Browse Definitions :
Definition

ISRS (information storage and retrieval system)

An information storage and retrieval system (ISRS) is a network with a built-in user interface that facilitates the creation, searching, and modification of stored data. An ISRS is typically a peer-to-peer ( P2P ) network operated and maintained by private individuals or independent organizations, but accessible to the general public. Some, but not all, ISRSs can be accessed from the Internet. (The largest ISRS in the world is the Internet itself.)

Characteristics of an ISRS include lack of centralization, graceful degradation in the event of hardware failure, and the ability to rapidly adapt to changing demands and resources. The lack of centralization helps to ensure that catastrophic data loss does not occur because of hardware or program failure, or because of the activities of malicious hackers. Graceful degradation is provided by redundancy of data and programming among multiple computers. The physical and electronic diversity of an ISRS, along with the existence of multiple operating platforms, enhances robustness, flexibility, and adaptability. (These characteristics can also result in a certain amount of chaos.) In addition to these features, some ISRSs offer anonymity, at least in theory, to contributors and users of the information.

A significant difference between an ISRS and a database management system ( DBMS ) is the fact that an ISRS is intended for general public use, while a DBMS is likely to be proprietary, with access privileges restricted to authorized entities. In addition, an ISRS, having no centralized management, is less well-organized than a DBMS.

This was last updated in March 2011

Continue Reading About ISRS (information storage and retrieval system)

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close