Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Operating systems (Computers) 32
- Engineering & Applied Sciences 27
- Examinations 26
- Linux 24
- History 22
- Computer Science 21
- Certification 19
- Computer networks 18
- Electronic data processing personnel 17
- Client/server computing 15
- Database management 15
- Microcomputers 13
- Computing Technology Industry Association 11
- Computer technicians 9
- Microsoft Windows server 9
- Relational databases 9
- Storage area networks (Computer networks) 9
- Maintenance and repair 8
- Programming 8
- Social aspects 8
- Virtual computer systems 8
- Computer storage devices 7
- Electrical & Computer Engineering 7
- Information storage and retrieval systems 7
- Management 7
- Oracle (Computer file) 7
- Microsoft Windows (Computer file) 6
- Security measures 6
- Computer security 5
- Microsoft software 5
-
221Publicado 2015Tabla de Contenidos: “…1.9.4 Result -- 1.10 Chapter summary -- 2 Ensuring High Availability for Your Enterprise Web Applications -- 2.1 Introduction -- 2.1.1 Key tenets of high availability -- 2.1.2 Motivations for high availability -- 2.2 High availability planning -- 2.2.1 Enterprise application availability chain -- 2.2.2 Availability analysis process and establishment -- 2.3 Challenges to high availability -- 2.3.1 Hardware-related challenges -- 2.3.2 Software-related challenges -- 2.3.2.1 Application issues impacting availability -- 2.3.3 Process-related challenges -- 2.3.4 Unanticipated challenges -- 2.4 High availability architecture patterns and best practices -- 2.4.1 Patterns for high availability -- 2.4.2 Software high availability patterns -- 2.4.3 High availability best practices -- 2.5 High availability for storage, network, and database components -- 2.5.1 Storage availability through RAID -- 2.5.2 Storage virtualization -- 2.5.2.1 Storage availability through NAS and SAN -- 2.6 High availability database -- 2.7 Network availability -- 2.8 5R model for high availability -- 2.8.1 Reliability -- 2.8.2 Replicability and DR strategy -- 2.8.3 Recoverability -- 2.8.4 Reporting and monitoring -- 2.8.5 Redundancy -- 2.9 Other aspects of high availability -- 2.9.1 Special case of gateway pages and business-critical transactions -- 2.9.2 Comparison with cloud -- 2.9.3 High availability of services, feeds, static assets, and pluggable components -- 2.10 Availability anti-patterns -- 2.11 High availability governance -- 2.12 Uninterrupted system and application maintenance -- 2.13 High availability testing -- 2.14 Case study -- 2.14.1 Problem statement -- 2.14.2 High availability assessment -- 2.14.3 Fixing gaps related to high availability -- 2.14.3.1 Infrastructure layer -- 2.14.3.2 Database layer -- 2.14.3.3 Application layer -- 2.14.3.4 Process-related fixes…”
Libro electrónico -
222Publicado 2003Tabla de Contenidos: “…Build a large data warehouse -- 2.1 Steps for building a large data warehouse -- 2.2 Disk considerations -- 2.2.1 Summary of the most popular RAID levels -- 2.2.2 Data placement -- 2.2.3 Log placement -- 2.2.4 Data availability and performance -- 2.2.5 General storage performance recommendations -- 2.3 Database design considerations -- 2.3.1 Understand data partitioning -- 2.3.2 Define the number of database partitions -- 2.3.3 Define database partition groups -- 2.3.4 Design the table spaces -- 2.3.5 Understand partitioning map -- 2.3.6 Choose the partitioning key -- 2.3.7 Size the tables -- 2.3.8 Size for MDC utilization -- 2.3.9 Size for MQT utilization -- 2.3.10 Configure DB2 UDB -- 2.3.11 Recommended parameters for performance…”
Libro electrónico -
223Publicado 2019“…The legacies of air raids, from reconstruction to commemoration, are also discussed. …”
Libro electrónico -
224Publicado 2005Tabla de Contenidos: “…Storage management in depth -- 4.1 DB2 UDB logical and physical database objects -- 4.1.1 Tables, indexes, and views -- 4.1.2 Table spaces -- 4.1.3 Table space containers -- 4.2 Working with SMS and DMS table spaces -- 4.2.1 SMS table spaces -- 4.2.2 File based DMS table spaces -- 4.2.3 Device based DMS table spaces -- 4.3 SAP data classes (TABARTs) -- 4.4 Space reclamation strategies -- 4.4.1 Offline table and index reorganization -- 4.4.2 Inplace table and index reorganization -- 4.4.3 Criteria for reorganization -- 4.4.4 High water mark -- 4.5 Best practices for intelligent storage subsystems -- 4.5.1 Database stored on single SSA/SCSI disks -- 4.5.2 Database stored on RAID-5 arrays -- 4.6 Moving tables and indexes using DB6CONV -- 4.6.1 Principle of moving tables and indexes using DB6CONV -- 4.6.2 Example: Moving table PCL2 to improve performance -- Chapter 5. …”
Libro electrónico -
225por Putte, Geert van deTabla de Contenidos: “…Using external SCSI storage enclosure with Linux -- Configuring ServeRAID controllers for clustering -- Appendix C. Configuring a FAStT200 disk system for Linux -- Configuring SANbox2 to use static IP address -- Configuring the FAStT200 disk enclosure to use a static IP-address -- Installing the Fiber Host Adapter FC2/133 -- Updating the host adapter BIOS -- Install the host adapter drivers -- Install the FAStT_MSJ -- Appendix D. …”
Publicado 2005
Libro electrónico -
226Publicado 2018“…With the IBM Elastic StorageTM Server (ESS) based on IBM Spectrum ScaleTM, RAID capabilities are added to the file system. By using the intelligent internal logic of the IBM Spectrum Scale RAID code, reasonable performance and significant disk failure recovery improvements are achieved. …”
Libro electrónico -
227
-
228Tārīkh al-bīmāristānāt fī al-Islāmتاريخ البيمارستانات في الإسلام /por Aḥmad ʿĪsá
Publicado 1981Libro -
229Publicado 2005“…Learn how to protect data effectively using mirroring, RAID, remote copy, and backup/ recovery systems. …”
Libro electrónico -
230Publicado 2022Tabla de Contenidos: “…2.32 Conclusions - predictions about storage systems -- 2.32.1 Resurgence in shared storage, but Fibre-Channel fades -- 3 Disk drive data placement and scheduling -- 3.1 The organization of Hard Disk Drives - HDDs -- 3.2 Internal organization of files in UNIX -- 3.3 Review of disk arm scheduling -- 3.3.1 Implementation of SATF -- 3.3.2 Disk performance studies by Windsor Hsu and Alan Jay Smith at IBM ARC -- 3.3.3 Linux support for disk scheduling -- 3.4 Disk scheduling for mixed workloads -- 3.5 Real time disk scheduling for multimedia -- 3.6 Storage virtualization -- 3.7 File placement on disk -- 3.7.1 Anticipatory disk arm placement -- 3.8 Disks with Shingled Magnetic Recording - SMR -- 3.9 Review of analyses of disk scheduling methods -- 3.10 Analytic studies of disk storage -- 3.11 Analysis of a zoned disk with the FCFS scheduling -- 3.11.1 Disk service time in zoned disks with FCFS scheduling -- 3.12 Performance analysis of the SCAN policy -- 3.13 Analysis of the SATF policy -- 3.13.1 Preliminary investigation of SATF -- 3.13.2 First method for the analysis of SATF -- 3.13.3 Second method for the analysis of SATF -- 3.14 Conclusions -- 4 Mirrored & -- hybrid arrays -- 4.1 Introduction to mirrored and hybrid disk arrays -- 4.2 Mirrored and hybrid disk array organizations -- 4.2.1 Basic Mirroring - BM -- 4.2.2 Group Rotate Declustering - GRD -- 4.2.3 Interleaved Declustering - ID -- 4.2.4 Chained Declustering - CD -- 4.2.5 Dual striping -- 4.2.6 Logical volume and automatic storage management and GPFS -- 4.2.7 LSI Logic RAID -- 4.2.8 Adaptive disk arrays -- 4.2.9 SSPiRAL (Survivable Storage using Parity in Redundant Array Layout) -- 4.2.10 B-code -- 4.2.11 Weaver codes -- 4.2.12 Robust, Efficient, Scalable, Autonomous, Reliable - RESAR -- 4.2.13 Multiway placement -- 4.2.14 Classification of mirrored and hybrid disk arrays…”
Libro electrónico -
231Publicado 2011“…The present study focuses on Leo Rosten's immigration novel The Education of Hyman Kaplan (1937) and Archibald MacLeish's radio play Air Raid (1938). The first is more than the apparent compendium of language-based jokes. …”
Libro electrónico -
232
-
233Publicado 2022“…The monograph realigns political culture and countermeasures against slave raids, which increased during the breakup of the Golden Horde. …”
Libro electrónico -
234Publicado 2004“…Andre Brinkmann et al. use a similar economical motivation that inspired the original RAID in 1988 to propose to virtualize multiple RAIDs with small capacity into a large one. …”
Libro electrónico -
235Publicado 2013Tabla de Contenidos: “…-- 1.2.6 The Fifth Generation-Low-Power and Invisible Computers -- 1.3 THE COMPUTER ZOO -- 1.3.1 Technological and Economic Forces -- 1.3.2 The Computer Spectrum -- 1.3.3 Disposable Computers -- 1.3.4 Microcontrollers -- 1.3.5 Mobile and Game Computers -- 1.3.6 Personal Computers -- 1.3.7 Servers -- 1.3.8 Mainframes -- 1.4 EXAMPLE COMPUTER FAMILIES -- 1.4.1 Introduction to the x86 Architecture -- 1.4.2 Introduction to the ARM Architecture -- 1.4.3 Introduction to the AVR Architecture -- 1.5 METRIC UNITS -- 1.6 OUTLINE OF THIS BOOK -- 2 COMPUTER SYSTEMS -- 2.1 PROCESSORS -- 2.1.1 CPU Organization -- 2.1.2 Instruction Execution -- 2.1.3 RISC versus CISC -- 2.1.4 Design Principles for Modern Computers -- 2.1.5 Instruction-Level Parallelism -- 2.1.6 Processor-Level Parallelism -- 2.2 PRIMARYMEMORY -- 2.2.1 Bits -- 2.2.2 Memory Addresses -- 2.2.3 Byte Ordering -- 2.2.4 Error-Correcting Codes -- 2.2.5 Cache Memory -- 2.2.6 Memory Packaging and Types -- 2.3 SECONDARYMEMORY -- 2.3.1 Memory Hierarchies -- 2.3.2 Magnetic Disks -- 2.3.3 IDE Disks -- 2.3.4 SCSI Disks -- 2.3.5 RAID -- 2.3.6 Solid-State Disks -- 2.3.7 CD-ROMs -- 2.3.8 CD-Recordables -- 2.3.9 CD-Rewritables -- 2.3.10 DVD -- 2.3.11 Blu-ray -- 2.4 INPUT/OUTPUT -- 2.4.1 Buses -- 2.4.2 Terminals -- 2.4.3 Mice -- 2.4.4 Game Controllers…”
Libro electrónico -
236por Casey, Aloysius G.“…"This storyline addresses the only question mark on O'Malley's career -- the Lavelle raids of February 1972. Using appropriate Nixon White House audio recordings and top secret messages (sent by the Joint chiefs of Staff to Vietnam) that were acquired through the Freedom of Information Act, Aloysius and Patrick Casey rescued from character assassination the reputation not only of Jerry O'Malley but also the reputation of Gen John D. …”
Publicado 2007
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
237Publicado 2019“…We also provide a technical introduction to IBM Spectrum Scale RAID. Next, we explain the key aspects of planning an installation, provide an example of an installation scenario, and describe the key aspects of day-to-day management and a process for problem determination. …”
Libro electrónico -
238por Dashdondog, Bayarsaikhan“…In order to enhance our understanding of this turning point in medieval history, the effects of long distance military raids, missions, diplomacy, collaboration, administrative assistance and confrontation as well as the reasons for invading Greater Armenia and motives for establishing an alliance, are considered…”
Publicado 2011
Libro electrónico -
239Publicado 2017“…We learn how this is articulated in spiritual warfare, in crusades, and in healing or witch-killing raids. The contributors highlight what happens to phenomena that people address as locally specific witchcraft or sorcery when re-molded within the universalist Pentecostal demonology, vocabulary, and confrontational methodology. …”
Libro electrónico -
240Publicado 2016“…The latest TS7700 family of z Systems tape virtualization is offered as two models: IBM TS7720 features encryption-capable high-capacity cache that uses 3 TB SAS disk drives with RAID 6, which can scale to large capacities with the highest level of data protection. …”
Libro electrónico