Search results

1 – 10 of over 4000
Article
Publication date: 1 January 1995

Howard Falk

One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer…

Abstract

One of the most horrifying computer experiences a user can encounter is the destruction of files due to system malfunction or operator error. Even a relatively small computer file, containing only a few thousand bytes, may represent many hours of manual and intellectual labour. Larger files may form the foundation for the daily operations of an individual or of an entire library.

Details

The Electronic Library, vol. 13 no. 1
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 June 1991

Howard Falk

New developments in tape backup include the use of Digital Audio Tape (DAT) and data compression techniques but, before we take a look at these new features — and some of the…

Abstract

New developments in tape backup include the use of Digital Audio Tape (DAT) and data compression techniques but, before we take a look at these new features — and some of the available tape units that make use of them — a discussion of tape backup itself seems appropriate. Readers who are thoroughly familiar with tape backup can skip directly to the paragraph headed ‘Data compression for low cost units’.

Details

The Electronic Library, vol. 9 no. 6
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 13 July 2022

Salih Tekin, Kemal Bicakci, Ozgur Mersin, Gulnur Neval Erdem, Abdulkerim Canbay and Yusuf Uzunay

With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of…

Abstract

Purpose

With the irresistible growth in digitization, data backup policies become essential more than ever for organizations seeking to improve reliability and availability of organizations' information systems. However, since backup operations do not come free, there is a need for a data-informed policy to decide how often and which type of backups should be taken. In this paper, the authors present a comprehensive mathematical framework to explore the design space for backup policies and to optimize backup type and interval in a given system. In the authors' framework, three separate cost factors related to the backup process are identified: backup cost, recovery cost and data loss cost. The objective function has a multi-criteria structure leading to a backup policy minimizing a weighed function of these factors. To formalize the cost and objective functions, the authors get help from renewal theory in reliability modeling. The authors' optimization framework also formulates mixed policies involving both full and incremental backups. Through numerical examples, the authors show how the authors' optimization framework could facilitate cost-saving backup policies.

Design/methodology/approach

The methodology starts with designing different backup policies based on system parameters. Each constructed policy is optimized in terms of backup period using renewal theory. After selecting the best back-up policy, the results are demonstrated through numerical studies.

Findings

Data backup polices that are tailored to system parameters can result in significant gains for IT (Information Technology) systems. Collecting the necessary parameters to design intelligent backup policies can also help managers understand managers' systems better. Designed policies not only provides the frequency of back up operations, but also the type of backups.

Originality/value

The original contribution of this study is the explicit construction and determination of the best backup policies for IT systems that are prone to failure. By applying renewal theory in reliability, the authors present a mathematical framework for the joint optimization of backup cost factors, i.e. backup cost, recovery time cost and data loss cost.

Details

Journal of Quality in Maintenance Engineering, vol. 29 no. 2
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 1 April 1988

Justine Roberts

Quiksave is a backup utility which copies files from a hard disk onto floppy disks, does a total or partial restoration of the floppy files to the hard disk, and provides…

Abstract

Quiksave is a backup utility which copies files from a hard disk onto floppy disks, does a total or partial restoration of the floppy files to the hard disk, and provides automatic reminders to support a user‐determined backup schedule. QuickSave runs on IBM/PC/AT computers and sells for $99 from Micro Interfaces Corp., 16359 N.W. 57th Avenue, Hialeah, FL 33014, USA. (800) 637–7226; (305)623–9262.

Details

The Electronic Library, vol. 6 no. 4
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 November 2022

Irfan Ali and Nosheen Fatima Warraich

The purpose of this study is to investigate the impact of mobile self-efficacy on personal digital archiving (PDA) practices of undergraduate students.

Abstract

Purpose

The purpose of this study is to investigate the impact of mobile self-efficacy on personal digital archiving (PDA) practices of undergraduate students.

Design/methodology/approach

This study used a quantitative research design for achieving the objectives. The population consisted of undergraduate students from public sector universities (the top five) of Punjab, Pakistan, listed in the Higher Education Commission recognized general universities. The data were analysed by using SmartPLS, mobile self-efficacy was the independent variable that consisted of two constructs (basic mobile phone operations and using the internet and emails). PDA practices was the dependent variable (information backup, clearing and deleting).

Findings

The analysis consisted of two major parts: first the assessment of measurement model and second the structural equation modelling analysis. A significant impact of mobile self-efficacy (basic mobile phone operations, using internet and email) was found on all the sub-constructs (information backup, information clearing and information deleting) of PDA practices. However, using internet and email has no significant impact on the information clearing practices of undergraduate students of Pakistani universities.

Originality/value

This study is a valuable addition to the extant literature because no comprehensive research has been carried out on the impact of mobile self-efficacy and PDA through mobile phones. It also contributes theoretically in the form of the development of a validated instrument on mobile-based PDA. Additionally, it possesses practical value for information literacy instruction programs.

Article
Publication date: 3 April 2009

Zakaria Maamar, Quan Z. Sheng, Samir Tata, Djamal Benslimane and Mohamed Sellami

In any critical system, high‐availability of software components like web services has so far been achieved through replication. Three replication strategies known as active…

Abstract

Purpose

In any critical system, high‐availability of software components like web services has so far been achieved through replication. Three replication strategies known as active, passive, and hybrid, describe for example how many replicas are needed, where to locate replicas, and how replicas interact with the original web service and among themselves if needed. The purpose of this paper is to show how replicates could be substituted with components that are similarly functional to the component that needs back‐up in case of failure.

Design/methodology/approach

After examination of the different existing replication strategies, it was decided to test the suitability of the proposed web services high‐availability approach based on communities for each strategy. To this end, the specification of web services using two behaviors, namely control and operational, was deemed appropriate.

Findings

The active replication strategy is the only strategy that could support the development of a web services high‐availability approach based on communities of web services.

Practical implications

The proposed approach has been validated in practice by deploying a JXTA‐based testbed. The experimental work has implemented the active replication strategy.

Originality/value

Software component high‐availability could be achieved by components that are similarly functional to this component, which permits the common limitations of existing replication strategies to be addressed.

Details

International Journal of Web Information Systems, vol. 5 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 6 December 2020

Zikai Zhou and Pilar Pazos

The purpose of this study is to evaluate the roles of team mental models (TMMs) and backup behaviors for teams operating under emergent and dynamic situations. Specifically, the…

Abstract

Purpose

The purpose of this study is to evaluate the roles of team mental models (TMMs) and backup behaviors for teams operating under emergent and dynamic situations. Specifically, the authors used a biased-corrected bootstrapping approach to assess the mediation effects of backup behaviors between the similarity of TMMs and team performance.

Design/methodology/approach

TMMs are a representation of the common understanding and beliefs in terms of task requirements or teamwork skills among different team members. It has wide implementations in various teams that are required to adapt quickly to an emergent and dynamic environment. The construct of TMMs has been studied extensively in previous literature, indicating a strong relationship between TMMs and team performance. However, how TMMs affect team performance under emergent and dynamic situations is only partially understood.

Findings

The findings of this study suggest that the similarity of task-focused mental models positively affects team performance through the mediation effects of backup behaviors. In contrast, the similarity of team-focused mental models does not positively affect backup behaviors and team performance.

Originality/value

This study contributes to the TMMs literature by investigating how teams perform in an emergent and dynamic environment. It not only provides theoretical support to the similarity of TMMs–backup behaviors–team performance relationships but has important implications in terms of team training and decision-making for teams operating under such conditions.

Details

Team Performance Management: An International Journal, vol. 27 no. 1/2
Type: Research Article
ISSN: 1352-7592

Keywords

Article
Publication date: 20 March 2023

Karen Lizzette Orengo Serra and María Sánchez-Jauregui

This study explores how small- and medium-sized enterprises (SMEs) in the food industry in Puerto Rico can enhance resilience to cope with critical infrastructure (CI) collapse…

Abstract

Purpose

This study explores how small- and medium-sized enterprises (SMEs) in the food industry in Puerto Rico can enhance resilience to cope with critical infrastructure (CI) collapse due to natural disasters. This study aims to validate the food supply chain (FSC) resilience model for SMEs in rural areas.

Design/methodology/approach

This study used qualitative in-depth interviews to gather data and a coding process for the analysis. The participants were members of the FSC located in the municipality of Adjuntas and nearby towns in Puerto Rico. For this study, the sample participants selected to conduct the interviews were the farmers, producers and retailers.

Findings

The results show the importance of local CI backup, networks and flexibility among FSC members in alternating supply chain logistics and distribution. Other transportation modes include drone pilots, aerial and land, facilities to transport and deliver merchandise and positioning farmers and producers as important players in the FSC.

Originality/value

A modified FSC resilience model from previous research is presented to include SMEs located in highly vulnerable remote zones, where access to resources is limited after a disruptive event, and a typology of enterprises with local CI backup according to their level of adoption of resilient practices. This study contributes to enhancing resilience and mitigating the vulnerabilities of SMEs after the CI collapses.

Details

Continuity & Resilience Review, vol. 5 no. 1
Type: Research Article
ISSN: 2516-7502

Keywords

Article
Publication date: 15 June 2015

Parul Zaveri

Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is…

2695

Abstract

Purpose

Disaster management is an issue that has received relatively little attention in libraries, particularly in India. With the growth in digital resources in libraries, it is necessary for librarians to understand and apply the ways of protecting digital data and the related equipment from disaster. The purpose of this paper is to address the issues related to digital data protection in libraries in India. It aims to investigate the perceptions of librarians about the probability of digital disasters happening in their libraries, and to assess the level of digital disaster preparedness among libraries.

Design/methodology/approach

A questionnaire based survey of 276 libraries in the Western region of India was conducted to find out the digital data protection measures taken by them. The paper provides an overview and analysis of the general trends in digital data protection in these libraries.

Findings

The research results indicate that due to lack of knowledge about handling of digital data, and inadequate digital infrastructure setup in organizations, the chances of loss of digital data are high. However, common measures like taking backup of data manually are mostly followed by all libraries. The paper has identified the trends in protection of digital data, as well as the lacunae, in Indian libraries. Basic guidelines on digital data preservation are also presented in the paper.

Practical implications

The guidelines provided in the paper will be useful to any libraries to take measures for protection of the digital data. The libraries will be able to prepare their digital data protection plan and train the staff accordingly.

Originality/value

This paper is the first to address the issue of digital disaster management in libraries in India. It provides a detailed analysis of digital data protection measures taken by Indian libraries currently.

Details

Library Hi Tech, vol. 33 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 2 January 2020

Qiuhui Xiao, Xiaotong Xu and Panpan Liu

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security…

2866

Abstract

Purpose

Recently, increasing importance has been given to electronic records in China, despite the lack of understanding that institutions and organizations have regarding the security status of electronic records preservation. Wuhan, the largest city in central China, serves as a case to investigate the preservation security of electronic records. Challenges to security are summarized, and solutions are proposed to support policy-developing and operational guidance. The paper aims to discuss these issues.

Design/methodology/approach

The Delphi method is applied to analyze the advice of nine experts, select survey items and design questionnaires. Data are collected from 34 archives in Wuhan through field surveys, oral interviews and e-mails, which are analyzed and illustrated with three representative cases.

Findings

Main achievements of electronic records preservation are concluded in the electronic records management system, carrier types and storage formats, and data backup. Problems are summarized as a lack of awareness and capability of defending against security risks, disaster recovery capability, and understanding of electronic record characteristics. Solutions are proposed as follows: carrying out regular security risk evaluation, adopting new technologies, implementing application-level backup, strengthening technology-related education and attracting more IT talent to join the archive discipline. In addition, it is critical to promote an understanding of the characteristics of electronic records.

Originality/value

This paper investigates the security status of electronic records in central China by surveys and case studies. Critical problems and corresponding solutions are raised to support policy-developing and operational guidance for the research and practice of all kinds of institutions that implement electronic records preservation.

Details

Library Hi Tech, vol. 39 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

1 – 10 of over 4000