Ensuring Data is Securely Written to Disk
In a perfect world, there would be no operating system crashes, power outages or disk failures, and programmers wouldn't have to worry about coding for these incidents. Unfortunately, these failures are more common than you might expect. This document describes the path data takes from the application down to the storage, concentrating on places where data is buffered, and provides best pr...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
