A good point make in the article was that keeping the metadata allows you to retrieve full-take data if at a later time you need deleted buffered data.
So full-take also has a full-retake aspect. -- Owen On Mon, Jul 15, 2013 at 11:08 AM, [email protected] <[email protected] > wrote: > ``I think they're taking the usual approach to large data sets, save it all > (or as much as you can) just in case you find an anomaly you want to > study.'' > > A short term sample of all traffic could be used analogously to a UAV video > recording. Take any suspect or event and look for any and all signals > leading to them backward in time. Declare the source of those signals > suspects & find the correlated physical sites & compromise them. Recurse. > > Marcus > > -------------------------------------------------------------------- > mail2web.com – What can On Demand Business Solutions do for you? > http://link.mail2web.com/Business/SharePoint > > > > ============================================================ > FRIAM Applied Complexity Group listserv > Meets Fridays 9a-11:30 at cafe at St. John's College > to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com >
============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
