Data corruption

Results: 301



#Item
171Political corruption / Project IC / Welfare / Politics / Election fraud / Illegal immigration

CFSR/CFSP COORDINATORS NETWORK Staffed by The National Child Welfare Resource Center for Organizational Improvement (NRCOI) and the National Resource Center for Child Welfare Data and Technology (NRCCWDT)

Add to Reading List

Source URL: muskie.usm.maine.edu

Language: English - Date: 2014-10-01 14:05:25
172Data security / Information security / National security / Sustainable procurement / Toppan / Business ethics / Public safety / Ethics / Security / Applied ethics / Computer security

Fair Operating Practices Points  he Toppan Group began drawing up a Conduct Guidelines Casebook for overseas. T Toppan provided training on the prevention of corruption, embezzlement, and other forms of improper conduc

Add to Reading List

Source URL: www.toppan.co.jp

Language: English - Date: 2013-10-22 08:45:24
173Computing / Ext3 / File system / Data corruption / Operating system / Kernel / Linux kernel / RAID / Ext2 / Disk file systems / Software / System software

EXPLODE: A Lightweight, General Approach to Finding Serious Errors in Storage Systems Junfeng Yang, Paul Twohey, Ben Pfaff, Can Sar, Dawson Engler Computer Systems Laboratory Stanford University Stanford, CA 94305, U.S.A

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-11-24 21:25:46
174ZFS / FreeNAS / Data corruption / File system / Standard RAID levels / ISCSI / Hard disk drive / RAID / Computer hardware / Computing

FreeNAS Mini | Storage Appliance It Saves Your Life. How important is your data? Years of family photos. Your entire music and movie collection. The shared documents in your office. Your

Add to Reading List

Source URL: www.ixsystems.com

Language: English - Date: 2014-05-16 09:13:52
175Network-attached storage / RAID / ZFS / FreeBSD / Snapshot / Database / FreeNAS / File system / Replication / Computing / Fault-tolerant computer systems / Computer storage

Copyright © 2014 iXsystems, Inc. All rights reserved. Case Study: DeepDyve™ Protecting data with ZFS Snapshots & Replication on TrueNAS® “ Losing this data to corruption or

Add to Reading List

Source URL: www.ixsystems.com

Language: English - Date: 2014-07-19 06:00:20
176Integrity / Data integrity / Political corruption / Ethics / Legal professions / Ombudsman

Ombudsman Western Australia Serving Parliament Serving Western Australians The Western Australian Integrity Coordinating Group 10th World Conference of the International Ombudsman Institute Wellington, New Zealand, 12-16

Add to Reading List

Source URL: www.ombudsman.wa.gov.au

Language: English - Date: 2014-06-11 04:26:48
177Conflict resolution / Human behavior / Behavior / Sociology / Dispute resolution / Conflict of interest / Political corruption

Appendix 2: Certification Form - Sample Conflict of Interest Statement for Individuals Involved in Data and Safety Monitoring

Add to Reading List

Source URL: www.niaid.nih.gov

Language: English - Date: 2012-10-09 16:40:10
178Sociology / Ethics / World Bank / Worldwide Governance Indicators / Global Integrity / Governance / Extractive Industries Transparency Initiative / AccountAbility / Politics / Political corruption / Politics of Africa

Methodology of the Resource Governance Index This methodology note explains what the Resource Governance Index (RGI) measures; how countries and sectors were selected; how data was collected and managed; how the Index wa

Add to Reading List

Source URL: www.resourcegovernance.org

Language: English - Date: 2013-05-14 10:35:01
179Public administration / Open Government Partnership / Transparency / Ministry of Economy / Political corruption / E-Government / Data.gov / Technology / Ethology / Open government / Science / Open data

ROMANIA NATIONAL ACTION PLAN[removed]JUNE 2014

Add to Reading List

Source URL: ogp.gov.ro

Language: English - Date: 2014-08-20 07:24:35
180File system / Computing / Non-standard RAID levels / RAID / Standard RAID levels / Data corruption

Toward I/O-Efficient Protection Against Silent Data Corruptions in RAID Arrays Mingqiang Li and Patrick P. C. Lee Department of Computer Science and Engineering, The Chinese University of Hong Kong Email: mingqiangli.cn@

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:50:19
UPDATE