Mostrando 221 - 240 Resultados de 309 Para Buscar '"Raiding"', tiempo de consulta: 0.09s Limitar resultados
  1. 221
    Publicado 2015
    Tabla de Contenidos: “…1.9.4 Result -- 1.10 Chapter summary -- 2 Ensuring High Availability for Your Enterprise Web Applications -- 2.1 Introduction -- 2.1.1 Key tenets of high availability -- 2.1.2 Motivations for high availability -- 2.2 High availability planning -- 2.2.1 Enterprise application availability chain -- 2.2.2 Availability analysis process and establishment -- 2.3 Challenges to high availability -- 2.3.1 Hardware-related challenges -- 2.3.2 Software-related challenges -- 2.3.2.1 Application issues impacting availability -- 2.3.3 Process-related challenges -- 2.3.4 Unanticipated challenges -- 2.4 High availability architecture patterns and best practices -- 2.4.1 Patterns for high availability -- 2.4.2 Software high availability patterns -- 2.4.3 High availability best practices -- 2.5 High availability for storage, network, and database components -- 2.5.1 Storage availability through RAID -- 2.5.2 Storage virtualization -- 2.5.2.1 Storage availability through NAS and SAN -- 2.6 High availability database -- 2.7 Network availability -- 2.8 5R model for high availability -- 2.8.1 Reliability -- 2.8.2 Replicability and DR strategy -- 2.8.3 Recoverability -- 2.8.4 Reporting and monitoring -- 2.8.5 Redundancy -- 2.9 Other aspects of high availability -- 2.9.1 Special case of gateway pages and business-critical transactions -- 2.9.2 Comparison with cloud -- 2.9.3 High availability of services, feeds, static assets, and pluggable components -- 2.10 Availability anti-patterns -- 2.11 High availability governance -- 2.12 Uninterrupted system and application maintenance -- 2.13 High availability testing -- 2.14 Case study -- 2.14.1 Problem statement -- 2.14.2 High availability assessment -- 2.14.3 Fixing gaps related to high availability -- 2.14.3.1 Infrastructure layer -- 2.14.3.2 Database layer -- 2.14.3.3 Application layer -- 2.14.3.4 Process-related fixes…”
    Libro electrónico
  2. 222
    Publicado 2003
    Tabla de Contenidos: “…Build a large data warehouse -- 2.1 Steps for building a large data warehouse -- 2.2 Disk considerations -- 2.2.1 Summary of the most popular RAID levels -- 2.2.2 Data placement -- 2.2.3 Log placement -- 2.2.4 Data availability and performance -- 2.2.5 General storage performance recommendations -- 2.3 Database design considerations -- 2.3.1 Understand data partitioning -- 2.3.2 Define the number of database partitions -- 2.3.3 Define database partition groups -- 2.3.4 Design the table spaces -- 2.3.5 Understand partitioning map -- 2.3.6 Choose the partitioning key -- 2.3.7 Size the tables -- 2.3.8 Size for MDC utilization -- 2.3.9 Size for MQT utilization -- 2.3.10 Configure DB2 UDB -- 2.3.11 Recommended parameters for performance…”
    Libro electrónico
  3. 223
    Publicado 2019
    “…The legacies of air raids, from reconstruction to commemoration, are also discussed. …”
    Libro electrónico
  4. 224
    Publicado 2005
    Tabla de Contenidos: “…Storage management in depth -- 4.1 DB2 UDB logical and physical database objects -- 4.1.1 Tables, indexes, and views -- 4.1.2 Table spaces -- 4.1.3 Table space containers -- 4.2 Working with SMS and DMS table spaces -- 4.2.1 SMS table spaces -- 4.2.2 File based DMS table spaces -- 4.2.3 Device based DMS table spaces -- 4.3 SAP data classes (TABARTs) -- 4.4 Space reclamation strategies -- 4.4.1 Offline table and index reorganization -- 4.4.2 Inplace table and index reorganization -- 4.4.3 Criteria for reorganization -- 4.4.4 High water mark -- 4.5 Best practices for intelligent storage subsystems -- 4.5.1 Database stored on single SSA/SCSI disks -- 4.5.2 Database stored on RAID-5 arrays -- 4.6 Moving tables and indexes using DB6CONV -- 4.6.1 Principle of moving tables and indexes using DB6CONV -- 4.6.2 Example: Moving table PCL2 to improve performance -- Chapter 5. …”
    Libro electrónico
  5. 225
    por Putte, Geert van de
    Publicado 2005
    Tabla de Contenidos: “…Using external SCSI storage enclosure with Linux -- Configuring ServeRAID controllers for clustering -- Appendix C. Configuring a FAStT200 disk system for Linux -- Configuring SANbox2 to use static IP address -- Configuring the FAStT200 disk enclosure to use a static IP-address -- Installing the Fiber Host Adapter FC2/133 -- Updating the host adapter BIOS -- Install the host adapter drivers -- Install the FAStT_MSJ -- Appendix D. …”
    Libro electrónico
  6. 226
    Publicado 2018
    “…With the IBM Elastic StorageTM Server (ESS) based on IBM Spectrum ScaleTM, RAID capabilities are added to the file system. By using the intelligent internal logic of the IBM Spectrum Scale RAID code, reasonable performance and significant disk failure recovery improvements are achieved. …”
    Libro electrónico
  7. 227
  8. 228
    Tārīkh al-bīmāristānāt fī al-Islām
    تاريخ البيمارستانات في الإسلام /
    por Aḥmad ʿĪsá
    Publicado 1981
    Libro
  9. 229
    Publicado 2005
    “…Learn how to protect data effectively using mirroring, RAID, remote copy, and backup/ recovery systems. …”
    Libro electrónico
  10. 230
    Publicado 2022
    Tabla de Contenidos: “…2.32 Conclusions - predictions about storage systems -- 2.32.1 Resurgence in shared storage, but Fibre-Channel fades -- 3 Disk drive data placement and scheduling -- 3.1 The organization of Hard Disk Drives - HDDs -- 3.2 Internal organization of files in UNIX -- 3.3 Review of disk arm scheduling -- 3.3.1 Implementation of SATF -- 3.3.2 Disk performance studies by Windsor Hsu and Alan Jay Smith at IBM ARC -- 3.3.3 Linux support for disk scheduling -- 3.4 Disk scheduling for mixed workloads -- 3.5 Real time disk scheduling for multimedia -- 3.6 Storage virtualization -- 3.7 File placement on disk -- 3.7.1 Anticipatory disk arm placement -- 3.8 Disks with Shingled Magnetic Recording - SMR -- 3.9 Review of analyses of disk scheduling methods -- 3.10 Analytic studies of disk storage -- 3.11 Analysis of a zoned disk with the FCFS scheduling -- 3.11.1 Disk service time in zoned disks with FCFS scheduling -- 3.12 Performance analysis of the SCAN policy -- 3.13 Analysis of the SATF policy -- 3.13.1 Preliminary investigation of SATF -- 3.13.2 First method for the analysis of SATF -- 3.13.3 Second method for the analysis of SATF -- 3.14 Conclusions -- 4 Mirrored &amp -- hybrid arrays -- 4.1 Introduction to mirrored and hybrid disk arrays -- 4.2 Mirrored and hybrid disk array organizations -- 4.2.1 Basic Mirroring - BM -- 4.2.2 Group Rotate Declustering - GRD -- 4.2.3 Interleaved Declustering - ID -- 4.2.4 Chained Declustering - CD -- 4.2.5 Dual striping -- 4.2.6 Logical volume and automatic storage management and GPFS -- 4.2.7 LSI Logic RAID -- 4.2.8 Adaptive disk arrays -- 4.2.9 SSPiRAL (Survivable Storage using Parity in Redundant Array Layout) -- 4.2.10 B-code -- 4.2.11 Weaver codes -- 4.2.12 Robust, Efficient, Scalable, Autonomous, Reliable - RESAR -- 4.2.13 Multiway placement -- 4.2.14 Classification of mirrored and hybrid disk arrays…”
    Libro electrónico
  11. 231
    Publicado 2011
    “…The present study focuses on Leo Rosten's immigration novel The Education of Hyman Kaplan (1937) and Archibald MacLeish's radio play Air Raid (1938). The first is more than the apparent compendium of language-based jokes. …”
    Libro electrónico
  12. 232
    por Baroja, Pío, 1872-1956
    Publicado 1956
    Libro
  13. 233
    Publicado 2022
    “…The monograph realigns political culture and countermeasures against slave raids, which increased during the breakup of the Golden Horde. …”
    Libro electrónico
  14. 234
    Publicado 2004
    “…Andre Brinkmann et al. use a similar economical motivation that inspired the original RAID in 1988 to propose to virtualize multiple RAIDs with small capacity into a large one. …”
    Libro electrónico
  15. 235
    Publicado 2013
    Tabla de Contenidos: “…-- 1.2.6 The Fifth Generation-Low-Power and Invisible Computers -- 1.3 THE COMPUTER ZOO -- 1.3.1 Technological and Economic Forces -- 1.3.2 The Computer Spectrum -- 1.3.3 Disposable Computers -- 1.3.4 Microcontrollers -- 1.3.5 Mobile and Game Computers -- 1.3.6 Personal Computers -- 1.3.7 Servers -- 1.3.8 Mainframes -- 1.4 EXAMPLE COMPUTER FAMILIES -- 1.4.1 Introduction to the x86 Architecture -- 1.4.2 Introduction to the ARM Architecture -- 1.4.3 Introduction to the AVR Architecture -- 1.5 METRIC UNITS -- 1.6 OUTLINE OF THIS BOOK -- 2 COMPUTER SYSTEMS -- 2.1 PROCESSORS -- 2.1.1 CPU Organization -- 2.1.2 Instruction Execution -- 2.1.3 RISC versus CISC -- 2.1.4 Design Principles for Modern Computers -- 2.1.5 Instruction-Level Parallelism -- 2.1.6 Processor-Level Parallelism -- 2.2 PRIMARYMEMORY -- 2.2.1 Bits -- 2.2.2 Memory Addresses -- 2.2.3 Byte Ordering -- 2.2.4 Error-Correcting Codes -- 2.2.5 Cache Memory -- 2.2.6 Memory Packaging and Types -- 2.3 SECONDARYMEMORY -- 2.3.1 Memory Hierarchies -- 2.3.2 Magnetic Disks -- 2.3.3 IDE Disks -- 2.3.4 SCSI Disks -- 2.3.5 RAID -- 2.3.6 Solid-State Disks -- 2.3.7 CD-ROMs -- 2.3.8 CD-Recordables -- 2.3.9 CD-Rewritables -- 2.3.10 DVD -- 2.3.11 Blu-ray -- 2.4 INPUT/OUTPUT -- 2.4.1 Buses -- 2.4.2 Terminals -- 2.4.3 Mice -- 2.4.4 Game Controllers…”
    Libro electrónico
  16. 236
    por Casey, Aloysius G.
    Publicado 2007
    “…"This storyline addresses the only question mark on O'Malley's career -- the Lavelle raids of February 1972. Using appropriate Nixon White House audio recordings and top secret messages (sent by the Joint chiefs of Staff to Vietnam) that were acquired through the Freedom of Information Act, Aloysius and Patrick Casey rescued from character assassination the reputation not only of Jerry O'Malley but also the reputation of Gen John D. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  17. 237
    Publicado 2019
    “…We also provide a technical introduction to IBM Spectrum Scale RAID. Next, we explain the key aspects of planning an installation, provide an example of an installation scenario, and describe the key aspects of day-to-day management and a process for problem determination. …”
    Libro electrónico
  18. 238
    por Dashdondog, Bayarsaikhan
    Publicado 2011
    “…In order to enhance our understanding of this turning point in medieval history, the effects of long distance military raids, missions, diplomacy, collaboration, administrative assistance and confrontation as well as the reasons for invading Greater Armenia and motives for establishing an alliance, are considered…”
    Libro electrónico
  19. 239
    Publicado 2017
    “…We learn how this is articulated in spiritual warfare, in crusades, and in healing or witch-killing raids. The contributors highlight what happens to phenomena that people address as locally specific witchcraft or sorcery when re-molded within the universalist Pentecostal demonology, vocabulary, and confrontational methodology. …”
    Libro electrónico
  20. 240
    Publicado 2016
    “…The latest TS7700 family of z Systems tape virtualization is offered as two models: IBM TS7720 features encryption-capable high-capacity cache that uses 3 TB SAS disk drives with RAID 6, which can scale to large capacities with the highest level of data protection. …”
    Libro electrónico