摘要:
A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.
摘要:
Identifying data within a data store satisfying a request. A quantity of the identified data is greater than a threshold. The identified data is analyzed to produce an initial result set with a reduced data quantity including information summarizing the identified data. The analyzing includes visualizing the information summarizing the identified data as one or more graphical displays rendered within a user interface and selectively filtering the identified data based upon a selection of filter factors associated with the identified data to generate an initial result set having a smaller size in relation to the identified data set. Each of one or more succeeding result sets are generated from a corresponding prior result set until a succeeding result set includes a quantity of data satisfying the threshold. The generating of each succeeding result set includes filtering the corresponding prior result set and information summarizing the filtered result set.
摘要:
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.
摘要:
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.
摘要:
A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.
摘要:
A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.
摘要:
A request for data is processed by identifying data within a data store satisfying the request, where an amount of the identified data exceeds a threshold, analyzing the identified data to produce an initial result set with a reduced amount of data including information summarizing the identified data, and generating one or more succeeding result sets each from a corresponding prior result set until a succeeding result set includes an amount of data satisfying the threshold. Each succeeding result set includes a reduced amount of data relative to the corresponding prior result set, and generating each succeeding result set includes filtering the corresponding prior result set and generating the succeeding result set including information summarizing the filtered result set.
摘要:
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.
摘要:
Identifying data within a data store satisfying a request. A quantity of the identified data is greater than a threshold. The identified data is analyzed to produce an initial result set with a reduced data quantity including information summarizing the identified data. The analyzing includes visualizing the information summarizing the identified data as one or more graphical displays rendered within a user interface and selectively filtering the identified data based upon a selection of filter factors associated with the identified data to generate an initial result set having a smaller size in relation to the identified data set. Each of one or more succeeding result sets are generated from a corresponding prior result set until a succeeding result set includes a quantity of data satisfying the threshold. The generating of each succeeding result set includes filtering the corresponding prior result set and information summarizing the filtered result set.
摘要:
A computing device may determine that a policy event to initiate data destruction for a first set of data has been triggered. The first set of data may be located on a first file. The computing device may delete, in response to the determining, a first security key used for decrypting the first set of data. The computing device may delete, in response to the determining, one or more transaction log entries associated with the first set of data. The one or more transaction log entries may include a copy of the first set of data. The one or more transaction log entries may be a part of a transaction log. The transaction log may be a second file that stores a history of each data change within the database.