Computer data storage

Results: 3883



#Item
481Computer architecture / Standard RAID levels / Data corruption / Data striping / Non-standard RAID levels / Parity bit / Logical disk / Disk storage / Hamming code / RAID / Computing / Computer hardware

Why disk arrays? Reliability implications of arrays • CPUs speeds increase faster than disks

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2013-02-06 17:29:08
482Server hardware / Parallel computing / System administration / Transaction processing / Blade server / InfiniBand / Solid-state drive / Lustre / Computer data storage / Computing / Concurrent computing / System software

Microsoft Word - 03_A1_DCSC_SC07_Conclusions.doc

Add to Reading List

Source URL: www.dcsc.dk

Language: English - Date: 2008-11-25 10:42:33
483Storage Networking Industry Association / XAM / Computer data storage / Backup / ISCSI / Information security / Best current practice / Mark Carlson / Storage Management Initiative – Specification / Computing / Data security / Security

Storage Security Best Current Practices (BCPs) VersionPublication of this SNIA Technical Proposal has been approved by the SNIA. This document represents a stable proposal for use as agreed upon by the Security TW

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-06-24 18:34:10
484NoSQL / Transaction processing / Computer storage / Fault-tolerant computer systems / Distributed computing architecture / Session / Replication / Consistency model / IBM Lotus Notes / Data management / Computing / Data

Session Guarantees for Weakly Consistent Replicated Data Douglas B. Terry, Alan J. Demers, Karin Petersen, Mike J. Spreitzer, Marvin M. Theimer, and Brent B. Welch Computer Science Laboratory Xerox Palo Alto Research Cen

Add to Reading List

Source URL: www.researchgate.net

Language: English
485Centralized computing / Computer law / Credit cards / Data privacy / Payment Card Industry Data Security Standard / Security information and event management / Integrated Cloud Service Management / Novell Cloud Security Service / Computer security / Computing / Cloud computing

CloudLock for ServiceNow The Cloud Security Fabric for ServiceNow & Other Cloud Apps CloudLock provides a cloud security fabric that protects your corporate assets while enabling secure cloud storage, sharing and collabo

Add to Reading List

Source URL: www.cloudlock.com

Language: English - Date: 2015-07-01 10:00:43
486Electronic voting / Electoral systems / Computer memory / Sociology / Government / Voting machine / Voter-verified paper audit trail / Voting system / Ballot / Politics / Elections / Election fraud

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -orHow to Store Ballots on a Voting Machine (Extended Abstract) David Molnar UC Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:56
487Solid-state drive / IOPS / VMware / Computer data storage / Flash memory / Database / Conatus / Replication / Computing / Computer hardware / Computer storage

Customer Case Study Conatus Capital Management Gains Data Protection While Increasing Performance in a Virtualized Environment by 6x

Add to Reading List

Source URL: kaminario.com

Language: English - Date: 2014-01-31 16:17:48
488Computer engineering / Microcode / Xerox Alto / Instruction set / Computer data storage / Microarchitecture / Memory bandwidth / Emulator / PDP-10 / Computer architecture / Computer hardware / Central processing unit

A Retrospective on the Dorado, A High-Performance Personal Computer Kenneth A. Pier A Retrospective on the Dorado, A High-Performance Personal Computer

Add to Reading List

Source URL: www.textfiles.com

Language: English - Date: 2008-12-19 13:36:48
489Cloud storage / Concurrent computing / File hosting / Computer file / Inter-process communication / Cloud applications / Accellion /  Inc. / SugarSync / Cloud computing / Computing / Data synchronization

ON-PREMISES ENTERPRISE FILE SYNC AND SHARE SharePlan meets the most stringent data protection requirements while quickly and easily connecting employees SharePlan is the secure enterprise file sync/share solution deploye

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-07-18 18:04:15
490Information technology management / Data management / Crime prevention / National security / Backup / Off-site data protection / Data remanence / Computer security / Data center / Computing / Security / Data security

OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

Add to Reading List

Source URL: www.ironmountain.ro

Language: English
UPDATE