Search results
1 – 10 of over 4000One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer…
Abstract
One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer file, containing only a few thousand bytes, may represent many hours of manual and intellectual labour. Larger files may form the foundation for the daily operations of an individual or of an entire library.
New developments in tape backup include the use of Digital Audio Tape (DAT) and data compression techniques but, before we take a look at these new features — and some of the…
Abstract
New developments in tape backup include the use of Digital Audio Tape (DAT) and data compression techniques but, before we take a look at these new features — and some of the available tape units that make use of them — a discussion of tape backup itself seems appropriate. Readers who are thoroughly familiar with tape backup can skip directly to the paragraph headed ‘Data compression for low cost units’.
Salih Tekin, Kemal Bicakci, Ozgur Mersin, Gulnur Neval Erdem, Abdulkerim Canbay and Yusuf Uzunay
With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of…
Abstract
Purpose
With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of organizations' information systems. However, since backup operations do not come free, there is a need for a data-informed policy to decide how often and which type of backups should be taken. In this paper, the authors present a comprehensive mathematical framework to explore the design space for backup policies and to optimize backup type and interval in a given system. In the authors' framework, three separate cost factors related to the backup process are identified: backup cost, recovery cost and data loss cost. The objective function has a multi-criteria structure leading to a backup policy minimizing a weighed function of these factors. To formalize the cost and objective functions, the authors get help from renewal theory in reliability modeling. The authors' optimization framework also formulates mixed policies involving both full and incremental backups. Through numerical examples, the authors show how the authors' optimization framework could facilitate cost-saving backup policies.
Design/methodology/approach
The methodology starts with designing different backup policies based on system parameters. Each constructed policy is optimized in terms of backup period using renewal theory. After selecting the best back-up policy, the results are demonstrated through numerical studies.
Findings
Data backup polices that are tailored to system parameters can result in significant gains for IT (Information Technology) systems. Collecting the necessary parameters to design intelligent backup policies can also help managers understand managers' systems better. Designed policies not only provides the frequency of back up operations, but also the type of backups.
Originality/value
The original contribution of this study is the explicit construction and determination of the best backup policies for IT systems that are prone to failure. By applying renewal theory in reliability, the authors present a mathematical framework for the joint optimization of backup cost factors, i.e. backup cost, recovery time cost and data loss cost.
Details
Keywords
Quiksave is a backup utility which copies files from a hard disk onto floppy disks, does a total or partial restoration of the floppy files to the hard disk, and provides…
Abstract
Quiksave is a backup utility which copies files from a hard disk onto floppy disks, does a total or partial restoration of the floppy files to the hard disk, and provides automatic reminders to support a user‐determined backup schedule. QuickSave runs on IBM/PC/AT computers and sells for $99 from Micro Interfaces Corp., 16359 N.W. 57th Avenue, Hialeah, FL 33014, USA. (800) 637–7226; (305)623–9262.
Irfan Ali and Nosheen Fatima Warraich
The purpose of this study is to investigate the impact of mobile self-efficacy on personal digital archiving (PDA) practices of undergraduate students.
Abstract
Purpose
The purpose of this study is to investigate the impact of mobile self-efficacy on personal digital archiving (PDA) practices of undergraduate students.
Design/methodology/approach
This study used a quantitative research design for achieving the objectives. The population consisted of undergraduate students from public sector universities (the top five) of Punjab, Pakistan, listed in the Higher Education Commission recognized general universities. The data were analysed by using SmartPLS, mobile self-efficacy was the independent variable that consisted of two constructs (basic mobile phone operations and using the internet and emails). PDA practices was the dependent variable (information backup, clearing and deleting).
Findings
The analysis consisted of two major parts: first the assessment of measurement model and second the structural equation modelling analysis. A significant impact of mobile self-efficacy (basic mobile phone operations, using internet and email) was found on all the sub-constructs (information backup, information clearing and information deleting) of PDA practices. However, using internet and email has no significant impact on the information clearing practices of undergraduate students of Pakistani universities.
Originality/value
This study is a valuable addition to the extant literature because no comprehensive research has been carried out on the impact of mobile self-efficacy and PDA through mobile phones. It also contributes theoretically in the form of the development of a validated instrument on mobile-based PDA. Additionally, it possesses practical value for information literacy instruction programs.
Details
Keywords
Zakaria Maamar, Quan Z. Sheng, Samir Tata, Djamal Benslimane and Mohamed Sellami
In any critical system, high‐availability of software components like web services has so far been achieved through replication. Three replication strategies known as active…
Abstract
Purpose
In any critical system, high‐availability of software components like web services has so far been achieved through replication. Three replication strategies known as active, passive, and hybrid, describe for example how many replicas are needed, where to locate replicas, and how replicas interact with the original web service and among themselves if needed. The purpose of this paper is to show how replicates could be substituted with components that are similarly functional to the component that needs back‐up in case of failure.
Design/methodology/approach
After examination of the different existing replication strategies, it was decided to test the suitability of the proposed web services high‐availability approach based on communities for each strategy. To this end, the specification of web services using two behaviors, namely control and operational, was deemed appropriate.
Findings
The active replication strategy is the only strategy that could support the development of a web services high‐availability approach based on communities of web services.
Practical implications
The proposed approach has been validated in practice by deploying a JXTA‐based testbed. The experimental work has implemented the active replication strategy.
Originality/value
Software component high‐availability could be achieved by components that are similarly functional to this component, which permits the common limitations of existing replication strategies to be addressed.
Details
Keywords
The purpose of this study is to evaluate the roles of team mental models (TMMs) and backup behaviors for teams operating under emergent and dynamic situations. Specifically, the…
Abstract
Purpose
The purpose of this study is to evaluate the roles of team mental models (TMMs) and backup behaviors for teams operating under emergent and dynamic situations. Specifically, the authors used a biased-corrected bootstrapping approach to assess the mediation effects of backup behaviors between the similarity of TMMs and team performance.
Design/methodology/approach
TMMs are a representation of the common understanding and beliefs in terms of task requirements or teamwork skills among different team members. It has wide implementations in various teams that are required to adapt quickly to an emergent and dynamic environment. The construct of TMMs has been studied extensively in previous literature, indicating a strong relationship between TMMs and team performance. However, how TMMs affect team performance under emergent and dynamic situations is only partially understood.
Findings
The findings of this study suggest that the similarity of task-focused mental models positively affects team performance through the mediation effects of backup behaviors. In contrast, the similarity of team-focused mental models does not positively affect backup behaviors and team performance.
Originality/value
This study contributes to the TMMs literature by investigating how teams perform in an emergent and dynamic environment. It not only provides theoretical support to the similarity of TMMs–backup behaviors–team performance relationships but has important implications in terms of team training and decision-making for teams operating under such conditions.
Details
Keywords
Karen Lizzette Orengo Serra and María Sánchez-Jauregui
This study explores how small- and medium-sized enterprises (SMEs) in the food industry in Puerto Rico can enhance resilience to cope with critical infrastructure (CI) collapse…
Abstract
Purpose
This study explores how small- and medium-sized enterprises (SMEs) in the food industry in Puerto Rico can enhance resilience to cope with critical infrastructure (CI) collapse due to natural disasters. This study aims to validate the food supply chain (FSC) resilience model for SMEs in rural areas.
Design/methodology/approach
This study used qualitative in-depth interviews to gather data and a coding process for the analysis. The participants were members of the FSC located in the municipality of Adjuntas and nearby towns in Puerto Rico. For this study, the sample participants selected to conduct the interviews were the farmers, producers and retailers.
Findings
The results show the importance of local CI backup, networks and flexibility among FSC members in alternating supply chain logistics and distribution. Other transportation modes include drone pilots, aerial and land, facilities to transport and deliver merchandise and positioning farmers and producers as important players in the FSC.
Originality/value
A modified FSC resilience model from previous research is presented to include SMEs located in highly vulnerable remote zones, where access to resources is limited after a disruptive event, and a typology of enterprises with local CI backup according to their level of adoption of resilient practices. This study contributes to enhancing resilience and mitigating the vulnerabilities of SMEs after the CI collapses.
Details
Keywords
Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is…
Abstract
Purpose
Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is necessary for librarians to understand and apply the ways of protecting digital data and the related equipment from disaster. The purpose of this paper is to address the issues related to digital data protection in libraries in India. It aims to investigate the perceptions of librarians about the probability of digital disasters happening in their libraries, and to assess the level of digital disaster preparedness among libraries.
Design/methodology/approach
A questionnaire based survey of 276 libraries in the Western region of India was conducted to find out the digital data protection measures taken by them. The paper provides an overview and analysis of the general trends in digital data protection in these libraries.
Findings
The research results indicate that due to lack of knowledge about handling of digital data, and inadequate digital infrastructure setup in organizations, the chances of loss of digital data are high. However, common measures like taking backup of data manually are mostly followed by all libraries. The paper has identified the trends in protection of digital data, as well as the lacunae, in Indian libraries. Basic guidelines on digital data preservation are also presented in the paper.
Practical implications
The guidelines provided in the paper will be useful to any libraries to take measures for protection of the digital data. The libraries will be able to prepare their digital data protection plan and train the staff accordingly.
Originality/value
This paper is the first to address the issue of digital disaster management in libraries in India. It provides a detailed analysis of digital data protection measures taken by Indian libraries currently.
Details
Keywords
Qiuhui Xiao, Xiaotong Xu and Panpan Liu
Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security…
Abstract
Purpose
Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security status of electronic records preservation. Wuhan, the largest city in central China, serves as a case to investigate the preservation security of electronic records. Challenges to security are summarized, and solutions are proposed to support policy-developing and operational guidance. The paper aims to discuss these issues.
Design/methodology/approach
The Delphi method is applied to analyze the advice of nine experts, select survey items and design questionnaires. Data are collected from 34 archives in Wuhan through field surveys, oral interviews and e-mails, which are analyzed and illustrated with three representative cases.
Findings
Main achievements of electronic records preservation are concluded in the electronic records management system, carrier types and storage formats, and data backup. Problems are summarized as a lack of awareness and capability of defending against security risks, disaster recovery capability, and understanding of electronic record characteristics. Solutions are proposed as follows: carrying out regular security risk evaluation, adopting new technologies, implementing application-level backup, strengthening technology-related education and attracting more IT talent to join the archive discipline. In addition, it is critical to promote an understanding of the characteristics of electronic records.
Originality/value
This paper investigates the security status of electronic records in central China by surveys and case studies. Critical problems and corresponding solutions are raised to support policy-developing and operational guidance for the research and practice of all kinds of institutions that implement electronic records preservation.
Details