NETWORK STORAGE AND ITS FUTURE
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
In the IT world storage becomes a serious issue. Information storage systems are the bedrock on which a modern company rests. Data has to be available to whoever needs it, whenever they need it, from wherever they may be. As a result, emphasis is beginning to shift from a processor centric view of the world towards a storage centric one. It is the information that holds the real value-the processing merely exposes it. Realizing this, model requires a storage system that can provide continuous, guaranteed accessibility to potentially vast quantities of shared information, with protection against both malicious attack and accidental failures, and scalability across a wide range of capacity and performance needs. Network based storage, combined with smart storage management, can provide it. This paper focuses on the proven approaches to network storage and their future.
Authors and Affiliations
S. MOHANTY , P. NAYAK , S. BISWAS
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...
An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining
Databases and data warehouses have become a vital part of many organizations. So useful information and helpful knowledge have to be mined from transactions. In real life, media information has time attributes eith...
A New Fuzzy Gaussian Noise Removal Method for Gray-Scale Images
A New Fuzzy Filter that adopts Fuzzy Logic is proposed in this paper which removes Gaussian Noise from the Corrupted Gray scale Images which is also good for Impulsive and multiplicative Noise. This Method Consists of Tw...
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the p...