Memory management News

View All News

Memory management Get Started

Bring yourself up to speed with our introductory content

  • A big data, IoT project brings unique storage demands

    With the proliferation of IoT and big data, the amount of data in the enterprise increases every day. Find out how to meet storage demands for these new IT initiatives. Continue Reading

  • AWS instance types come in many shapes and sizes

    AWS instance types come in a wide range of options, each geared to specific purposes and workloads. This three-part guide looks at the different kinds of AWS instance types and common uses for each. It also explains how to best choose instance types, how to move from one instance type to another and takes a look at AWS hosting costs.

    You need to choose the correct AWS instance type for your workload or you'll end up paying too much and likely underutilizing that instance type -- with Amazon cloud pricing models, you're paying for spinning resources that you're not using. Some companies use Reserved Instances for workloads they know will be running for one to three years. Others choose (and bid on) spot instances, for one-off projects. On-demand instances are charged at a fixed rate per hour, often for test and dev projects, so an AWS cost calculator helps provide cost certainty.

    In 2016, Amazon introduced a new pricing model for AWS Reserved Instances. While this model may result in savings, there's question of whether it will be worth it when the additional management overhead is factored into the equation.

     Continue Reading

  • slack space (file slack space)

    Slack space is the difference between its logical and physical size. The logical size of a file is determined by the file’s actual size and is measured in bytes. The physical size of a file is determined by the number of sectors that are allocated to the file. Typically, sectors are clustered in groups of four and each cluster has 2,048 bytes. Continue Reading

View All Get Started

Evaluate Memory management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Memory management

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Memory management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Building a Hyper-V home lab for your certification needs

    One way to build up your expertise -- and your resume -- is to put together a Microsoft certification study lab using client Hyper-V for little to no money. Continue Reading

  • How CPU and memory affect application performance

    Application performance will change depending on if you want more cores, better clock speed or what you choose for memory. Continue Reading

  • Fighting crimeware, RAM scraping and other modern mischief

    There's a good possibility that the attacks you see this year will be harder to detect than in years past, particularly as malware generation toolkits make these more advanced techniques easy to incorporate with existing systems.

    In this three-part guide, SearchSecurity contributors examine the latest iterations of malware. First, however, is a chapter on crimeware in general -- that is, malware used to conduct crime. Not surprisingly, that means grabbing sensitive personal information from either point-of-sale terminals or individual end users. The ultimate goal is the same either way: To get at the money. Investigation is essential to understanding and preventing attacks, so we've included some guidance on how a formal investigation should proceed. Later, particular methods of malware users are explored in depth -- RAM scraping and advanced evasion techniques.

    This guide provides a valuable rundown of what's coming at you in the months ahead from the world of malware, and helps determine what you must do to keep your enterprise systems and finances secure.

     Continue Reading

View All Problem Solve