Keith Holt (July 1, 2003). "End-to-End Data Protection Justification" (PDF). T10 Technical Committee document 03-224r0. Retrieved August 29, 2013. http://www.t10.org/ftp/t10/document.03/03-224r0.pdf
"NVM Express Revision 1.2.1" (PDF). NVM Express, Inc. June 5, 2016. https://nvmexpress.org/wp-content/uploads/NVM_Express_1_2_1_Gold_20160603.pdf
Keith Holt (July 1, 2003). "End-to-End Data Protection Justification" (PDF). T10 Technical Committee document 03-224r0. Retrieved August 29, 2013. http://www.t10.org/ftp/t10/document.03/03-224r0.pdf
"Data Integrity Extension" (PDF). T10 Technical Committee document 03-111r0. May 2, 2003. Retrieved August 29, 2013.[permanent dead link] ftp://ftp.t10.org/t10/document.03/03-111r0.pdf
Martin K. Petersen (2009). "Linux Data Integrity Project". Retrieved August 29, 2013. https://oss.oracle.com/projects/data-integrity/
Martin K. Petersen (January 3, 2008). "Proactively Preventing Data Corruption" (PDF). Enterprise Open Source Magazine. Retrieved August 29, 2013. https://oss.oracle.com/projects/data-integrity/dist/documentation/ppdc.pdf
Safeguarding Data From Corruption - Technology Paper. PDF, Seagate, 2011 https://www.seagate.com/files/staticfiles/docs/pdf/whitepaper/safeguarding-data-from-corruption-technology-paper-tp621us.pdf
EMC Corporation (September 18, 2012). "An Integrated End-to-End Data Integrity Solution to Protect Against Silent Data Corruption" (PDF). White paper. Oracle Corporation. Retrieved August 29, 2013. /wiki/EMC_Corporation