IEEE Transactions on Dependable and Secure Computing, 2009

red door with real estate lock box and remote key

Designing Dependable Storage Solutions for Shared Application Environments

by Shravan Gaonkar, Kimberly Keeton, Arif Merchant, and William H. Sanders

Businesses today rely on their IT infrastructures, and events that cause data unavailability or loss can have expensive or even catastrophic consequences. Such events can include natural disasters, hardware failures, software failures, user and administrator errors, and malicious attacks. Given these threats, most businesses protect their data using techniques such as remote mirroring, point-intime copies (e.g., snapshots), and periodic backups to tape or disk. These techniques have different properties, advantages, and costs. Read more »

Bookmark and Share

Also this month

Computing Now