نتایج جستجو برای: backup strategy
تعداد نتایج: 348085 فیلتر نتایج به سال:
This paper presents simulation experiments investigating the feasibility and cost of providing survivability to ATM multipoint groups using dedicated bandwidth on disjoint backup groups. Disjoint dedicated backup groups are formed via the VC Mesh model by two different approaches: (1) a backup group consisting exclusively of point-to-point circuits (unicast), or (2) a backup group consisting ex...
IEEE 802.22 WRAN standard does not specify algorithm for selecting operating channel from backup channel list and prioritizing the backup and candidate channels. Because all the channels in the backup and candidate channels list are not with the same properties, selecting channels randomly from the list may decrease the networks performance. We propose an approach of ranking channel according t...
In the enterprise world, retaining data backups is the de-facto solution against data loss in the event of catastrophic failures. As backup software evolves to achieve faster backup and recovery times, however, backup systems deploying it become increasingly complex to administer. This complexity stems from optimizations targeted to specific applications, which increase the number of configurat...
Burt is a freely distributed parallel network backup system written at the University of Wisconsin, Madison. It is designed to backup large heterogeneous networks. It uses the Tcl scripting language and standard backup programs like dump(1) and GNUTar to enable backups of a wide variety of data sources, including UNIX and Windows NT workstations, AFS based storage, and others. It also uses Tcl ...
Introduction Fail-proof data backup and recovery is more critical to an organization’s survival than ever before as few businesses can survive for any period of time without their IT function. With so much reliance on electronic data, an organization can lose millions of dollars associated with lost data including its competitive advantage and credibility as in the case of security breaches. Im...
Database systems provide media recovery by talcing periodic backups and applying a recovery log to a backup to r’estore the failed media. A transaction-time database is one that retains multiple versions of data, recording with each version the time of the transaction that created it. Such a database provides access to historical versions based on transaction time, and permits reconstruction of...
As an efficient alternative to fossil fuels, renewable energy sources have attained great attention due to their sustainable, cost-effective, and environmentally friendly characteristic. However, as a deficiency, renewable energy sources have low reliability because of their non-deterministic and stochastic generation pattern. The use of hybrid renewable generation systems along with the storag...
Data protection is the process of backing up data in case of a data loss event. It is one of the most critical routine activities for every organization. Detecting abnormal backup jobs is important to prevent data protection failures and ensure the service quality. Given the large scale backup endpoints and the variety of backup jobs, from a backup-asa-service provider viewpoint, we need a scal...
this study aimed to investigate the effects of listening strategy training on iranian efl learners listening comprehension and use of such strategies. this work, employing an experimental methodology, was conducted among 60 adult efl learners from a language institute in isfahan, iran, as participants. the participants, who were selected based on the results of a placement test, were assigned t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید