Data Reduction Techniques for Large Qualitative Data Sets 139

Total Page:16

File Type:pdf, Size:1020Kb

Data Reduction Techniques for Large Qualitative Data Sets 139 07_184_Ch07.qxd 3/29/07 6:43 AM Page 137 Data Reduction Techniques for 7 Large Qualitative Data Sets EMILY NAMEY, GREG GUEST, LUCY THAIRU, AND LAURA JOHNSON You have your way. I have my way.As for the right way, the correct way, and the only way, it does not exist. FRIEDRICH NIETZSCHE ORKING WITH DATA COLLECTED through a team effort or in multiple sites can be both challenging and rewarding. The sheer Wsize and complexity of the data set sometimes makes the analy- sis daunting, cbut a large data set may also yield richer and more useful in- formation. In this chapter, we explore strategies for combining qualitative and quantitative analysis techniques for the analysis of large, qualitative data sets. Large is a relative term, of course, and many of the techniques de- scribed here are applicable to smaller data sets as well. However, the bene- fits of the data reduction techniques we propose increase as the data sets themselves grow in size and complexity. In our selection of techniques, we have taken a broad view of large qualitative data sets, aiming to highlight trends, relationships, or associations for further analysis, without deempha- sizing the importance of the context and richness of the data themselves. This perspective also brings focus to the multiple interpretive lenses that a group of researchers brings to team-based analysis. Throughout the chapter, we use examples from some of our research to illustrate the use of the methods discussed. In doing so, we identify the strengths and weaknesses of each method and suggest ways in which an ap- propriate technique may be chosen for a given research question and its corresponding data set. 137 07_184_Ch07.qxd 3/29/07 6:43 AM Page 138 138 EMILY NAMEY ET AL. Approaches to Data Analysis During the past few decades, qualitative research has greatly benefited from theoretical and methodological developments in data analysis (see, e.g., Bernard and Ryan 1998, Dey 1993, LeCompte and Schensul 1999). Analyses typically fall into one of two categories: content and thematic. In content analysis, the researcher evaluates the frequency and saliency of par- ticular words or phrases in a body of original text data in order to identify keywords or repeated ideas. In addition to simple word counts, content analysis can be expanded to include associated attributes of keywords and other semantic elements, such as synonyms, location in the text, and sur- rounding words or phrases (Dey 1993:59). Content analysis techniques are valued for their efficiency and reliabil- ity. With appropriate software, large numbers of text files can be quickly scanned and keywords tallied. And since the original, “raw” data are used, there is minimal interpretation involved in the word counts, resulting in greater reliability. The primary drawback to content analysis is that context is usually not considered or is highly constrained, limiting the richness of the summary data produced. Thematic analysis, in contrast, is more involved and nuanced. Thematic analysis moves beyond counting explicit words or phrases and focuses on identifying and describing both implicit and explicit ideas. Codes devel- oped for ideas or themes are then applied or linked to raw data as summary markers for later analysis, which may include comparing the relative fre- quencies of themes or topics within a data set, looking for code co-occur- rence, or graphically displaying code relationships. Reliability is of greater concern with thematic analysis than content analy- sis because research analysts must interpret raw text data in order to apply codes, and because interpretations may vary across analysts. Strategies for monitoring and improving intercoder agreement, and therefore reliability, add to the time required for thematic analysis, but the investment is well worth the context-rich coded data produced (see chapters 6 and 11, this volume). Both content and thematic analysis can be data-driven, as in grounded theory (Glaser and Strauss 1967, Kearney et al. 1994, Wright 1997), or the- ory-driven (Krippendorf 1980, Weber 1990). In a data-driven approach, the researcher carefully reads and rereads the data, looking for keywords, trends, themes, or ideas in the data that will help outline the analysis, before any analysis takes place. By contrast, a theory-driven approach is guided by specific ideas or hypotheses the researcher wants to assess. The researcher may still closely read the data prior to analysis, but his or her analysis cate- gories have been determined a priori, without consideration of the data. 07_184_Ch07.qxd 3/29/07 6:43 AM Page 139 DATA REDUCTION TECHNIQUES FOR LARGE QUALITATIVE DATA SETS 139 Theory-driven approaches tend to be more structured, and for this rea- son may be considered more reliable, in the sense that the same results are likely, regardless of the coder. Conversely, data-driven approaches may be considered to have greater validity because they are more flexible and open to discovery of themes or ideas not previously considered, resulting in the- ory that is “grounded” in the data. Fortunately, neither approach is so rigid as to prevent borrowing from the other, to maximize the findings of an analysis and to balance reliability and validity. Theory-driven analysis does not preclude the analyst from uncovering emergent, data-driven themes, which may then be added to the analysis, and similarly data-driven analy- ses may generate theories to explain emergent structure. The techniques presented below span both content and thematic analysis and are applica- ble to both theory- and data-driven approaches. The examples presented, however, are primarily drawn from data-driven thematic analyses. Framing the Analysis Large qualitative data sets generally encompass multiple research questions. Hence, very few, if any, analyses of such data sets simultaneously involve all of the data that have been collected. From the outset, researchers need to delineate the boundaries of a given analysis with a comprehensive analysis plan. This plan can include guidelines for data set reduction, including whether all the data will first be coded in an exploratory analysis, whether they will be partitioned in a way appropriate for theoretical analysis and hy- pothesis testing, or whether some data will simply not be included in spe- cific analyses. Eliminating data not relevant to the analysis at hand—or extracting the data that are relevant—is usually the first, and arguably the simplest, form of data reduction. As Miles and Huberman (1994: 11) ex- plain, Data reduction is not something separate from analysis. It is part of analy- sis. The researcher’s decisions—which data chunks to code and which to pull out, which evolving story to tell—are all analytic choices. Data reduc- tion is a form of analysis that sharpens, sorts, focuses, discards, and organ- izes data in such a way that “final” conclusions can be drawn and verified. In cases where the larger data set was compiled from more than one type of data collection instrument (e.g., semistructured in-depth inter- views, structured focus groups, and pile-sorting activities), the researcher needs to make a decision about the type of data she or he will select from the larger data set. She or he may choose to analyze data from only one 07_184_Ch07.qxd 3/29/07 6:43 AM Page 140 140 EMILY NAMEY ET AL. type of instrument, or from several different instruments. As described by Patton (1990), this form of “triangulation” across different data collection strategies during data analysis can be particularly helpful when dealing with large data sets. The researcher may also need to frame the analysis in terms of the sources of data or the categories of participants from whom the data were collected (MacQueen and Milstein 1999). This may require limiting the analysis to one or two sites of a multisite project, or limiting the num- ber of subgroups included in the analysis (e.g., including only data relevant in terms of select participant characteristics regardless of site). The researcher’s primary guide in all of these data reduction decisions is a clearly defined analysis objective, accompanied by an analysis plan. The ob- jective may be based on the research questions addressed in the project or it may be determined on the basis of specific reporting or publishing goals. In the analysis plan, the researcher also defines the level of the analysis—whether exploratory, descriptive, hypothesis testing, or comparative in nature—and chooses data accordingly. These initial data reduction decisions are critical to choosing an appropriate strategy for the ensuing analyses. Analytical Techniques In this section, we summarize the basic steps, strengths, and weaknesses of several analytical techniques for large qualitative data sets. The techniques do not comprise an exhaustive list; rather, on the basis of our experience in the field, we highlight some of the techniques we have found useful when working as a team in multisite research studies. In addition to these techniques, the fundamental step of reading and rereading text data files is still essential for adding context to theory-driven analyses and for identify- ing themes for data-driven analyses. Structural Coding One effective method for making large qualitative data sets more manage- able, for either content or thematic analysis, is to develop and apply a se- ries of “structural” codes to the data. As described by MacQueen et al. in chapter 6 of this volume, the term structural code refers to question-based, rather than theme-based, codes. This approach works for data collected us- ing structured or semistructured interview or focus group guides that have discrete questions and probes that are repeated across multiple files in a data set. Each discrete question and its associated probes are assigned a code that is then applied or linked to the question and subsequent response text in each data file.
Recommended publications
  • Extract, Transformation, and Load(Etl); and Online Analytical Processing(Olap) in Bi
    International Journal of Database Management Systems (IJDMS) Vol.12, No.3, June 2020 DESIGN, IMPLEMENTATION, AND ASSESSMENT OF INNOVATIVE DATA WAREHOUSING; EXTRACT, TRANSFORMATION, AND LOAD(ETL); AND ONLINE ANALYTICAL PROCESSING(OLAP) IN BI Ramesh Venkatakrishnan Final Year Doctoral Student, Colorado Technical University, Colorado, USA ABSTRACT The effectiveness of a Business Intelligence System is hugely dependent on these three fundamental components, 1) Data Acquisition (ETL), 2) Data Storage (Data Warehouse), and 3) Data Analytics (OLAP). The predominant challenges with these fundamental components are Data Volume, Data Variety, Data Integration, Complex Analytics, Constant Business changes, Lack of skill sets, Compliance, Security, Data Quality, and Computing requirements. There is no comprehensive documentation that talks about guidelines for ETL, Data Warehouse and OLAP to include the recent trends such as Data Latency (to provide real-time data), BI flexibility (to accommodate changes with the explosion of data) and Self- Service BI. This research paper attempts to fill this gap by analyzing existing scholarly articles in the last three to five years to compile guidelines for effective design, implementation, and assessment of DW, ETL, and OLAP in BI. KEYWORDS Business Intelligence, ETL, DW, OLAP, design implementation and assessment 1. INTRODUCTION “Business intelligence (BI) is an umbrella term that includes the applications, infrastructure and tools, and best practices that enable access to and analysis of information to improve and optimize decisions and performance” [1]. Data Acquisition, Data Storage, and Data Analytics are the primary components of a BI system, and for it to be successful, practical design and implementation of these three components are critical. Source systems such as OLTP records business events.
    [Show full text]
  • Spatio-Temporal Data Reduction with Deterministic Error Bounds
    The VLDB Journal (2006) 15(3): 211–228 DOI 10.1007/s00778-005-0163-7 REGULAR PAPER Hu Cao · Ouri Wolfson · Goce Trajcevski Spatio-temporal data reduction with deterministic error bounds Received: 26 March 2004 / Revised: 22 January 2005 / Accepted: 20 March 2005 / Published online: 28 April 2006 c Springer-Verlag 2006 Abstract A common way of storing spatio-temporal infor- 1 Introduction mation about mobile devices is in the form of a 3D (2D geography + time) trajectory. We argue that when cellular In this paper we consider lossy compression of spatio- phones and Personal Digital Assistants become location- temporal information, particularly trajectories (i.e., motion aware, the size of the spatio-temporal information gener- traces) of moving objects databases. The compression is ated may prohibit efficient processing. We propose to adopt done by approximating each trajectory, but in contrast to a technique studied in computer graphics, namely line- traditional compression methods, we are interested in ap- simplification, as an approximation technique to solve this proximations that guarantee a bound on the error, i.e., in problem. Line simplification will reduce the size of the tra- which the distance between the approximation and the origi- jectories. Line simplification uses a distance function in nal trajectory is bounded. We employ line-simplification for producing the trajectory approximation. We postulate the this type of compression. Next, we consider various types desiderata for such a distance-function: it should be sound, of queries on the approximations database, e.g., range and namely the error of the answers to spatio-temporal queries joins. It turns out that even though the error of each approxi- must be bounded.
    [Show full text]
  • Data Reduction Techniques for Scientific Visualization and Data Analysis
    EuroVis 2017 Volume 36 (2017), Number 3 M. Meyer, S. Takahashi, A. Vilanova STAR – State of The Art Report (Guest Editors) Data Reduction Techniques for Scientific Visualization and Data Analysis Samuel Li1 1Department of Computer and Information Science, University of Oregon 1. Introduction staying in one scenario given that many techniques can operate in different modes. We identify these three dimensions as follows, and The classic paradigm for scientific visualization and data analysis elaborate the ideas behind them in Subsection 1.1. is post-hoc, where simulation codes write results on the file system and visualization routines read them back to operate. This paradigm 1. lossy or lossless data reduction; sees file I/O as an increasing bottleneck, in terms of both transfer 2. reduce on write or reduce on read; and rates and storage capacity. As a result, simulation scientists, as data 3. resulting in original memory footprint or reduced memory foot- producers, often sample available time slices to save on disk. This print. sampling process is not risk-free, since the discarded time slices might contain interesting information. 1.1. Use Case Dimensions Visualization and data analysis scientists, as data consumers, see reasonable turnaround times of processing data a precondi- Lossy or lossless: This dimension is concerned with potential in- tion to successfully perform tasks with exploratory natures. The formation loss after applying data reduction. With lossy reduction, turnaround time is often spent on both reading data from disk, and the reduced form can never recover data identical to the original computations that produce meaningful visualizations and statistics.
    [Show full text]
  • Pre-Processing of Big Data: ETL Process for Weather Monitoring Applications
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072 Pre-Processing of Big Data: ETL Process for Weather Monitoring Applications Ms. Kalluri Pratibha Bhaskar Reddy1, Prof. Trupti K. Dange 2 1TE, Computer department, RMD Sinhgad School of Engineering, Warje, Pune -58, Maharashtra, India 2Asst. Professor of Computer Department , RMD Sinhgad School of Engineering, Warje, Pune -58, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Big Data is new ubiquitous term that is used to Big data helps to perform transformation of unstructured describe the massive collection of datasets which are difficult data, semi-structured data into structured data. It is defined to process by using traditional database and the old software with the help of 5 V’s[6]. techniques. This data is inaccessible to users. In order to make it consumable for decision-making, we need the technology They are: and tools to find, transform, analyze, and visualize. One aspect of Big Data research is dealing with the Variety of data that Volume, Variety, Velocity, Veracity, Value. includes various formats such as structured, numeric, Volume: The data that is used to perform functions on the unstructured text data, email, video, audio, stock ticker, etc. In very complex due to which the (size) volume of the data is this paper, our prime focus is on managing, merging, and massively large. governing a variety of data. In this paper, data in a weather monitoring and forecasting application is focused that helps in Variety: The data acquired is in different forms.
    [Show full text]
  • A Clustering-Based Data Reduction for Very Large Spatio- Temporal Datasets
    A clustering-based data reduction for very large spatio- temporal datasets Nhien-An Le-Khac1, Martin Bue2, Michael Whelan1, M-Tahar Kechadi1, 1 School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4, Ireland 2 Ecole Polytechnique Universitaire de Lille, Villeneuve d'Ascq cedex, France 1{an.lekhac, michael.whelan,tahar.kechadi}@ucd.ie [email protected] Abstract. Today, huge amounts of data are being collected with spatial and temporal components from sources such as meteorological, satellite imagery etc. Efficient visualisation as well as discovery of useful knowledge from these datasets is therefore very challenging and becoming a massive economic need. Data Mining has emerged as the technology to discover hidden knowledge in very large amounts of data. Furthermore, data mining techniques could be applied to decrease the large size of raw data by retrieving its useful knowledge as representatives. As a consequence, instead of dealing with a large size of raw data, we can use these representatives to visualise or to analyse without losing important information. This paper presents a new approach based on different clustering techniques for data reduction to help analyse very large spatio- temporal data. We also present and discuss preliminary results of this approach. Keywords: spatio-temporal datasets; data reduction; centre-based clustering; density-based clustering; shared nearest neighbours. 1 Introduction Many natural phenomena present intrinsic spatial and temporal characteristics. Besides traditional applications, recent concerns about climate change, the threat of pandemic diseases, and the monitoring of terrorist movements are some of the newest reasons why the analysis of spatio-temporal data has attracted increasing interest.
    [Show full text]
  • Parallel Landscape Driven Data Reduction & Spatial Interpolation Algorithm for Big Lidar Data
    International Journal of Geo-Information Article Parallel Landscape Driven Data Reduction & Spatial Interpolation Algorithm for Big LiDAR Data Rahil Sharma 1,*, Zewei Xu 2, Ramanathan Sugumaran 3,† and Suely Oliveira 4,† 1 Department of Computer Science, University of Iowa, Iowa city, IA 52246, USA 2 Department of Geography & GIS, University of Illinois at Urbana-Champaign, IL 61801, USA; [email protected] 3 Department of Geography, University of Iowa, Iowa City, IA 52246, USA; [email protected] 4 Department of Computer Science, University of Iowa, Iowa city, IA 52246, USA; [email protected] * Correspondence: [email protected]; Tel.: +319-353-2328 † These authors contributed equally to this work. Academic Editor: Wolfgang Kainz Received: 30 April 2016; Accepted: 12 June 2016; Published: 17 June 2016 Abstract: Airborne Light Detection and Ranging (LiDAR) topographic data provide highly accurate digital terrain information, which is used widely in applications like creating flood insurance rate maps, forest and tree studies, coastal change mapping, soil and landscape classification, 3D urban modeling, river bank management, agricultural crop studies, etc. In this paper, we focus mainly on the use of LiDAR data in terrain modeling/Digital Elevation Model (DEM) generation. Technological advancements in building LiDAR sensors have enabled highly accurate and highly dense LiDAR point clouds, which have made possible high resolution modeling of terrain surfaces. However, high density data result in massive data volumes, which pose computing issues. Computational time required for dissemination, processing and storage of these data is directly proportional to the volume of the data. We describe a novel technique based on the slope map of the terrain, which addresses the challenging problem in the area of spatial data analysis, of reducing this dense LiDAR data without sacrificing its accuracy.
    [Show full text]
  • Security and Privacy in Big Data Life Cycle: a Survey and Open Challenges
    sustainability Review Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges Jahoon Koo , Giluk Kang and Young-Gab Kim * Department of Computer and Information Security and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Korea; [email protected] (J.K.); [email protected] (G.K.) * Correspondence: [email protected] Received: 26 November 2020; Accepted: 16 December 2020; Published: 17 December 2020 Abstract: The use of big data in various fields has led to a rapid increase in a wide variety of data resources, and various data analysis technologies such as standardized data mining and statistical analysis techniques are accelerating the continuous expansion of the big data market. An important characteristic of big data is that data from various sources have life cycles from collection to destruction, and new information can be derived through analysis, combination, and utilization. However, each phase of the life cycle presents data security and reliability issues, making the protection of personally identifiable information a critical objective. In particular, user tendencies can be analyzed using various big data analytics, and this information leads to the invasion of personal privacy. Therefore, this paper identifies threats and security issues that occur in the life cycle of big data by confirming the current standards developed by international standardization organizations and analyzing related studies. In addition, we divide a big data life cycle into five phases (i.e., collection, storage, analytics, utilization, and destruction), and define the security taxonomy of the big data life cycle based on the identified threats and security issues.
    [Show full text]
  • Nodemerge: Template Based Efficient Data Reduction for Big-Data Causality Analysis
    Session 7A: Forensics CCS’18, October 15-19, 2018, Toronto, ON, Canada NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis Yutao Tang2, Ding Li1, Zhichun Li1, Mu Zhang3, Kangkook Jee1, Xusheng Xiao4, Zhenyu Wu1, Junghwan Rhee1, Fengyuan Xu5, Qun Li2 1NEC Laboratories America Inc 2The College of William and Mary 3Cornell University 4Case Western Reserve University 5National Key Lab for Novel Software Technology, Nanjing University 1{dingli,zhichun,kjee,adamwu,rhee}@nec-labs.com 2{yytang,liqun}@cs.wm.edu [email protected] [email protected] [email protected] ABSTRACT KEYWORDS Today’s enterprises are exposed to sophisticated attacks, such as Security, Data Reduction Advanced Persistent Threats (APT) attacks, which usually consist of ACM Reference Format: stealthy multiple steps. To counter these attacks, enterprises often Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, rely on causality analysis on the system activity data collected from Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li. 2018. Node-Merge: a ubiquitous system monitoring to discover the initial penetration Template Based Efficient Data Reduction For Big-Data Causality point, and from there identify previously unknown attack steps. Analysis. In 2018 ACM SIGSAC Conference on Computer and Communications However, one major challenge for causality analysis is that the Security (CCS ’18), October 15–19, 2018, Toronto, ON, Canada. ACM, New ubiquitous system monitoring generates a colossal amount of data York, NY, USA, 14 pages. https://doi.org/10.1145/3243734.3243763 and hosting such a huge amount of data is prohibitively expensive. Thus, there is a strong demand for techniques that reduce the storage 1 INTRODUCTION of data for causality analysis and yet preserve the quality of the Modern enterprises are facing the challenge of Advanced Persistent causality analysis.
    [Show full text]
  • Veri Madenciliği
    KNOWLEDGE MANAGEMENT PROCESS IN DISTANCE LEARNING Asst.Prof. Dr. Ayşe ÇINAR Knowledge Management in Distance Learning Educational data is recorded in a relational database. Extract-Transform-Load(ETL) Process The data is extracted from various data resources Applying some data preprocessing, the data is transformed The transformed data is loaded in a data warehouse. OLAP tools and some commercial./open-source software tools are used in distance education. Data warehousing provides some architectures and tools for business executives to; -systematically organize, -understand, -use their data in a strategic decision making. Time-variant data Subject-oriented data Integrated and fixed data Outsourced data Read-Only data - OLTP - OLAP • These are some operational systems that support daily organizational needs. • They allow a daily data processing in organization. Insert Update OLTP Database Select Delete Some Applications on Records • It is a data analysis and query system on databases • OLAP tools enable users to analysis multidimensional data. • OLAP and data warehouses complete eachother. While data warehosuses are storing significant data, OLAP provides some analyzing applications on them It is a process other information repositories data databases warehouses It discovers previously unknown and comprehensible information from a large amount of data stored in… query processing• information management process control decision making This discovered information can be applied to.. Observable and Knowledge Determining measurable the problem. information Presentation Evaluation and about and entity Patterns Obtaining Selecting and the Data Transformation Data Warehouse Cleaning and Integration Databases Data Mining as a Step in The Process of Knowledge Discovery Preprocessing Steps: 1. Data Cleaning : To remove noise and inconsistent data 2.
    [Show full text]
  • Introduction and Implementation of Data Reduction Pools and Deduplication
    Front cover Introduction and Implementation of Data Reduction Pools and Deduplication Jon Tate Dionysios Kalofonos Carsten Larsen Atif Syed Kendall Williams Redbooks International Technical Support Organization Introduction and Implementation of Data Reduction Pools and Deduplication November 2018 SG24-8430-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (November 2018) This edition applies to IBM Spectrum Virtualize V8.1.3.2 (minimum recommended software level) and the associated hardware and software detailed within. Note that the screen captures included within this book might differ from the generally available (GA) version, because parts of this book were written with pre-GA code. © Copyright International Business Machines Corporation 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too . xi Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Architecture . 1 1.1 What Data Reduction Pools are . 2 1.1.1 DRP Volume types . 3 1.1.2 What is in a Data Reduction Pool . 5 1.1.3 Allocation block size . 5 1.2 RACE versus DRP . 6 1.2.1 Benefits . 8 1.3 Data Reduction Pools and unmap . 9 1.4 Data Reduction Pools with Easy Tier . 9 1.5 Garbage collection . 9 1.6 Data Reduction Pools with deduplication . 10 Chapter 2. Planning . 11 2.1 Data Reduction Pools benefits . 12 2.2 Planning considerations .
    [Show full text]
  • 3 Data Management
    3 Data Management 3.1 Motivation One of the most exciting opportunities of the emerging Information Age is to extract useful findings from the immense wealth of data and information acquired, computed, and stored by modern information systems. This is The big opportunity of witnessed by both professionals and single users that every day extract valuable the Information Age pieces of information from very different kinds of data sources, e.g., files and emails on their laptops, data coming from their company databases, or data available on the Internet. Unfortunately, as described in Chapter 1, there are many obstacles, which impede the effective exploitation of such an opportunity: users and analysts may get overwhelmed by irrelevant, or inappropriately processed or presented information – the information overload problem. Obstacles come from the fact that datasets are often very large and growing Many obstacles need to incrementally, data sources are heterogeneous and are typically distributed. be overcome As a consequence, it is necessary to take this into account when studying, assessing, and giving recommendations about techniques for managing data. This is particularly challenging and the following issues need to be consid- ered: - Heterogeneity of data sources. In a number of applications, it is necessary to integrate and query data coming from diverse data sources; this is inherently difficult and not especially well researched. Logic based systems, balancing expressive power and computational cost, represent the state of the art solutions; however such approaches are neither well understood nor easy to use. - Different data types. Data comes in a variety of types and with different structures.
    [Show full text]
  • Data Reduction Inline Compression and Deduplication
    Technical White Paper Dell EMC PowerMax: Data Reduction Inline compression and deduplication Abstract Dell EMC™ PowerMax Data Reduction is a storage-efficiency feature that combines inline compression and inline deduplication. Using both storage efficiency features together enhances capacity savings while maintaining great performance and reliability. February 2021 H17072.3 Revisions Revisions Date Description May 2018 Initial release September 2020 Updates for PowerMaxOS Q3 2020 release February 2021 Updated for PowerMaxOS Q1 2021 release Acknowledgments Author: Robert Tasker The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. This document may contain certain words that are not consistent with Dell's current language guidelines. Dell plans to update the document over subsequent future releases to revise these words accordingly. This document may contain language from third party content that is not under Dell's control and is not consistent with Dell's current guidelines for Dell's own content. When such third party content is updated by the relevant third parties, this document will be revised accordingly. Copyright © 2018–2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. [2/5/2021] [Technical White Paper] [H17072.3] 2 Dell EMC PowerMax: Data Reduction | H17072.3 Table of contents Table of contents Revisions............................................................................................................................................................................
    [Show full text]