An Efficient Data Management System with High Scalability for ChinaGrid Support Platform

Author(s):  
Hai Jin ◽  
Wenjun Gong ◽  
Song Wu ◽  
Muzhou Xiong ◽  
Li Qi ◽  
...  
2019 ◽  
pp. 65-72
Author(s):  
Filippo Edoardo Capasso ◽  
Francesca Castiello ◽  
Simona Dichiara ◽  
Manuel Giandomenico ◽  
Natalie Iacopino ◽  
...  

Some 90 Roman stucco fragments, coming from the Archaeological Park of Herculaneum, underwent in the conservation-restoration process within the Istituto Superiore per la Conservazione ed il Restauro (ISCR) laboratories in Matera. Before the conservation activity, the wide number of this manufacts brought us to design a data management system, suitable for stucco findings. Nowadays, the international approaches towards data management of this kind of artifacts is extremely heterogeneous and the absence of an unequivocal data sheet makes the cataloguing very complex and laborious. Our studies on the fragments allowed us to draw up a specific cataloguing instrument for this kind of material, carried out with a software structuring data collection in order to respond to different necessities, such as completeness and updatability, required by an efficient data management system.


2017 ◽  
Vol 143 ◽  
pp. 173-178 ◽  
Author(s):  
Arun Kumar ◽  
Pushpendu Kar ◽  
Rakesh Warrier ◽  
Aditi Kajale ◽  
Sanjib Kumar Panda

2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2014 ◽  
Vol 36 (7) ◽  
pp. 1485-1499 ◽  
Author(s):  
Jie SONG ◽  
Tian-Tian LI ◽  
Zhi-Liang ZHU ◽  
Yu-Bin BAO ◽  
Ge YU

1991 ◽  
Author(s):  
Douglas E. Shackelford ◽  
John B. Smith ◽  
Joan Boone ◽  
Barry Elledge

Sign in / Sign up

Export Citation Format

Share Document