Data corruption

Results: 301



#Item
11CPC Workload inIn the following please find some statisti- Number of reports  cal data depicting the workload of the

CPC Workload inIn the following please find some statisti- Number of reports cal data depicting the workload of the

Add to Reading List

Source URL: www.kpk-rs.si

Language: English - Date: 2014-08-13 04:45:18
12OFFICE OF THE INSPECTOR OF THE INDEPENDENT COMMISSION AGAINST CORRUPTION (THE OIICAC) PRIVACY MANAGEMENT PLAN NOVEMBERIntroduction: The role of the Inspector of the ICAC and the Privacy and

OFFICE OF THE INSPECTOR OF THE INDEPENDENT COMMISSION AGAINST CORRUPTION (THE OIICAC) PRIVACY MANAGEMENT PLAN NOVEMBERIntroduction: The role of the Inspector of the ICAC and the Privacy and

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 23:13:08
13Zest Checkpoint Storage System for Large Supercomputers Paul Nowoczynski, Nathan Stone, Jared Yanovich, Jason Sommerfield Pittsburgh Supercomputing Center Pittsburgh, PA USA

Zest Checkpoint Storage System for Large Supercomputers Paul Nowoczynski, Nathan Stone, Jared Yanovich, Jason Sommerfield Pittsburgh Supercomputing Center Pittsburgh, PA USA

Add to Reading List

Source URL: psc.edu

Language: English - Date: 2014-04-21 17:04:39
14S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-12-28 00:32:24
15General-purpose approach  Checkpointing and Verification Simulations

General-purpose approach Checkpointing and Verification Simulations

Add to Reading List

Source URL: www.dcs.warwick.ac.uk

Language: English - Date: 2014-11-22 21:01:40
16Architectural Model for Data Integrity Version 1.0 Publication of this SNIA Technical Proposal has been approved by the SNIA. This document represents a stable proposal for use as agreed upon by the Data Integrity TWG. T

Architectural Model for Data Integrity Version 1.0 Publication of this SNIA Technical Proposal has been approved by the SNIA. This document represents a stable proposal for use as agreed upon by the Data Integrity TWG. T

Add to Reading List

Source URL: www.snia.org

Language: English - Date: 2015-08-24 19:14:14
17Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 22:41:23
18RELIABILITY For most companies, data is their most prized possession. If there were ever a total loss of this information, there could be serious risks facing the organization: loss of revenue, decline in productivity, d

RELIABILITY For most companies, data is their most prized possession. If there were ever a total loss of this information, there could be serious risks facing the organization: loss of revenue, decline in productivity, d

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2016-02-18 18:42:52
19HARDFS: Hardening HDFS with Selective and Lightweight Versioning Thanh Do, Tyler Harter, Yingchao Liu, Haryadi S. Gunawi†, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau †  University of Wisconsin, Madison

HARDFS: Hardening HDFS with Selective and Lightweight Versioning Thanh Do, Tyler Harter, Yingchao Liu, Haryadi S. Gunawi†, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau † University of Wisconsin, Madison

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2013-02-07 09:50:07
20Portability »	 Easily stored off-line to protect against on-line data corruption »	 Easily stored off-site in case of a disaster recovery situation »	 Easy to use and completely removable »	 Transport big amounts of

Portability » Easily stored off-line to protect against on-line data corruption » Easily stored off-site in case of a disaster recovery situation » Easy to use and completely removable » Transport big amounts of

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:24:41