In
computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computer, computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both computer hardware, hardware and softw ...
, timestamping refers to the use of an electronic
timestamp to provide a temporal order among a set of events.
Timestamping techniques are used in a variety of computing fields, from
network management and
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
to
concurrency control.
[''Computer aided verification: 13th International conference'', by Gérard Berry, Hubert Comon, A. Finkel 2001 page 423] For instance, a
heartbeat network uses timestamping to monitor the nodes on a high availability
computer cluster.
[''Theoretical Aspects of Distributed Computing in Sensor Networks'' by Sotiris Nikoletseas and José D.P. Rolim 2011 page 304 ]
Timestamping computer files (updating
the timestamp in the per-file
metadata every time a file is modified) makes it possible to use efficient
build automation tools.
See also
*
Trusted timestamping
*
Timestamp-based concurrency control
*
Lamport timestamp
References
Computer network security
Concurrency control
Transaction processing
{{compu-stub