Document Management On-Premise and in the Cloud

Total Page:16

File Type:pdf, Size:1020Kb

Document Management On-Premise and in the Cloud WSSFC Technology Track Session Session 3 File it, Find It, Use It: Document Management On-Premise and in the Cloud Gregory J. Banchy Banchy Law Center LLC, Eau Claire Brent J. Hoeft Hoeft Law LLC, Madison Jeffrey S. Krause Solfecta LLC, Waterford 10/15/2014 File It, Find It, Use It Document Management On-Premise and in the Cloud Greg Banchy, Banchy Law Center LLC Brent J. Hoeft, Hoeft Law LLC Jeffrey S. Krause, Solfecta, LLC What is Document Management? Saving documents in a systematic, logical way so that you can find them when you need them Includes more than just the traditional definition of documents 1 10/15/2014 The History of Document Management Traditional Systems Paper, folders and cabinets First Generation Electronic Systems Drives, directories and sub-directories Dedicated Document Management Profiles and searching Document Management Makes a Comeback Scanning and Email Why Document Management? Document Management is About Organization There Are More “Documents” Than Ever Incoming Electronic Documents Incoming Paper that is Scanned Incoming Email Outgoing Email Things Move Faster You need to be able to find things right away 2 10/15/2014 Types of Document Management Manual or DIY Standalone Standalone with Integrated Link Component of Another System File It, Find It, Use It: Document Management On-Premise and in the Cloud Wisconsin Solo and Small Firm Conference - 2014 4:00 p.m., Thursday October 23rd, 2014 Brent J. Hoeft, Hoeft Law, LLC hoeftlaw.com 3 10/15/2014 Windows Directory Structure • Use the Windows Directory structure to organize and manage your documents EXAMPLE Library Forms Reference OfficeManagment Accounting Advertising Banking Insurance Client ClientIntakeForms ProspectClient OpenClient xClosedClient Naming Client Files • Named by the date agreement was signed (YYYYMMDD) • Followed by a matter designation – Business Law = B – Estate Planning = E – Real Estate = R • Client last name and initials EXAMPLE 20140101E_Smith,J 20131212B_Doe,J 20121010R_Smith,J 4 10/15/2014 Options for Accessing Files Remotely • Remote Access software • Take electronic files with you on laptop, tablet or USB drive • Online document storage My Criteria • Windows Directory structure • Mobile access and sync across all platforms • Security • Versioning backup • Cost 5 10/15/2014 Online Document Storage Options • Dropbox • Box • Drive (Google) • OneDrive (Microsoft) • iCloud (Apple) • Sugarsync • SpiderOak • Worldox • Netdocuments …just to name a few… Workflow • SpiderOak – Document storage, all firm and client files • MyCase – web-based practice management system 6 10/15/2014 Worldox Footer Text 10/15/2014 13 Planning for implementation • Where will documents be stored? • Create profiles for each set of related documents – Examples might include . o Clients o Forms o Library (articles, sample documents, etc) o Leads/Referrals o Legacy documents o Documents related to the business (tax, etc) o Policies and procedures (including for Worldox) Footer Text 10/15/2014 14 7 10/15/2014 Planning for implementation • Profiles (How files are described) o Maintain separate folders? o Number of divisions (ways to describe – level of granularity) o Example of a client database profile • Client • Matter • Type o Correspondence o Pleadings o Client meeting notes • Searchability – Tags are a useful way to help make topics easier to search Footer Text 10/15/2014 15 Planning for implementation Footer Text 10/15/2014 16 8 10/15/2014 Planning for implementation • Naming standards - Example o 20140901 (Date – in a sort friendly format) o Client number o Type • Who will have access? • What will be kept? For how long? • Understand the system’s quircks and limitations – All file names are stored as “8.3” names in the actual file directories – much harder to find if Worldox is unavailable Footer Text 10/15/2014 17 Planning for implementation • Licensing o Per concurrent user - around $425/seat o Annual maintenance fee (per user license) – around $90/year/seat • Updating o Done on the “server,” typically by an administrator o Usually does not require restarts • Indexing o Process runs on the server – required to maintain the system index of terms found in documents – this is what makes the retrieval process work quickly Footer Text 10/15/2014 18 9 10/15/2014 Implementation • Start small – one of the smaller but still useful databases • Monitor/gather feedback from users • Roll usability changes into design • Wash, rinse, repeat until ready for prime time Footer Text 10/15/2014 19 Implementation • Document o Initial design o Changes (and reasons) o Final “go live” system o Include in policies and procedures manual • Continue to monitor – system design should change as circumstances change when needed Footer Text 10/15/2014 20 10 10/15/2014 Questions/Comments 11 File It, Find It, Use It: Document Management On-Premise and in the Cloud What is Document Management? For purposes of this presentation, we will define document management as “saving documents in a systematic, logical way so that you can find them when you need them.” In addition, we’ll define documents broadly to incoming and outgoing documents, paper and electronic documents, email and any other records that received or produced in a law office. Almost everyone uses some form of document management, even if all of the documents are paper. Document Management: A Brief History Prior to computers, document management consisted of filing cabinets, red rope folders and manila folders. This system worked fine for many decades and still works today if you take computers out of the picture. When computers became common in the law office, a new form of document management was needed. It was now necessary to organize electronic documents. At first, people decided to file electronic documents in a way similar to how they filed paper documents. Drives became file cabinets, directories became red ropes and subdirectories became manila folders. This did not solve the problem because, at the time, people were too unfamiliar with computers. Expecting them to create and manage computer directories simply caused too many problems. In the 1990s, document management software solved the problem by taking over the save process. Saving documents became easy when all you had to do was identify the client and matter rather than create or navigate through directories. Finding documents was also much easier when you did not have to search through folders to find documents. However, by the 2000s, users were more comfortable with computers and document management fell out of favor a little bit. While very worthwhile, it came with a cost and some users began to feel that document management was limiting the way they could save documents. Things changed again around 2010. Suddenly, document management is back in favor and is probably the hottest legal technology around. Why Document Management? {00040398.DOCX.} Document management software is popular again for two reasons – scanning and email. For a long time, firms ran two parallel document management systems. Electronic documents were saved to directories while paper documents were saved in file cabinets. Even firms with electronic document management often had document in two places. Scanning makes it possible have all documents related to a matter in electronic form but greatly increases the number of documents. This made it even more necessary to save them in an organized fashion. When email became the default form of business communication, it added another complication. A significant portion of the communications related to a matter were now outside of both the file cabinet and the electronic directories. People needed a way to integrate emails with scans and the documents they created on their own. Document management makes it possible to organize and manage all three critical aspects of documents – those produced electronically at the firm, those produced outside of the firm and emails. Types of Document Management Document management comes in several forms. Many firms still use directories in Windows. There are systems dedicated exclusively to document management and many practice management systems include document management. Other systems serve as document repositories with links to practice management. Document management in any of these forms can be either installed on a server or hosted in the cloud. In this presentation, we will discuss how document management works and provide specific examples of several document management systems. File It, Find It, Use It: Document Management On-Premise and in the Cloud Wisconsin Solo and Small Firm Conference - 2014 4:00 p.m., Thursday October 23rd, 2014 Brent J. Hoeft, Hoeft Law, LLC (hoeftlaw.com) I. Windows Directory Based Document Management System A. “Windows Directory” document management structure 1. Master Folder Structure EXAMPLE Library Forms Reference OfficeManagment Accounting Advertising Banking Insurance Client ClientIntakeForms ProspectClient OpenClient xClosedClient 2. “Open Client” Folder – Named by the date the representation agreement was signed, followed by a matter designation (B= business law, E= estate planning, R= real estate), followed by client last name and initials. EXAMPLE: 20140101E_Smith,J 20131212B_Doe,J 20121010R_Smith,J 1 - Hoeft 3. Document Naming a) All documents are named with the date of the document or date the document received, followed by a description of the document and client last name. b) Client last name is always included for searching purposes
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Compress/Decompress Encrypt/Decrypt
    Windows Compress/Decompress WinZip Standard WinZip Pro Compressed Folders Zip and unzip files instantly with 64-bit, best-in-class software ENHANCED! Compress MP3 files by 15 - 20 % on average Open and extract Zipx, RAR, 7Z, LHA, BZ2, IMG, ISO and all other major compression file formats Open more files types as a Zip, including DOCX, XLSX, PPTX, XPS, ODT, ODS, ODP, ODG,WMZ, WSZ, YFS, XPI, XAP, CRX, EPUB, and C4Z Use the super picker to unzip locally or to the cloud Open CAB, Zip and Zip 2.0 Methods Convert other major compressed file formats to Zip format Apply 'Best Compression' method to maximize efficiency automatically based on file type Reduce JPEG image files by 20 - 25% with no loss of photo quality or data integrity Compress using BZip2, LZMA, PPMD and Enhanced Deflate methods Compress using Zip 2.0 compatible methods 'Auto Open' a zipped Microsoft Office file by simply double-clicking the Zip file icon Employ advanced 'Unzip and Try' functionality to review interrelated components contained within a Zip file (such as an HTML page and its associated graphics). Windows Encrypt/Decrypt WinZip Standard WinZip Pro Compressed Folders Apply encryption and conversion options, including PDF conversion, watermarking and photo resizing, before, during or after creating your zip Apply separate conversion options to individual files in your zip Take advantage of hardware support in certain Intel-based computers for even faster AES encryption Administrative lockdown of encryption methods and password policies Check 'Encrypt' to password protect your files using banking-level encryption and keep them completely secure Secure sensitive data with strong, FIPS-197 certified AES encryption (128- and 256- bit) Auto-wipe ('shred') temporarily extracted copies of encrypted files using the U.S.
    [Show full text]
  • Lock-Free Collaboration Support for Cloud Storage Services With
    Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation Jian Chen, Minghao Zhao, and Zhenhua Li, Tsinghua University; Ennan Zhai, Alibaba Group Inc.; Feng Qian, University of Minnesota - Twin Cities; Hongyi Chen, Tsinghua University; Yunhao Liu, Michigan State University & Tsinghua University; Tianyin Xu, University of Illinois Urbana-Champaign https://www.usenix.org/conference/fast20/presentation/chen This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST ’20) February 25–27, 2020 • Santa Clara, CA, USA 978-1-939133-12-0 Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST ’20) is sponsored by Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation ⇤ 1 1 1 2 Jian Chen ⇤, Minghao Zhao ⇤, Zhenhua Li , Ennan Zhai Feng Qian3, Hongyi Chen1, Yunhao Liu1,4, Tianyin Xu5 1Tsinghua University, 2Alibaba Group, 3University of Minnesota, 4Michigan State University, 5UIUC Abstract Pattern 1: Losing updates Alice is editing a file. Suddenly, her file is overwritten All studied This paper studies how today’s cloud storage services support by a new version from her collaborator, Bob. Sometimes, cloud storage collaborative file editing. As a tradeoff for transparency/user- Alice can even lose her edits on the older version. services friendliness, they do not ask collaborators to use version con- Pattern 2: Conflicts despite coordination trol systems but instead implement their own heuristics for Alice coordinates her edits with Bob through emails to All studied handling conflicts, which however often lead to unexpected avoid conflicts by enforcing a sequential order.
    [Show full text]
  • Photos Copied" Box
    Our photos have never been as scattered as they are now... Do you know where your photos are? Digital Photo Roundup Checklist www.theswedishorganizer.com Online Storage Edition Let's Play Digital Photo Roundup! Congrats on making the decision to start organizing your digital photos! I know the task can seem daunting, so hopefully this handy checklist will help get your moving in the right direction. LET'S ORGANIZE! To start organizing your digital photos, you must first gather them all into one place, so that you'll be able to sort and edit your collection. Use this checklist to document your family's online storage accounts (i.e. where you have photos saved online), and whether they are copied onto your Master hub (the place where you are saving EVERYTHING). It'll make the gathering process a whole lot easier if you keep a record of what you have already copied and what is still to be done. HERE'S HOW The services in this checklist are categorized, so that you only need to print out what applies to you. If you have an account with the service listed, simply check the "Have Account" box. When you have copied all the photos, check the "Photos Copied" box. Enter your login credentials under the line between the boxes for easy retrieval. If you don't see your favorite service on the list, just add it to one of the blank lines provided after each category. Once you are done, you should find yourself with all your digital images in ONE place, and when you do, check back on the blog for tools to help you with the next step in the organizing process.
    [Show full text]
  • Chapter 14 This Presentation Covers
    Basic Operating Systems Chapter 14 This presentation covers: > Staying Current >Basic Operating Systems Overview > Command Prompts Qualities of a Good Technician “Soft skills” as they are known across many industries are essential Staying Current Benefits of staying current include: >(1) understanding and troubleshooting the latest technologies > (2) recommending upgrades or solutions to customers > (3) saving time troubleshooting (and time is money) > (4) being someone considered for a promotion Staying Current A variety of methods to stay current include: >Subscribe to a magazine or an online magazine > Subscribe to a news list that gives you an update in your email > Join or attend association meetings >Register for and attend a seminar > Attend an online webinar > Take a class > Read books > Talk to your department peers and supervisor Basic Operating Systems Overview Basic Operating Systems > Computers require software to operate >An operating system (OS) is software that coordinates the interaction between hardware and any software applications and the interaction between a user and the computer >An operating system can be a graphical user interface (GUI) or a command line interface, or both > It is responsible for handling file and disk management Popular Operating Systems > Microsoft Windows >Apple macOS > Linux > Chrome OS > Android (mobile) > Apple iOS (mobile) 32- vs 64-bit Operating Systems Windows 7 Editions Windows 10 Editions End-of-Life Concerns > Serious consequences if an operating system or application has reached its
    [Show full text]
  • Full-Text (PDF)
    Vol. 10(14), pp. 2043-2050, 23 July, 2015 DOI: 10.5897/ERR2015.2297 Article Number: 6B548DF54295 Educational Research and Reviews ISSN 1990-3839 Copyright © 2015 Author(s) retain the copyright of this article http://www.academicjournals.org/ERR Full Length Research Paper Computer education and instructional technology teacher trainees’ opinions about cloud computing technology Ay şen Karamete Balikesir University, Necatibey Education Faculty, Department of Computer Education and Instructional Technology, Turkey. Received 15 May, 2015; Accepted 13 July, 2015 This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees participated in the study. The aim of this qualitative study was to determine trends about cloud technology. The cloud technology under study included “Dropbox”, “SpiderOak”, “Google Drive”, “IDrive”, “pCloud”, “OpenDrive”, “Bitcasa”, “OneDrive”, “Tresorit”, “Box” and “Yandex.Disk. The CEIT teacher trainees’ opinions about cloud storage and its purposes; their opinions about types of cloud storage and the level of importance of cloud storage were investigated. The reliability and validity were taken. The advantages and disadvantages of cloud computing were examined. The study found that CEIT teacher trainees’ had used cloud storages such as Dropbox
    [Show full text]
  • Use It Wisely and Securely Cloud Storage
    The Computer Corner By: George Birmingham, ET1(SS), Gold ’69-‘74 Cloud Storage – Use it wisely and securely Cloud Storage, for better or worse, is with us to stay. So what is cloud storage you may be asking? Cloud storage is a cloud computing model that stores data on the Internet through a cloud computing provider who manages and operates data storage as a service. It's delivered on demand with just-in-time capacity and costs, and eliminates buying and managing your own data storage infrastructure. So who offers cloud storage? Here are the providers as noted by PC Magazine as the Top 10 Cloud storage providers: · IDrive Review. MSRP: $69.50. ... · SugarSync Review. MSRP: $89.88. ... · Dropbox Review. MSRP: $0.00. ... · Microsoft OneDrive Review. MSRP: $0.00. ... · Box (Personal) Review. MSRP: $10.00. ... · CertainSafe Digital Safety Deposit Box Review. ... · Google Drive Review. ... · SpiderOak ONE Review. · Apple iCloud Free https://www.pcmag.com/picks/the-best-cloud-storage-and-file-sharing-services (14-Jun-2019) You will note that Dropbox and Microsoft OneDrive are in the list and they are available either natively in Windows 10 (OneDrive) or as an available app from the AppStore (Dropbox). If you decide to use a cloud storage solution, please read any and all Privacy Statements and Terms and Conditions very carefully before signing up. Since OneDrive and Dropbox are most common in Windows 10, here are some links to look at: https://www.dropbox.com/privacy (01-Jan-2020) https://www.itprotoday.com/development-techniques-and-management/ask-winobs-how-secure-are- my-onedrive-files (06-Oct-2017) Be sure to note who has access, how and with whom they share the data they hold, what kind of data they collect about you, where the encryption keys for your files are stored, who can access those keys, and if data is encrypted while in storage.
    [Show full text]
  • Data Protection and Collaboration in Cloud Storage
    Technical Report 1210 Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B.H. Kaiser J.E. Coll W.W. Smith R.K. Cunningham 7 July 2016 Lincoln Laboratory MASSACHUSETTS INSTITUTE OF TECHNOLOGY LEXINGTON, MASSACHUSETTS This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Approved for public release: distribution unlimited. This report is the result of studies performed at Lincoln Laboratory, a federally funded research and development center operated by Massachusetts Institute of Technology. This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05- C-0002 and/or FA8702-15-D-0001. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of Department of Homeland Security. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. Massachusetts Institute of Technology Lincoln Laboratory Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B. Kaiser J. Coll W. Smith R.
    [Show full text]
  • Five Apps to Make the BYOD Transition Easier
    Five apps to make the BYOD transition easier Jack Wallen suggests apps that will help make switching between home and office easier. Bring Your Own Device (BYOD) - it’s not only becoming an important element for end users, it’s becoming a necessity for businesses. BYOD offers up a possible cost savings for companies and more mobility for users. But with the possibilities of BYOD, comes hurdles to leap. Some of those hurdles (such as security) fall into the hands of the company. Other hurdles, such as ease of transition, fall squarely on the shoulders of the end user. Although the inherent mobility of many devices make for easy transition, it is necessary to take advantage of applications to make switching between home and office easy. Here are five possible applications that can aid in your transition. These applications vary in platform, but all should help make BYOD a user-friendly task. Five Apps 1. SpiderOak SpiderOak is yet another data syncing tool. But unlike Dropbox (or other syncing software), SpiderOak isn’t just your average syncing software. SpiderOak makes BOYD even easier with the following features: Backup data, create multiple, unique syncing pairs across all machines associated with an account, and easily share anything. If you’re looking for the single best syncing solution to help make the BYOD transition easier, SpiderOak is the one you need. SpiderOak is available for all platforms. 2. Divide Divide is an Android application that allows you to easily (and securely) separate your personal data from your business data. Divide actually creates a separate (launcher) desktop to be used for your business data.
    [Show full text]
  • Cloudme Forensics : a Case of Big- Data Investigation
    CloudMe forensics : a case of big-data investigation Teing, Y-Y, Dehghantanha, A and Raymond Choo, K-K http://dx.doi.org/10.1002/cpe.4277 Title CloudMe forensics : a case of big-data investigation Authors Teing, Y-Y, Dehghantanha, A and Raymond Choo, K-K Type Article URL This version is available at: http://usir.salford.ac.uk/id/eprint/43411/ Published Date 2017 USIR is a digital collection of the research output of the University of Salford. Where copyright permits, full text material held in the repository is made freely available online and can be read, downloaded and copied for non-commercial private study or research purposes. Please check the manuscript for any further copyright restrictions. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. 1 CloudMe Forensics: A Case of Big-Data Investigation Yee-Yang Teing1,2, Ali Dehghantanha2, and Kim-Kwang Raymond Choo3,*,† 1Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM Serdang, Selangor, Malaysia, 43400 2The School of Computing, Science & Engineering, Newton Building, University of Salford, Salford, Greater Manchester, United Kingdom, M5 4WT 3Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA, TX 78249-0631 SUMMARY The significant increase in the volume, variety and velocity of data complicates cloud forensic efforts, as such big data will, at some point, become computationally expensive to be fully extracted and analyzed in a timely manner. Thus, it is important for a digital forensic practitioner to have a well-rounded knowledge about the most relevant data artefacts that could be forensically recovered from the cloud product under investigation.
    [Show full text]
  • Deltacfs: Boosting Delta Sync for Cloud Storage Services by Learning from NFS
    DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFS Quanlu Zhang∗, Zhenhua Liy, Zhi Yang∗, Shenglong Li∗, Shouyang Li∗, Yangze Guo∗, and Yafei Dai∗z ∗Peking University yTsinghua University zInstitute of Big Data Technologies Shenzhen Key Lab for Cloud Computing Technology & Applications fzql, yangzhi, lishenglong, lishouyang, guoyangze, [email protected], [email protected] Abstract—Cloud storage services, such as Dropbox, iCloud find a common root cause that undermines the effect of delta Drive, Google Drive, and Microsoft OneDrive, have greatly sync: these applications heavily rely on structured data which facilitated users’ synchronizing files across heterogeneous devices. are stored in tabular files (e.g., SQLite [12] files), rather than Among them, Dropbox-like services are particularly beneficial owing to the delta sync functionality that strives towards greater simple textual files (e.g., .txt, .tex, and .log files). For exam- network-level efficiency. However, when delta sync trades com- ple, today’s smartphones (like iPhone) regularly synchronize putation overhead for network-traffic saving, the tradeoff could local data to the cloud storage (like iCloud [13]), where a be highly unfavorable under some typical workloads. We refer considerable part of the synchronized is tabular data [14]. to this problem as the abuse of delta sync. Confronted with the abovementioned situation, delta sync To address this problem, we propose DeltaCFS, a novel file sync framework for cloud storage services by learning from the exhibits poor performance, because it often generates intoler- design of conventional NFS (Network File System). Specifically, ably high computation overhead when dealing with structured we combine delta sync with NFS-like file RPC in an adaptive data.
    [Show full text]
  • Online File-Hosting Service
    ISSN XXXX XXXX © 2017 IJESC Research Article Volume 7 Issue No.3 Online File-Hosting Service Khaja Viqar Uddin1, MD Daniyal Raza2, Faheem Uddin3, Abdul Rais4 B.Tech Students 1,2,3, Assistant Professor4 Department of Computer Science Engineering Lords Institute of Engineering and Technology,Hyderabad, India Abstract: It is a type of file hosting application. Which is used for storing multimedia files in a Database or a server which can be a ccessed from any remote location by the user if he or she has the hardware and software requirements. In this we are trying to improve or counter the drawbacks of the existing system and possibly add few new features.It creates a special folder on user’s device. The content of which are then synchronized to the application server and to other devices that has installed the application. This application uses a freemium business model, users are offered a free account with a set storage size. Keywords:Multimedia, Synchronized, Remote Location.Freemium Business Model. I.INTRODUCTION: II.EXPLANATION A file hosting service, cloud storage service, online file Personal file storage storage provider, or cyberlocker is an Internet hosting Personal file storage services are aimed at private individuals, service specifically designed to host user files. It allows users offering a sort of "network storage" for personal backup, file to upload files that could then be accessed over the internet access, or file distribution. Users can upload their files and from a different computer, tablet, s mart phone or other share them publicly or keep them password-protected. networked device, by the same user or possibly by other users, Document-sharing services allow users to share and after a password or other authentication is provided.
    [Show full text]