Storage security

Results: 1909



#Item
561Distributed computing / Crime prevention / National security / Cloud storage / Anticipatory thinking / Cloud computing / Computer security / Business continuity planning / Disaster recovery / Computing / Concurrent computing / Data management

Vermilion offers a secure and cost-effective hosting service that provides optimal system and reporting generation performance. With cloud infrastructure and 24/7 management and monitoring, V:Hosting is accessible from y

Add to Reading List

Source URL: www.vermilionsoftware.com

Language: English - Date: 2015-03-13 10:34:49
562System software / Server log / Security event manager / Computer data logging / Security log / Oracle Database / Security information and event management / Event data / Windows Server / Computer security / Computing / Software

CRYPTOLOG CryptTech Log Management Solution Product brief Cost-effective log management for security and forensic analysis, ensuring compliance mandates and storage regulations

Add to Reading List

Source URL: www.crypttech.com

Language: English - Date: 2014-09-22 14:02:16
563Cloud storage / Data center / Data management / Distributed data storage / Networks / Server / Password / Dedicated hosting service / Information security audit / Concurrent computing / Computing / Distributed computing

Issue and Defect Tracking For professional development teams AdminiTrack Security Statement www.AdminiTrack.com

Add to Reading List

Source URL: www.adminitrack.com

Language: English - Date: 2012-05-04 09:54:00
564Backup / Data security / Magnetic tape data storage / Tape library / Tape drive / Backup software / Computer storage / Remote backup service / Backup rotation scheme / Electromagnetism / Computer hardware / Computing

Electronic Data Conversion and Discovery

Add to Reading List

Source URL: www.ndci.com

Language: English - Date: 2010-10-14 15:15:37
565Internet hosting / Cloud storage / Web hosting / Data center / Data management / Networks / Colocation centre / Physical security / Infrastructure / Computing / Concurrent computing / Distributed computing

Chicago Facility Specifications More_Security. More_Access. More_Reliability. At 99,000 square feet, LatisysChicago is one of the largest Tier III data centers in North

Add to Reading List

Source URL: www.bytemeusa.com

Language: English - Date: 2013-06-19 05:16:50
566Data security / Extensible Storage Engine / Partition coefficient / Log / Disk partitioning / Software / Computer architecture / Computing / Disk file systems / Backup

1 2 In the basic configuration, MaxDB writes all data changes to the log area. The log area consists of 1 to 32 log volumes.

Add to Reading List

Source URL: maxdb.sap.com

Language: English - Date: 2014-09-11 08:39:41
567Hashing / Secret sharing / Reed–Solomon error correction / Advanced Encryption Standard / Hash function / Cryptographic hash function / Cipher / Cryptography / Error detection and correction / Cleversafe

AONT-RS: Blending Security and Performance in Dispersed Storage Systems Jason K. Resch Development Cleversafe, Inc. 222 S. Riverside Plaza, Suite 1700

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-12-17 12:27:22
568Centralized computing / Cloud clients / Comodo / Android / Password / Cloud storage / Comodo Internet Security / Comodo Backup / Cloud computing / Computing / Comodo Group

Comodo Cloud for Android Software Version 3.0 User Guide Guide Version[removed]

Add to Reading List

Source URL: help.comodo.com

Language: English - Date: 2015-01-05 05:01:57
569Software as a service / Internet privacy / Cloud storage / Utility computing / Azure Services Platform / Privacy / Cloud computing security / IBM cloud computing / Cloud computing / Centralized computing / Computing

Constructing and Testing Privacy-Aware Services in a Cloud Computing Environment – Challenges and Opportunities (Invited Paper) Lin Gu Shing-Chi Cheung

Add to Reading List

Source URL: webscope.sandbox.yahoo.com

Language: English - Date: 2014-11-13 19:02:24
570Log / Partition coefficient / Computing / Software / Information technology management / Backup / Data security / Extensible Storage Engine

1 2 In the basic configuration, MaxDB writes all data changes to the log area. The log area consists of 1 to 32 log volumes.

Add to Reading List

Source URL: maxdb.sap.com

Language: English - Date: 2014-09-10 08:11:05
UPDATE