Threats_Combined

Add to Reading List

Source URL: digitalpreservation.gov

Language: English - Date: 2012-08-02 12:38:47
159Computing / Backup Exec / VMware / Backup / Hyper-V / Shadow Copy / Data deduplication / Symantec / Windows Server / System software / Software / Backup software

Lab Validation Report Symantec Backup Exec 2012 Achieving Best Practices for Virtual Machine Backup and Recovery By Vinny Choinski, Senior Lab Analyst, and Kerry Dolan, Lab Analyst

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-04-22 13:23:21
160Data security / Virtual tape library / Data synchronization / Backup / Unitrends / ExaGrid / FalconStor Software / Data deduplication / Data Domain / Computing / Backup software / Information

Vendor Landscape: Disk Backup Point your efforts at the best target to meet your backup needs. Vendor Landscape: Disk Backup Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-08-05 17:06:03
UPDATE