scholarly journals Transaction Data Management System based on Distributed Storage Architecture

2020 ◽  
Vol 1550 ◽  
pp. 032030
Author(s):  
Yuan Ji ◽  
Tian Xia ◽  
Honglue Zhang ◽  
Gang Chen
2011 ◽  
Vol 19 (1) ◽  
pp. 27-43
Author(s):  
Tevfik Kosar ◽  
Ismail Akturk ◽  
Mehmet Balman ◽  
Xinqi Wang

Modern collaborative science has placed increasing burden on data management infrastructure to handle the increasingly large data archives generated. Beside functionality, reliability and availability are also key factors in delivering a data management system that can efficiently and effectively meet the challenges posed and compounded by the unbounded increase in the size of data generated by scientific applications. We have developed a reliable and efficient distributed data storage system, PetaShare, which spans multiple institutions across the state of Louisiana. At the back-end, PetaShare provides a unified name space and efficient data movement across geographically distributed storage sites. At the front-end, it provides light-weight clients the enable easy, transparent and scalable access. In PetaShare, we have designed and implemented an asynchronously replicated multi-master metadata system for enhanced reliability and availability, and an advanced buffering system for improved data transfer performance. In this paper, we present the details of our design and implementation, show performance results, and describe our experience in developing a reliable and efficient distributed data management system for data-intensive science.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2014 ◽  
Vol 36 (7) ◽  
pp. 1485-1499 ◽  
Author(s):  
Jie SONG ◽  
Tian-Tian LI ◽  
Zhi-Liang ZHU ◽  
Yu-Bin BAO ◽  
Ge YU

1991 ◽  
Author(s):  
Douglas E. Shackelford ◽  
John B. Smith ◽  
Joan Boone ◽  
Barry Elledge

Sign in / Sign up

Export Citation Format

Share Document