Examples of using Data corruption in English and their translations into Russian
{-}
-
Official
-
Colloquial
That way, silent data corruption has not been a serious concern while storage devices remained relatively small and slow.
In general, when data corruption occurs a file containing that data will produce unexpected results when accessed by the system or the related application.
its size and data corruption reason are not really important,
The investigation of data corruption problem may take a lot of time
transmission can cause unexpected system reboot and even data corruption.
malicious threats and data corruption can too bring an entire organization to a complete standstill.
with the network that could cause data corruption.
causing data corruption.
information leaks or data corruption.
resulting in resource leaks, data corruption, deadlocks or crashes.
Silent data corruption may result in cascading failures,
the probability of an uncorrectable error occurring increases and data corruption may be imminent.
thus easily reaching the data corruption thresholds.
When data corruption behaves as a Poisson process, where each bit of data has an independently low probability of being changed, data corruption can generally be detected by the use of checksums,
other forms of uncorrected and undetected data corruption increases.
barring any problems, data corruption, stability or security.”.
As another example, a real-life study performed by NetApp on more than 1.5 million HDDs over 41 months found more than 400,000 silent data corruptions, out of which more than 30,000 were not detected by the hardware RAID controller.
There are two types of data corruption associated with computer systems: undetected and detected.
Duplication of databases has often proven to be source of errors and data corruption/alteration.
If appropriate mechanisms are employed to detect and remedy data corruption, data integrity can be maintained.