Data corruption

Results: 301



#Item
11Lobbying / Military-industrial complex / Political law / Political terminology / Right to petition / Commission for the Prevention of Corruption of the Republic of Slovenia / Politics / Law / Government / Independent Police Conduct Authority

CPC Workload inIn the following please find some statisti- Number of reports cal data depicting the workload of the

Add to Reading List

Source URL: www.kpk-rs.si

Language: English - Date: 2014-08-13 04:45:18
12Government / Data security / Prevention / Data protection / Privacy / Information privacy / Privacy Commissioner / Personal Information Protection and Electronic Documents Act / Information security / Independent Commission Against Corruption / Freedom of information laws by country / Medical privacy

OFFICE OF THE INSPECTOR OF THE INDEPENDENT COMMISSION AGAINST CORRUPTION (THE OIICAC) PRIVACY MANAGEMENT PLAN NOVEMBERIntroduction: The role of the Inspector of the ICAC and the Privacy and

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 23:13:08
13Computing / Computer architecture / Data management / Network file systems / Computer storage devices / Lustre / RAID / Clustered file system / File system / Storage area network / Computer data storage / Data corruption

Zest Checkpoint Storage System for Large Supercomputers Paul Nowoczynski, Nathan Stone, Jared Yanovich, Jason Sommerfield Pittsburgh Supercomputing Center Pittsburgh, PA USA

Add to Reading List

Source URL: psc.edu

Language: English - Date: 2014-04-21 17:04:39
14Method / Object-oriented programming / Data types / Cross-platform software / Virtual method table / Dynamic dispatch / Polymorphism / Method overriding / Objective-C / Dangling pointer / Control flow / Pointer

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-12-28 00:32:24
15Fault-tolerant computer systems / Application checkpointing / Petascale computing / Data quality / Data corruption / Simulation / cole normale suprieure de Lyon

General-purpose approach Checkpointing and Verification Simulations

Add to Reading List

Source URL: www.dcs.warwick.ac.uk

Language: English - Date: 2014-11-22 21:01:40
16Data quality / Data management / Data integrity / Transaction processing / Data Integrity Field / Data corruption / Node / XAM / Oracle Database

Architectural Model for Data Integrity Version 1.0 Publication of this SNIA Technical Proposal has been approved by the SNIA. This document represents a stable proposal for use as agreed upon by the Data Integrity TWG. T

Add to Reading List

Source URL: www.snia.org

Language: English - Date: 2015-08-24 19:14:14
17Surveillance Devices Act / Crime prevention / Law enforcement / National security / Security / Privacy of telecommunications / Independent Commission Against Corruption / Surveillance / Section summary of the Patriot Act /  Title II / Patriot Act

Report of an audit of applications for and execution of surveillance device warrants limited to data surveillance, optical surveillance and tracking surveillance by the Independent Commission Against Corruption

Add to Reading List

Source URL: www.oiicac.nsw.gov.au

Language: English - Date: 2015-06-15 22:41:23
18Linear Tape-Open / Storage media / Disk storage / Data corruption / Tape recording / Linear Tape File System / Magnetic tape data storage

RELIABILITY For most companies, data is their most prized possession. If there were ever a total loss of this information, there could be serious risks facing the organization: loss of revenue, decline in productivity, d

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2016-02-18 18:42:52
19Hadoop / Apache Hadoop / Apache Software Foundation / Cloud infrastructure / Namespace / Apache HBase / Data corruption / File system / RAID / File format / Distributed file system for cloud / MapR FS

HARDFS: Hardening HDFS with Selective and Lightweight Versioning Thanh Do, Tyler Harter, Yingchao Liu, Haryadi S. Gunawi†, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau † University of Wisconsin, Madison

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2013-02-07 09:50:07
20Linear Tape-Open / Linear Tape File System / Business continuity and disaster recovery / Computer networking / Cloud storage / USB flash drive / Backup / File system / Solid-state drive / Data center / IBM Storage / QStar Technologies

Portability » Easily stored off-line to protect against on-line data corruption » Easily stored off-site in case of a disaster recovery situation » Easy to use and completely removable » Transport big amounts of

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:24:41
UPDATE