Backup Research Papers - Academia.edu (original) (raw)

This paper addresses the major challenges that large organizations face in protecting their valuable data. Some of these challenges include recovery objectives, data explosion, cost and the nature of data. The paper explores multiple... more

This paper addresses the major challenges that large organizations face in protecting their valuable data. Some of these challenges include recovery objectives, data explosion, cost and the nature of data. The paper explores multiple methods of data protection at different storage levels. RAID disk arrays, snapshot technology, storage mirroring, and backup and archive strategies all are methods used by many large organizations to protect their data. The paper surveys several different enterprise-level backup and archive solutions in the market today and evaluates each solution based on certain criteria. The evaluation criteria cover all business needs and help to tackle the key issues related to data protection. Finally, this paper provides insight on data protection mechanisms and proposes guidelines that help organizations to choose the best backup and archive solutions.

Ransomware is the fastest growing malware threat and accounts for the majority of extortion based malware threats causing billions of dollars in losses for organizations around the world. Ransomware is global epidemic that afflicts all... more

Ransomware is the fastest growing malware threat and accounts for the majority of extortion based malware threats causing billions of dollars in losses for organizations around the world. Ransomware is global epidemic that afflicts all types of organizations that utilize computing infrastructure. Once systems are infected and storage is encrypted, victims have little choice but to pay the ransom and hope their data if released or start over and rebuild their systems. Either remedy can be costly and time consuming. However, backups can be used to restore data and systems to known good state prior to ransomware infection. This makes backups the last line of defense and most effective remedy in combatting ransomware. Accordingly, information security risk assessments should evaluate backup systems and their ability to address ransomware threats. Yet, NIST SP-800-30 does not list ransomware as specific threat. This study reviews the ransomware process, functional backup architecture paradigms, their ability to address ransomware attacks, and provides suggestions to improve the guidance in NIST SP-800-30 and information security risk assessments to better address ransomware threats.

Some tips about the configuration of a MikroTik router.

The segment of companies providing storage services and hardware for end users and small businesses has been growing in the past few years. Cloud storage, personal network-attached storage (NAS) and external hard drives are more... more

The segment of companies providing storage services and hardware for end users and small businesses has been growing in the past few years. Cloud storage, personal network-attached storage (NAS) and external hard drives are more affordable as ever before and one would think that backing up personal digital information is a straight forward process nowadays. Despite this, small group studies and corporate surveys show the opposite. In this paper we present the results from a quantitative and qualitative survey of 319 participants about how they backup their personal computers and restore personal information in case of computer failures. The results show that the majority of users do manual, selective and non-continuous backups, rely on a set of planned and unplanned backups (as a consequence of other activities), have inadequate knowledge about possible solutions and implications of using known solutions, etc. The study also revealed that around a fifth of all computers are not backed up, and a quarter of most important files and a third of most important folders at the time of the survey could not be (fully) restored in the event of computer failure. Based on results several implications for practice and research are presented.

In recent years, solid state drives (SSD) have started to replace hard disk drives. An SSD is a high-speed storage device with a TRIM function. However, an SSD cannot restore deleted files. Therefore, the user is required to back up data... more

In recent years, solid state drives (SSD) have started to replace hard disk drives. An SSD is a high-speed storage device with a TRIM function. However, an SSD cannot restore deleted files. Therefore, the user is required to back up data for protection. The Microsoft Volume Shadow Copy Service (VSS) is often recommended for backups. However, although it has tools for backup, they are complicated to use. In addition, VSS does not have enough implemented functions. Therefore, we propose a unified tool named ShadowBox, which easily helps typical users to create a shadow copy and to restore data from it. In addition, we discuss the protection of shadow copy data from attacks due to malicious persons and ransomware.

Disaster recovery is a persistent problem in IT platforms. This problem is more crucial in cloud computing, because Cloud Service Providers (CSPs) have to provide the services to their customers even if the data center is down, due to a... more

Disaster recovery is a persistent problem in IT platforms. This problem is more crucial in cloud computing, because Cloud Service Providers (CSPs) have to provide the services to their customers even if the data center is down, due to a disaster. In the past few years, researchers have shown interest to disaster recovery using cloud computing, and a considerable amount of literature has been published in this area. However, to the best of our knowledge, there is a lack of precise survey for detailed analysis of cloud-based disaster recovery. To fill this gap, this paper provides an extensive survey of disaster recovery concepts and research in the cloud environments. We present different taxonomy of disaster recovery mechanisms, main challenges and proposed solutions. We also describe the cloud-based disaster recovery platforms and identify open issues related to disaster recovery.

Google allows us to Backup and Download complete Google Data Including Gmail, Drive, Contacts, Calendar etc. By downloading all emails from gmail to your computer, we can make sure that our important emails and contacts can be recovered,... more

Google allows us to Backup and Download complete Google
Data Including Gmail, Drive, Contacts, Calendar etc. By downloading all emails from gmail to your computer, we can make sure that our important emails and contacts can be recovered, if something goes wrong.We can download the details as an archive. Later we can
restore these Gmail Backup (MBOX Files) to an email client like Mozilla’s Thunderbird and copy it back to the Gmail Account just in case, it
is accidentally deleted from our Google Account. Learn more: admeonline.com/gmail-backup-how-to-download-gmail-emails-to-computer-complete-guide

Diversos autores abordam as técnicas de backup em suas pesquisas sobre preservação digital (FRANCH, 2008; INNARELLI, 2007; 2012; INTERPARES, 2007; SOMASUNDARAM & SHRIVASTAVA, 2011), paralelamente a isto existe uma indefinição do contexto... more

Diversos autores abordam as técnicas de backup em suas pesquisas sobre preservação digital (FRANCH, 2008; INNARELLI, 2007; 2012; INTERPARES, 2007; SOMASUNDARAM & SHRIVASTAVA, 2011), paralelamente a isto existe uma indefinição do contexto teórico-conceitual dos procedimentos de backup. Com esta abordagem tem-se por objetivo verificar a (in)definição do backup como estratégia de preservação digital, identificado o seu nicho e sua necessidade de aplicação.

Right now hosting companies charges lots of money for each web developments tools like security, firewall, uptime, backup, also the control panel provided by hosting companies are not up to mark means in every control panel there is some... more

Right now hosting companies charges lots of money for each web developments tools like security, firewall, uptime, backup, also the control panel provided by hosting companies are not up to mark means in every control panel there is some functionality lacking so clients don't get every needed tools from one place also there are many unnecessary tools that clients don't use in control panel most of the times, they are just resource eater so in this project we only focus on development of WordPress websites because as per 2019 statistics WordPress' market share is 34% of all websites so first we are only targeting WordPress websites because by choosing WordPress we are directly targeting 34% of world websites. Our Project is fully automated managed WordPress plugins based control panel. It includes plugins like dashboard, backup, security, firewall, uptime and more. By our project we want to make WordPress more affordable, simple, secure, speedy and more efficient.

In this new era of information and technology computers play an essential role in our life. Most critical data are being stored on the computer’s hard disk. It can give you nightmares if your hard drive fails to work or has crashed and... more

In this new era of information and technology computers play an essential role in our life. Most critical data are being stored on the computer’s hard disk. It can give you nightmares if your hard drive fails to work or has crashed and you cannot do the disk recovery. You can follow certain tips that will help you to avoid future hard drive crashes and data loss.
If you ever found an error message on your computer screen that flashes “missing system file” with a black screen and your computer doesn’t boot at all, don’t panic your data is still there. You just need to repair your corrupted Windows with the help of a Windows CD. In this case don’t go for a system recovery, it may format the complete hard disk and reinstall Windows.
Always try to use USB caddies to pull out the data from your computer and store a back up copy. These USB caddies are very helpful and should be used if you want to make some changes in your computer hardware.
If you start you computer and it says “chkdsk”, it might be some problem with your hard disk. Turn off your computer, remove the hard disk and create a back up copy using a USB caddie, after that switched on your computer. If the same message is displayed in your computer frequently you should consider your hard drive to be checked or replaced.
If you have accidentally deleted any data from your computer and you have also emptied your recycle bin, then don’t go directly to internet to download any software to recover your lost data. Always turn off your computer, connect your hard disk to a separate system using a USB caddie, install data recovery software into that separate system and scan for the lost data from that system. After finding the data save it in the system through which you were searching for the lost data.
If you hear clicking noise from your hard disk, immediately shut down your computer. If your computer is not responding do a hard shutdown. Never try to restart the computer immediately; it may cause data loss. Take time to let the hard drive cool, then connect it to a caddie and extract the data and store them on different hard drive and try to recover data.

Data corruption is a crucial issue for all computer users especially those in the academe, industry and the government. For business critical and mission critical documents, proprietary data recovery applications are available with... more

Data corruption is a crucial issue for all computer users especially those in the academe, industry and the government. For business critical and mission critical documents, proprietary data recovery applications are available with significant monetary cost and increased overhead in processing utilization. The Hydra Data Protection (HDP) is a working prototype that provides real-time, seamless and mobile capabilities that allows users to conduct backup on the background while maintaining normal computing behavior. Successful tests have been conducted to prove the efficiency and accuracy of HDP through various test scenarios using a Universal Serial Bus (USB) flash drive and a computer

Over the past decades, composite materials have been increasingly utilized in various industries because of their superior mechanical properties and resistance to corrosion. Drilling is essential to produce precise holes when loadcarrying... more

Over the past decades, composite materials have been increasingly utilized in various industries because of their superior mechanical properties and resistance to corrosion. Drilling is essential to produce precise holes when loadcarrying structures are produced using composites. Because of the non-homogeneous and anisotropic property of composite laminates, delamination often occurs at the point where the drill exits, which affects reliability and safety. Some studies present a suppressed mechanism to prevent delamination when drilling composite laminates. The experimental results demonstrate delamination is significantly reduced by various suppressed mechanisms and greater feed rates produce the same level of delamination. The use of special drill geometries and backup has been demonstrated to be more advantageous than the use of adapted feed controls. The basis for the future development of a suppression mechanism for drilling composite laminates is determined.

Backup software information is a potential source for data mining: not only the unstructured stored data from all other backed-up servers, but also backup jobs metadata, which is stored in a formerly known catalog database. Data mining... more

Backup software information is a potential source for data mining: not only the unstructured stored data from all other backed-up servers, but also backup jobs metadata, which is stored in a formerly known catalog database. Data mining this database, in special, could be used in order to improve backup quality, automation, reliability, predict bottlenecks, identify risks, failure trends, and provide specific needed report information that could not be fetched from closed format property stock property backup software database. Ignoring this data mining project might be costly, with lots of unnecessary human intervention, uncoordinated work and pitfalls, such as having backup service disruption, because of insufficient planning. The specific goal of this practical paper is using Knowledge Discovery in Database Time Series, Stochastic Models and R scripts in order to predict backup storage data growth. This project could not be done with traditional closed format proprietary solutions, since it is generally impossible to read their database data from third party software because of vendor lock-in deliberate overshadow. Nevertheless, it is very feasible with Bacula: the current third most popular backup software worldwide, and open source. This paper is focused on the backup storage demand prediction problem, using the most popular prediction algorithms. Among them, Holt-Winters Model had the highest success rate for the tested data sets.

Energy distribution technique is an essential obligation of an intelligent household system to assure optimal and economical operation. This paper considers a small-scale household system detached from the power grids consisting of some... more

Energy distribution technique is an essential obligation of an intelligent household system to assure optimal and economical operation. This paper considers a small-scale household system detached from the power grids consisting of some electrical components in day-to-day life. Optimal power distribution generated from a photovoltaic system is vital for ensuring economic and uninterrupted power flow. This paper presents an optimal energy distribution technique for a small-scale smart household system to ensure uninterrupted and economical operation. A photovoltaic (PV) system is considered as the primary generation system, and a battery energy storage system (BESS) is viewed as a backup power supply source. The actual load and PV generation data are used to validate the proposed technique collected from the test household system. Two different load profiles and photovoltaic power generation scenarios, namely summer and winter scenarios, are considered for case studies in this resear...

Abstract-- Main objective of this paper is to discuss how to utilize the Cloud Computing (CC) applications for effective functioning of E-Governance activities in India. So, far technocrats as been utilizing various conventional based... more

Abstract-- Main objective of this paper is to discuss how to utilize the Cloud Computing (CC) applications for effective functioning of E-Governance activities in India. So, far technocrats as been utilizing various conventional based logical software applications for functioning of E-Governance. Unfortunately appropriate governments failed to get desired results through the existing available applications. Due to this cause of the deficiency, the author proposing sophisticated and suitable Cloud Computing applications just like Accounting, Business Intelligence,

How to get backup from BaseBand by using Cygwin program