White Papers
17/05/2024 2024
Meet NIS2 requirements, avoid liability risks
Implementing access control to IT systems and networks is particularly important for practical application. Many EU countries, including Germany, require multi-factor authentication (MFA) for that. In this white paper, you learn how to implement this procedure economically and avoid severe penalties.
17/05/2024 2024
NIS2-Anforderungen erfüllen, Haftungsrisiken vermeiden
Von besonderer Bedeutung für die praktische Anwendung ist die Implementierung einer Zugangskontrolle zu IT-Systemen und Netzwerken. Viele EU-Länder, darunter auch Deutschland, verlangen hierfür eine Multi-Faktor-Authentifizierung (MFA). In diesem Whitepaper erfahren Sie, wie Sie dieses Vorgehen wirtschaftlich umsetzen und empfindliche Strafen vermeiden.
15/05/2024 2024
An Introduction to: e.MMC Security
e.MMC 5.1 devices enhance PCB designs by integrating NAND flash and the flash controller into a single package, optimizing space and improving security. This white paper discusses the built-in security features of e.MMCs, crucial for non-removable storage solutions, and provides insights into protecting against unwanted security threats.
27/02/2024 2024
An Introduction to: Understanding SSD Performance
This paper explains the difference between the “fresh out of the box” performance and the steady-state performance. Measurement is a complex subject and it is essential to understand exactly what has been measured under which conditions to be able to compare different drives.
19/02/2024 2024
An Introduction to: Form Factors and Governing Bodies
Most form factors in today’s data storage landscape are defined by governing bodies that set different specifications to standardize them and enable interoperability. In this paper, the current flash memory form factors are presented, and explained with some additional details (size, connectors, interface, performance, market, etc.).
16/01/2024 2024
An Introduction to: Security in Storage Systems
Not a day passes without major news of data breaches. Whether it’s database theft or taking control of systems, the interconnectivity the IoT bought with it, has made these threats even more dire. Ensuring data is secure from unauthorized access during storage and transfer is one of the main challenges of the connected world we live in today.
08/01/2024 2024
An Introduction to: Error Correction Coding
This paper explains the basic concepts behind error correction and highlights a brief history of different error correction codes discussing and analysing the advantages and disadvantages of the following three methods most common to NAND flash technology: e Bose-Chaudhuri-Hocquenghem (BCH) codes, Low-Density Parity-Check (LDPC) codes and Finally Generalized Concatenated (GC) codes.
19/12/2023 2023
An Introduction to: Non-Volatile Memory
NAND flash is a very cost competitive non-volatile memory technology. With the introduction of 3D-NAND, NAND based storage media have become serious contenders to replace magnetic rotating storage media in terms of system cost. However, there are still several challenges to be met.
09/11/2023 2023
Zero Trust Solutions with Hardware Authentication
Companies face increasing cyber threats, prompting a shift to 'zero trust' security. This approach, integrating hardware like FIDO keys, offers clear, actionable strategies for safeguarding critical data. The white paper explores how zero trust isn't just feasible—it's essential for modern security.
20/03/2023 2023
SD Express: The Next Chapter of Industrial Memory Cards?
This white paper presents a detailed comparison between the new SD Express and microSD Express memory card formats. As technology evolves with advancements in 5G, AI, and edge computing, the need for more efficient data storage solutions becomes critical.