Searching all of TechTarget| 3,690 results for "persistent"


By Brad Irby Get Started Aug 14, 2015

What is the best pattern to use for data persistence?

When designing an application, developers must decide how to implement data persistence. Brad Irby explains which data persistence pattern to consider. Continue Reading


By Garry Kranz News Sep 11, 2015

AgigA Tech samples DDR4 NVDIMM for persistent DRAM storage

AgigA Tech demonstrates DDR4 NVDIMM for persistent memory channel storage, and plans to go to market with storage and server vendors. Continue Reading


By Brian Madden Evaluate Nov 19, 2014

When should persistent VDI be used over non-persistent VDI?

VDI expert Brian Madden explains why most of today's storage options can handle persistent desktops, and how non-persistence can contribute to VDI failure. Continue Reading


By Johannes Ullrich Manage Apr 07, 2015

Beyond the Page: Advanced Persistent Threats, Ransomware and More

The era of mobile, cloud and the Internet of Things is also an era of advanced persistent threats, ransomware and more. Here's how to stay secure. Continue Reading


By Maxim Tamarov News Mar 12, 2015

Banking Trojans decline, but financial malware threat persists

A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms. Continue Reading


Mar 12, 2015

Mac OS X persistent evidences for forensic purposes

This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation. Continue Reading


Get Started Feb 26, 2015

Madden: Non-persistent VDI is getting easier

Brian Madden was once a stark proponent of persistent VDI, but he says that opinion is changing thanks to improvements in technology and the way users are accessing applications. Continue Reading


By Jim O'Reilly Evaluate Jan 21, 2015

Myths persist about virtualizing high performance computers

Recent evidence shows virtualization is a viable option for high performance computers today. Continue Reading


By Michael Cobb Manage Apr 28, 2015

Are mobile persistent cookies a threat to enterprise data security?

While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to mitigate the risk and eliminate the threat. Continue Reading


By Michael Heller News Apr 24, 2015

Long-duration advanced persistent threat attacks now the norm, say experts

Threat experts at RSA Conference 2015 say today's most dangerous attack techniques reflect a shift toward long-duration attacks that are often nearly impossible to detect. Continue Reading