Ensuring Data is Securely Written to Disk

Updated -

In a perfect world, there would be no operating system crashes, power outages or disk failures, and programmers wouldn't have to worry about coding for these incidents. Unfortunately, these failures are more common than you might expect. This document describes the path data takes from the application down to the storage, concentrating on places where data is buffered, and provides best practi...

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content