Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // Nov 2009

    Identification Based on MATLAB

    System identification based on MATLAB is highly efficient. First of all, a second-order system is built with system simulation toolbox of SIMULINK, and then the parameters of the system are identified by use of system identification toolbox. The identification report is generated in the form of web page and the...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Research of Distributed Algorithm based on Parallel Computer Cluster System

    The variation of parallel computer system structure development is very quick, which mainly embodies in two aspects. Parallel computer cluster technology is an important development direction of high-performance parallel computer system. Parallel computer system is the best choice in institution, which has the high frequent operation requirement. This paper gives...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Mine Cross-Level Location Sequences in RFID System

    With RFID technology being applied in more and more applications now-a-days, many researchers have focused on how to manage and analyze RFID data efficiently. Obviously, location information, which is an important part of RFID data, has the characteristic of multiple conceptual levels. Existing methods of RFID data management mainly deal...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Design and Implement of Distributed Document Clustering Based on MapReduce

    With the rapid development of the Internet, huge volumes of documents need to be processed in a short time. In this paper, the authors describe how document clustering for large collection can be efficiently implemented with MapReduce. Hadoop implementation provides a convenient and flexible framework for distributed computing on a...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Research of Routing System Which Applied in ASP.NET MVC Application

    Most URLs have been corresponding directly to files on the server side in traditional ASP.NET WebForms and many other web platforms. Though, it's very easy to access the files that existed on the server, through inputs its name directly in the URL, which is easy to understand, but it also...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Applying Association Rule Analysis in Bibliometric Analysis

    Scientific research needs lots of literature searches that cost a large amount of time and energy. Bibliometric techniques could help the authors find research hotspots and grasp the research direction yet can't reveal huge hidden information in massive literature since the existing bibliometric analysis techniques employ mainly simple statistical analysis...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Research On Enterprise Information Metadata Ontology Construction

    The knowledge management of enterprise has been improved greatly till now. For making use of enterprise information resource more effective, the standardization and unification of information metadata must done firstly, which has a significant impact on enterprise's information integration and sharing. The paper uses the \"Skeleton\" and cluster analysis method...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Optimal Backup Policies for a Database System with Periodic Incremental Backup

    In recent years, database in computer systems have become very important in the highly information-oriented society. The database is frequently updated by adding or deleting data files, and is stored in floppy disks or other secondary media. Even high reliable computers might sometimes break down eventually by several errors due...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    An Improved Clustering Algorithm

    Cluster analysis has recently become a highly active research branch in data mining and been widely used in many fields such as market research, pattern recognition, data analysis and image processing. This paper introduces an improved clustering algorithm GCA (Gravitational Clustering Algorithm), it is extended in such a way that...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Application of Surrounding Rock Stability Classification Based on Fuzzy ClusteringZhu

    In recent years, with the rapid development of geotechnical engineering at home and abroad, more and more irrigation works, transportation, energy and defense projects have started in some areas. Fuzzy clustering is a scientific and effective clustering method, which is applied surrounding rock stability classification of underground engineering by compiling...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A New Data Mining Process Model for Aluminum Electrolysis

    Aluminum electrolysis is a complex industrial process with large volume data. To discover knowledge from the data, data mining is one of the most natural candidate tools. However, the mainstream data mining faces critical challenges and lacks of soft power in solving real-world complex problems when deployed. In this paper,...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Research on Intelligence Database for Target Identification in Naval Battlefield

    Targets in naval battlefield are various in kind and attribute. Through the management of the targets' information before war, prior knowledge of target identification is provided in warfare process. First, target characteristic and the configuration of target identification are analyzed. Then the E-R model for the intelligence database is constructed...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Variable-weight Data Fusion from Active and Passive Radars for Target Tracking

    Target tracking is usually performed by non-homogenous radars and each radar carries a considerable amount of target state information. A variable-weight state vector data fusion algorithm from active and passive radars is introduced to the target tracking system. Each radar adopts variable weight coefficient in the data fusion process instead...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Novel Reversible Data Hiding Based on the Prediction Error Image

    Reversible data hiding has drawn a lot of interest recently. Being reversible, the original image can be completely restored without distortion. In this paper, a novel reversible data hiding scheme is proposed, which is based on histogram shifting of prediction errors. The JPEGLS prediction method is employed. The authors apply...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    An Approach of Automatic Web Data Record Extraction Using Clustering Techniques

    A novel approach is proposed to automatically extract data records from web pages using clustering techniques. The approach is completed in four steps. Firstly, it utilizes the visual information to identify data region containing data records. Secondly, it uses clustering algorithm to divide the similar nodes into one group. Thirdly,...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Weighted Suffix Tree Document Model for Web Documents Clustering

    A novel Weighted Suffix Tree Document (WSTD) model is proposed to construct Web document feature vector for computing the pair wise similarities of documents with weighted phrase. The weighted phrase-based document similarity is applied to the Group-average Hierarchical Agglomerative Clustering (GHAC) algorithm to develop a new Web document clustering approach....

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Database Auditing Design on Historical Data

    Database auditing is one of the major issues in information security. Lack of data auditing leads the business applications to the lost trail of business processes. To cope with auditing, historical data or temporal database is needed in order to track operations and actors of the operation with the time....

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Comparative Management Costs Study: Oracle Database 11g Vs. Microsoft SQL Server 2008

    This paper is the latest in a series of Comparative Management Cost Studies (CMCS) comparing Oracle Database with database management systems offered by other leading enterprise software vendors. This edition of the study compares Microsoft SQL Server 2008 with Oracle Database 11g. Following the same approach taken in the earlier...

    Provided By Edison Group

  • White Papers // Jan 2010

    Rsync Internet Backup Whitepaper

    BackupAssist provides a simple and automated solution for organizations who want to store a backup copy of their data offsite via LAN or WAN using an efficient and effective transfer method. This whitepaper outlines: how the Rsync client works, performance and best practices, how to setup Windows and Linux machines...

    Provided By BackupAssist Backup Software

  • White Papers // May 2010

    Master Data Management : An Introduction

    This paper discusses on the Master Data Management seeks to make sure that an association does not exercise manifold editions of the identical master data in dissimilar divisions of its IT systems. It is frequently said that Master Data Management facilitates venture to generate a particular resource of Truth. Master...

    Provided By AppLabs

  • eBooks // Jul 2014

    Help Desk Best Practices

    A help desk is critical to the operations of an IT services business. As a centralized intake location for technical issues, it allows for a responsive and timely solution to get clients and their staff back to business as usual. In addition to handling immediate IT issues, a help desk...

    Provided By LabTech Software

  • Case Studies // May 2009

    Backup Technology Case Study: Park City Mountain Resort

    Park City Mountain Resort (PCMR) was one of the venues for the 2002 Winter Olympic Games. It is responsible for managing a majority of the IT infrastructure for the different POWDR Corp resorts. This entails developing the overall IT strategy and hosting key applications for their sister properties. Hosting the...

    Provided By IDEALSTOR

  • Case Studies // May 2009

    Backup Technology Case Study: The Bank of Gen Burnie

    The Bank of Glen Burnie is one of the largest Independent Banks in Maryland. They were challenged by increasing amounts of data at its main branch location. They needed a faster method of backing up of data because it was taking more than an entire night to complete all their...

    Provided By IDEALSTOR

  • Case Studies // May 2009

    Backup Technology Case Study: Next Generation Radiology

    Next Generation Radiology (NGR) is a practice that has 4 full service locations in New York state. As a radiology practice, NGR is on the cutting edge of technology using the latest in PACS/RIS technology and load balanced VPN connectivity between all four locations. Being involved in the radiology industry,...

    Provided By IDEALSTOR

  • Case Studies // May 2009

    Pine Bluff Dumps Backup Load Onto the Idealstor 4 Bay Backup Appliance

    Pine Bluff Chemical Agent Disposal Facility (PBCDF), located in Southeast Arkansas, is one of several chemical demilitarization sites in the United States dedicated to the most comprehensive worldwide disarmament initiative ever negotiated. The PBCDF has contracted out certain components of their IT infrastructure to the Science Applications International Corporation (SAIC)....

    Provided By IDEALSTOR

  • White Papers // Apr 2009

    Making Money With Clouds: Revenue Optimization Through Automated Policy Decisions

    Many existing IT applications exhibit strongly varying demand patterns for resources. Accommodating an ever increasing and highly fluctuating demand requires continuous availability of sufficient resources. To achieve this state at reasonably costs, a high degree of flexibility with respect to the given IT infrastructure is necessary. Facing this challenge the...

    Provided By Universitat Karlsruhe

  • White Papers // May 2013

    Take Back Control of Your Active Directory Auditing

    Every organization needs to have management tools that allow them seamless control over all aspects of their Active Directory environment. Uptime is extremely important for every organization and every minute that Active Directory is not functioning properly could cause a financial loss. Administrators need tools that can provide them with...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    A Process Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance

    This white paper outlines a sound process-based approach in protecting critical privileged accounts that are found in virtually every application, database and infrastructure device throughout enterprises. This paper will present BeyondTrust PowerKeeper as a solution to secure passwords for privileged accounts in heterogeneous IT environments. Through features such as automated...

    Provided By BeyondTrust

  • White Papers // Dec 2009

    Selling IT Managed Services To Your Clients

    In contrast to the break/fix IT model, the managed services model allows IT service providers to proactively manage their clients' IT needs, manage systems remotely, and build steady, recurring revenue. In order to make this model successful, IT providers must leverage the value of proactive management to their clients: less...

    Provided By Intronis

  • White Papers // Nov 2009

    A Visual SQL Query Designer

    This paper describes the implementation of a QueryDesignerDialog class that allows users to create SQL queries based on a given OleDb connection string. The designer is similar to the ones found in database tools such as the SQL Server Management Studio and Microsoft Access. It allows end users to build...

    Provided By ComponentOne

  • White Papers // Nov 2009

    Spell-Check OleDb Databases

    This paper describes the implementation of C1DBSpellChecker, a utility that performs spell-checking on OleDb databases including SqlServer and Access. After reading this paper, one will be able to specify a connection string, and then select a table and one or more string fields on the table to spell-check. Typing errors...

    Provided By ComponentOne

  • White Papers // Jan 2010

    Reduce Data-Entry Form Development Time by 60%

    Creating data-entry forms can be very time consuming and tedious, and maintaining them can be a nightmare. However, with ComponentOne InputPanel for WinForms creating and maintaining data-entry forms is no problem at all. The control removes all redundant tasks such as control alignment, spacing, data-binding, labeling, accelerator key generation, and...

    Provided By ComponentOne

  • White Papers // Jan 2010

    How ComponentOne Web Parts Improve the SharePoint Experience

    ComponentOne Studio for SharePoint contains three Web Parts that connect to all popular data sources and display them in grid, chart, and map form. They are the only Web Parts that gives one a point-and-click interface to select the data sources and completely configure how the data is displayed. The...

    Provided By ComponentOne

  • White Papers // Oct 2011

    A Comparative Study of Data Center Network Architectures

    Data Centers (DCs) are experiencing a tremendous growth in the number of hosted servers. Aggregate bandwidth requirement is a major bottleneck to data center performance. New Data Center Network (DCN) architectures are proposed to handle different challenges faced by current DCN architecture. In this paper, the authors have implemented and...

    Provided By ECMS

  • White Papers // Feb 2010

    Converting a Numeric Currency Data to a Text in DB2 Using SQL

    DB2 Universal Database offers several built-in functions like AVG, COUNT, MIN, MAX and SUM. However, there is no direct way to format currency amount in DB2 UDB version. The author has come up with an approach to effectively exploit the built-in functions in DB2 to achieve specific currency format within...

    Provided By Scribd

  • Podcasts // Jan 2013

    Backup Exec Highlights

    In this podcast, the speaker going to highlight the reasons why businesses need to choose Backup Exec for their entire virtual and physical backup, data de-duplication and disaster recovery needs.

    Provided By Symantec Corp.

  • Webcasts // Jan 2013

    Symantec Simplifies IT Management for College in Kansas

    Johnson County Community College uses Symantec's IT Management Suite to manage and deploy software updates, keep inventory of various assets, and simplify overall management. Learn about the IT management in this webcast.

    Provided By Symantec Corp.

  • Webcasts // Jan 2013

    City of Lansing Simplifies eDiscovery, Lowers Storage with Enterprise Vault

    After migrating its email to Microsoft Exchange the City of Lansing needed a solution that centralized email archiving. It selected Symantec Enterprise Vault which streamlined e-Discovery, offered real-time archiving, and reduced storage.

    Provided By Symantec Corp.

  • Webcasts // Jan 2013

    City of Lansing Improves Efficiency, Shrinks Backup Windows with NetBackup

    Symantec NetBackup centralized backups and supported the City of Lansing's move to virtualization. Additionally NetBackup reduced storage, improved efficiencies, encrypted backups, and improved disaster recovery capabilities for the City of Lansing.

    Provided By Symantec Corp.

  • Webcasts // Jan 2013

    SMB Customers Discuss Symantec Backup Exec.cloud

    In this webcast, the presenter going to explain about how to ensure the business continuity and data protection with Backup Exec.cloud. Using the Backup Exec.cloud the users' data will protected in the cloud acting as a disaster recovery solution.

    Provided By Symantec Corp.