Printer Friendly

Articles from Computer Technology Review (August 1, 2003)

1-23 out of 23 article(s)
Title Author Type Words
AIT Tape: best long-term replacement for archival Magneto-Optical. Vining, Richard 1373
Answering the storage security challenge. Sevounts, Gary 1526
Automating the full data protection process: Integrity 1.4.5 from Avail Solutions. 163
Blackout power. McNamara, George 173
Building multi-speed SANs with scalable HBA architecture. Brotherton, Phil 1032
Continuous data availability solutions using an iSCSI virtualization switch. Sante, Zophar 3050
Fabric-based intelligence: but do a reality check on the switches before you buy. Chudnow, Christine Taylor 1604
Homeland security strikes out: power blackout illuminates storage vulnerabilities. 245
Image backup & disaster recovery. Edwards, Morgan 2371
Information Lifecycle Management. Rief, Todd 1428
IP SAN or Fibre Channel SAN? Sanchez, Colman 1103
Keeping the doors open. Lewis, Dan 1904
Network and application layer tests reveal security gaps. Goldstein, Josh 1550
Open source software for perimeter defense. Ferrarini, Elizabeth M. 2280
Protecting the learning environment. Ellis, Robert 2201
Roundtable: "switched on storage arrays" Part 3 of 3. 3206
SCSI Cables: more than a couple of connectors and a few pieces of wire. Stein, Jim 2063
Suspect system incident verification in incident response. Brown, Christopher L.T. 2118
Tape automation's never looked so good. Raphael, Louis 552
The Nearline Effect: tape vendors will love it; disk vendors won't. Moore, Fred 1459
The SQL Slammer worm: how two organizations survived the attack. Robb, Drew 1210
The storage lifetime of removable media. Chesher, Mary 1781
Using data backup and restore services to achieve compliance. Wu, Bernie 1547

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters