Computer data storage

Results: 3883



#Item
621Concurrent computing / Distributed data storage / Distributed computing architecture / Routing / Peer-to-peer / Coda / Consistency model / Client–server model / Computing / Network file systems / Computer architecture

PADS: A Policy Architecture for Distributed Storage Systems Nalini Belaramani∗ , Jiandan Zheng§ , Amol Nayate† , Robert Soul´e‡ , Mike Dahlin∗ , Robert Grimm‡ ∗ The § Amazon.com

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2009-03-05 14:09:49
622Cloud storage / Outsourcing / Backup / Computer file / File system / Records management / File hosting service / Cloud computing / Management / Data security / Computing / Business

The Idaho Information Technology Plan

Add to Reading List

Source URL: ita.idaho.gov

Language: English - Date: 2015-02-26 10:28:29
623Distributed computing architecture / MongoDB / NoSQL / Structured storage / Trusted Computing / Serialization / Multilevel security / XTS-400 / Data management / Computing / Computer security

FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
624Data types / Primitive types / Type theory / PyPy / Python / Type system / Pointer / Reference / Garbage collection / Software engineering / Computing / Computer programming

Preprint Storage Strategies for Collections in Dynamically Typed Languages Carl Friedrich Bolz

Add to Reading List

Source URL: soft-dev.org

Language: English - Date: 2015-06-08 15:52:11
625Cloud computing / Apache Hadoop / Parallel computing / Hadoop / Structured storage / HBase / Computer cluster / Data Intensive Computing / Computing / Concurrent computing / Cloud infrastructure

WHITEPAPER  PEPPERDATA ON A HIGHLY-TUNED HADOOP CLUSTER PEPPERDATA ON A HIGHLY-TUNED HADOOP CLUSTER AUGUST 2014 pepperdata.com

Add to Reading List

Source URL: 3rq6a72j1t3emsdt3k0da514.wpengine.netdna-cdn.com

Language: English - Date: 2014-09-24 16:53:45
626Data synchronization / System software / Computer storage / Replication / Albatross / Consensus / Oracle Database / Backup / Hyper-V / Computing / Fault-tolerant computer systems / Software

Taming uncertainty in distributed systems with help from the network Joshua B. Leners∗‡ ∗ Trinabh Gupta∗‡

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2015-03-19 14:43:20
627Information science / Computer data storage / RAID / Storage area network / IBM General Parallel File System / Clustered file system / Network-attached storage / Nested RAID levels / Serial ATA / Computing / Computer hardware / Computer storage

Practical evaluation of custom technology-based vs commodity technology-based Storage Elements Maciej Brzezniak and Norbert Meyer Poznan Supercomputing and Networking CenterPoznan, Noskowskiego 12/14, Poland

Add to Reading List

Source URL: coregrid.ercim.eu

Language: English - Date: 2008-09-24 03:09:39
628Electronic engineering / CLARiiON / Data General / Storage area network / Computer data storage / Disk array / Information / Computer storage / Computing / Data management

penguinpunk.net creating incremental san copy sessions with emc navisphere manager revision 0.1 synopsis The following is a simple document with screenshots providing step-by-step instructions for

Add to Reading List

Source URL: www.penguinpunk.net

Language: English - Date: 2009-08-04 23:37:43
629Data / Data synchronization / Fault-tolerant computer systems / Consistency model / Structured storage / Eventual consistency / ACID / Consistency / Replication / Data management / Computing / Transaction processing

PDF Document

Add to Reading List

Source URL: www.tpc.org

Language: English - Date: 2013-09-24 14:06:53
630Cryptographic software / Security / Computer security / Public safety / Password / Backup / USB flash drive

School of Education Human Subjects Research Data Security and Storage Guidelines The security of data varies depending on the type of data and the risks associated with breach of data security. In the following chart, th

Add to Reading List

Source URL: www.education.udel.edu

Language: English - Date: 2013-01-22 12:10:56
UPDATE