A good point make in the article was that keeping the metadata allows you
to retrieve full-take data if at a later time you need deleted buffered
data.

So full-take also has a full-retake aspect.

   -- Owen


On Mon, Jul 15, 2013 at 11:08 AM, [email protected] <[email protected]
> wrote:

> ``I think they're taking the usual approach to large data sets, save it all
> (or as much as you can) just in case you find an anomaly you want to
> study.''
>
> A short term sample of all traffic could be used analogously to a UAV video
> recording. Take any suspect or event and look for any and all signals
> leading to them backward in time.   Declare the source of those signals
> suspects & find the correlated physical sites & compromise them.  Recurse.
>
> Marcus
>
> --------------------------------------------------------------------
> mail2web.com – What can On Demand Business Solutions do for you?
> http://link.mail2web.com/Business/SharePoint
>
>
>
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
>
============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to