Data Backup Digest

Do-It-Yourself Windows File Recovery Software: A Comparison

results »

All articles

Sort by: publishing date popularity

How Do Cryptographic Hash Functions Work?

Cryptographic hash functions are a critical part of many data security algorithms and systems in use today.

10 / 30 / 2018 J.R. Johnivan

DNA Storage Advances with the Ability to Overwrite

DNA might be the next big storage medium. That dream is closer to reality now that data stored on DNA can be overwritten.

07 / 13 / 2020 Chris Connor

Lockheed Exploring Advanced Analytics and AI

Lockheed Martin is making some huge and significant advancements in machine learning, advanced analytics, AI and more.

01 / 27 / 2018 J.R. Johnivan

Nearly Half of Second-Hand Storage Devices Contain Personal Information

New research has found that nearly half of second hand storage devices contain personal information.

12 / 22 / 2017 Chris Connor

Video Game Dungeon Defenders 2 Embraces Blockchain

We already know how successful the blockchain is at securing cryptocurrency - but can it do the same for digital video game assets?

10 / 31 / 2018 J.R. Johnivan

How a Twitter Bot Tracks Tech Complaints

How a new Twitter bot is tracking complaints about the most popular consumer tech.

03 / 04 / 2022 J.R. Johnivan

Are Caching Gateways Replacing Enterprise NAS Devices?

What are caching gateways and how are they replacing the traditional NAS devices in enterprise applications?

12 / 07 / 2018 J.R. Johnivan

1 ... 185 186 187 188 189 ... 225
Total 225 pages