Erasure

Results: 436



#Item
81

ONTRACK DATA ERASURE Erasure processes made easy just register and get started. Deletion, management and verification of any number of erasure processes are a breeze with hosted erase.

Add to Reading List

Source URL: www.ontrackdatarecovery.nl

Language: English - Date: 2015-01-14 07:41:52
    82

    Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model Adriana C. B. Pinto∗ Rafael Dowsley†

    Add to Reading List

    Source URL: imi.kyushu-u.ac.jp

    Language: English - Date: 2009-12-02 23:10:12
      83

      Het beheren van Data Erasure: GEAUTOMATISEERDE PROCESSEN VOOR OPTIMALE EFFICIËNTIE Blancco White Paper Gepubliceerd op 16 oktober 2012

      Add to Reading List

      Source URL: www.ontrackdatarecovery.nl

      Language: Dutch - Date: 2014-04-01 05:27:19
        84

        Ontrack® EasyRecovery™ 11 Quick Tips • S.M.A.R.T. Analysis • Recovering from a VMware® VMDK image • Secure Data Erasure

        Add to Reading List

        Source URL: www.ontrackdatarecovery.com.au

        Language: English - Date: 2015-06-15 04:09:16
          85

          Erasure Verification Services Secure, Confirmed Data Erasure Why Erasure Verification Service?

          Add to Reading List

          Source URL: www.ontrackdatarecovery.com.au

          Language: English - Date: 2015-06-15 04:10:31
            86Software / Disk formatting / OS/2 / DBAN / Trash / Dynamic random-access memory / File system / Data remanence / Computing / System software / Data erasure

            Remanence: The difficulty of deletion Administrative Announcements • All discussion sections are cancelled tomorrow

            Add to Reading List

            Source URL: www-inst.eecs.berkeley.edu

            Language: English - Date: 2010-04-05 22:11:54
            87Security / Data management / Risk analysis / Data erasure / Information security / Asset management / Threat / Data loss / Vulnerability / Computing / Computer security / Data security

            APRIL 2012 • ISSUE 1 IT ASSET DISPOSAL • RISK MANAGEMENT • COMPLIANCE • IT SECURITY • DATA PROTECTION Exploring the challenge of erasing

            Add to Reading List

            Source URL: www.adisa.org.uk

            Language: English - Date: 2013-02-11 14:56:56
            88Reed–Solomon error correction / Erasure code / Linear code / Systematic code / Code / Telecommunications engineering / Coding theory / Notation / Mathematics

            Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage, and Network-bandwidth KV Rashmi, Preetum Nakkiran, Jingyan Wang, Nihar B. Shah, and Kannan Ramchandran, University of California, Berkel

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2015-06-10 01:10:30
            89Information / Distributed data storage / Computing / Fault-tolerant computer systems / File sharing networks / Erasure code / Network coding / Low-density parity-check code / Reed–Solomon error correction / Coding theory / Error detection and correction / Information theory

            1 Network Coding for Distributed Storage Systems Alexandros G. Dimakis, P. Brighten Godfrey, Yunnan Wu, Martin Wainwright and Kannan Ramchandran

            Add to Reading List

            Source URL: users.ece.utexas.edu

            Language: English - Date: 2013-01-22 04:13:37
            90Bisexuality / Same-sex sexuality / Gender studies / Interpersonal relationships / Bisexual community / Biphobia / Bisexual erasure / Homosexuality / LGBT community / Gender / Human sexuality / Sexual orientation

            COMPLICATED? Bisexual people’s experiences of and ideas for improving services Sam Rankin James Morton and Matthew Bell

            Add to Reading List

            Source URL: www.equality-network.org

            Language: English - Date: 2015-05-26 05:09:45
            UPDATE