Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

The research paper should be 8 - 9 pages of text in length - not including title page, figures and tables, and references;

It should include a one paragraph abstract and a brief conclusion - Think as if you were writing for a professional journal;

It should use APA format (double-spaced, 12-point Times New Roman font, one inch margins, page numbers with running head in upper right corner)

Should include at least 10 references

RESEARCH PAPER PROPOSAL

Title: storage technology with a focus on data archiving

Research question: though the price of archiving data is usually considered first, how can data be efficiently archived utilizing a scalable data archiving storage system?

Thesis statement: the importance of the archiving data procedure is maximizing space efficiency while maintaining a little impact on other areas.

I. ABSTRACT

Data archiving is very critical for some organizations, especially when handling legal, production, or medical data. While the cost of archiving data is commonly considered first, increasing volumes and retention periods are very important factors that have to be taken into consideration.

The main challenge facing archiving technologies is the inability to effectively detect redundant data in an existing data on storage and in new data. Also, archiving faces the challenge of reducing the wastage that arises as a result of searching metadata.

According to Yan Zhang and Ansari (2014), PRESIDIO framework handles redundancy and minimizing wastage in searching for metadata. It is designed to determine the method that implements the highest compression in a file by optimally weighing the tradeoff between computation time and size reduction and creating a balance using the exhaustive search on all the files under storage.

II. INTRODUCTION

There is continuous growth in the amount of data that is being created and which requires storage. The use of archiving methods provides low-cost storage for large volumes of data over a longer period of time reliably. Archiving storage systems must have the capacity to store large data chunks reliably for a long time and at a low cost.

However, the storage requirements for archiving highly vary from redundant to highly compressed data. There are several data compression algorithms but which vary depending on the granularity of the redundant data. These algorithms face a major challenge when determining the best data compression on highly dependent heterogeneous data forms.

a. Purpose Statement

The purpose of this research is to explore and discuss the novel techniques that are applicable in data archiving using multiple methods of storage that minimize redundancy across high and low entropy data as well as interfile compression using the progressive redundancy elimination of similar and identical data in object (PRESIDIO) framework.

We shall also be looking to identify the solution that is provided by PRESIDIO in the way it identifies similar data in storage, ways of eliminating redundancy in data using specialized storage methods and how the data is finally recorded in the storage system.

III. FACTORS TO BE CONSIDERED

a. Problem Statement

b. Data Archiving Cost

c. Data Retention And Protection

IV. SOLUTION OVERVIEW

a. Proposed Solution

b. Redundant Data Detection

c. Data Storage

V. CONCLUSION

References
Castro, m. (2018). Farsite: federated, available, and reliable storage for an incompletely trusted environment.

Ivanov, G. (2012). Algorithm for constructing an optimal control strategy in a nonlinear differential game with Lipschitz compactly supported payoff. Differential Equations, 48(4), 560-573.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92715096

Have any Question?


Related Questions in Management Information System

Threats vulnerabilities security controls and

Threats, Vulnerabilities, Security Controls, and Countermeasures Description: The objective of this project is to create a comprehensive threat model on a software application of your choosing. This assignment will requi ...

Assignment should cultures within the united states be

Assignment Should cultures within the United States be expected to set aside some traditions or beliefs and integrate under a united social contract? And Why? In response to federal policy and service requirements, healt ...

Assignment creating and communicating a security

Assignment : Creating and Communicating a Security Strategy As an IT professional, you'll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you'll practice this im ...

Security and privacy play an important role within an ea

Security and privacy play an important role within an EA program and its architecture. Please respond to the following in your own words: 1. What is your understanding of the role of security and privacy in the EA progra ...

Assignment purpose him professionals need to be able to

Assignment Purpose: HIM professionals need to be able to compare and understand different classification systems and understand the challenges of the ACO environment. Assignment Description: Part 1: Complete this mapping ...

Review the building shared services at rr communications

Review the Building Shared Services at RR Communications case study online, and ansswer the below questions. Describe the advantages of a single customer service center for RR Communications. Devise an implementation str ...

Read assess the risk by zurier from sc magazine for it

Read "Assess the Risk," by Zurier, from SC Magazine: For IT Security Professionals (2015). The first step in the creation of an effective risk-management system is understanding the types of risks an organization may fac ...

1 with the explosion of users on social media sites

1. With the explosion of users on social media sites, businesses need to establish their presence on social media sites. Just search for "Vans" or "Starbucks" on Facebook for examples of company sites. To manage their in ...

Antenna signal strength and direction please respond to the

"Antenna Signal Strength and Direction" Please respond to the following: 1. Assess the extent to which you believe the design and structure of antennas affect the overall purchasing decisions of consumers. Determine the ...

Compare presentations of lessons learned on byod

Compare presentations of lessons learned on BYOD implementations. Develop a BYOD policy, in conjunction with a deployment of an MDM device for a medium sized hospital. What compliance issues and ethical issues are there ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As