Mostrando 241 - 260 Resultados de 309 Para Buscar '"Raiding"', tiempo de consulta: 0.09s Limitar resultados
  1. 241
    Publicado 2020
    “…The flash enclosure and Flash RAID adapters are installed in pairs. Each storage enclosure pair can support 16, 32, or 48 encryption-capable flash drives (2.5-inch, 63.5 mm form factor)…”
    Libro electrónico
  2. 242
    Publicado 2007
    “…The approach to the history of Genoa concerns different aspects, which lie outside from the mere small town reality, with raids on the territory especially in Riviera di levante. …”
    Libro electrónico
  3. 243
    Publicado 2017
    “…Their stories range from early, spirited support for the war through the devastating losses of friends and family members to air raids and into periods of hunger and fear of the American occupiers. …”
    Libro electrónico
  4. 244
    por Petti Balbi, Giovanna
    Publicado 2007
    “…The approach to the history of Genoa concerns different aspects, which lie outside from the mere small town reality, with raids on the territory especially in <em>Riviera di levante</em>. …”
    Libro electrónico
  5. 245
    Publicado 1956
    Libro
  6. 246
    por Williams, George K., 1944-
    Publicado 1999
    “…That we believed otherwise supports the notion that British bombing raids had forced Germany to transfer significant air assets to defend against them. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  7. 247
    por WANG, YUANFEI
    Publicado 2021
    “…In the late Ming dynasty, so-called "Japanese pirates" raided southeast coastal China. Hideyoshi invaded Korea. …”
    Libro electrónico
  8. 248
    por Mol, Johannes A., author
    Publicado 2022
    “…In the late Middle Ages and early modern times, able-bodied men between sixteen and sixty years of age were called upon all over Europe to participate in raids, sieges and battles, for the defense of home and hearth. …”
    Libro electrónico
  9. 249
    Publicado 2022
    “…In the late Middle Ages and early modern times, able-bodied men between sixteen and sixty years of age were called upon all over Europe to participate in raids, sieges and battles, for the defense of home and hearth. …”
    Libro electrónico
  10. 250
    por Khurshudov, Andrei, 1963-
    Publicado 2001
    “…The complete decision-maker's guide to choosing—and using—the right data storage technologies Personal and small business storage: hard drives, DVD, CD, Zip, Jaz, and more Enterprise storage: SAN, NAS, Fibre Channel, RAID, and beyond New Web-based storage alternatives Start-to-finish backup and disaster recovery tips Choosing reliable, cost-effective data storage solutions—and making the most of them! …”
    Libro electrónico
  11. 251
    Publicado 2014
    “…The new IBM Virtualization Engine TS7700 Release 3.1 continues the next generation of TS7700 Virtualization Engine servers for System z tape: IBM Virtualization Engine TS7720 Server Model VEB with 3956-CS9 and 3-TB SAS drives with RAID 6 protection IBM Virtualization Engine TS7740 Server Model V07 with 3956-CC9 with 600-GB SAS drives with RAID 6 protection These Virtualization Engines are based on IBM POWER7® technology. …”
    Libro electrónico
  12. 252
    Publicado 2014
    “…2013 was the 80th year of the takeover of power by the National Socialists in 1933, the 75th year of the Reichspogromnacht" on 9 November 193, and the 70th year of the air raids on Hamburg by allied groups known as ""Operation Gomorrha"" in the summer of 1943. …”
    Electrónico
  13. 253
    Publicado 2015
    “…IBM TS7740 features encryption-capable 600 gigabyte (GB) SAS drives with RAID 6 protection. Both models write data by policy to physical tape through attachment to high-capacity, high-performance IBM TS1140 and earlier IBM 3592 model tape drives installed in IBM TS3500 tape libraries. …”
    Libro electrónico
  14. 254
    Publicado 2017
    “…COVERS ALL EXAM TOPICS, INCLUDING: • Spinning disk and flash • RAID • Fibre Channel and iSCSI • SANs, NAS, DAS, and storage arrays • Virtualization • Cloud storage and cloud services • Storage management • Software defined storage • Business continuity, backup, and recovery • Security, access control, and encryption • Information lifecycle management • Storage heating, cooling, and power • Data migration and replication • Compliance • Storage tiering • Deduplication and compression…”
    Libro electrónico
  15. 255
    Publicado 2020
    “…The latter was privileged legally and increasingly associated with states during early modernity, but its legitimacy was frequently contested and many of its violent forms, such as raiding and destruction of buildings and crops, could be found in activities not officially classed as war…”
    Libro electrónico
  16. 256
    por Press, Posts & Telecom
    Publicado 2024
    Tabla de Contenidos: “…封 -- 异步社区电子书 -- 版权声明 -- 内容提 -- 前 -- 作 简介 -- 序 -- 目录 -- 第1 章PostgreSQL 版本 -- 1.1 PostgreSQL 历史版本的性 -- 1.1.1 择 署的版本 -- 1.1.2 升级到更新的主 版本 -- 1.2 使用 PostgreSQL 是其他数据库 -- 1.3 PostgreSQL 工具 -- 1.3.1 PostgreSQL contrib -- 1.3.2 pgFoundry -- 1.3.3 其他一些与PostgreSQL 相关的 件 -- 1.4 PostgreSQL 应用程序扩展生命周期 -- 1.5 作为实 的性 优化 -- 1.6 小结 -- 第2 章数据库硬件 -- 2.1 平 硬件支出 -- 2.1.1 CPU -- 2.1.2 内存 -- 2.1.3 磁盘 -- 2.1.4 磁盘控制器 -- 2.2 可 的控制器及磁盘安 -- 2.2.1 回写缓存 -- 2.2.2 直写式缓存的性 影响 -- 2.3 小结 -- 第3 章数据库硬件基准 测 -- 3.1 CPU 和内存基准 测 -- 3.1.1 memtest86+ -- 3.1.2 STREAM 内存测 -- 3.1.3 CPU 基准 测 -- 3.1.4 内存以及处理器 度慢的缘由 -- 3.2 物理磁盘的性 -- 3.2.1 每秒 机存取以及I/O 数 -- 3.2.2 序存取和区域恒定 度 ZCAV -- 3.2.3 提交 率 -- 3.3 硬盘基准 测工具 -- 3.3.1 hdtune -- 3.3.2 dd -- 3.3.3 bonnie++ -- 3.3.4 sysbench -- 3.3.5 复杂的磁盘基准 测 -- 3.4 样品磁盘的测 结果 -- 第4 章磁盘 置 -- 4.1 文件系统 模的最大值 -- 4.2 文件系统的崩溃恢复 -- 4.3 Linux 文件系统 -- 4.3.1 ext2 -- 4.3.2 ext3 -- 4.3.3 ext4 -- 4.3.4 XFS -- 4.3.5 其他的Linux 文件系统 -- 4.3.6 写屏 -- 4.3.7 常 Linux 文件系统 整 -- 4.4 Solaris 和FreeBSD 文件系统 -- 4.4.1 Solaris UFS -- 4.4.2 FreeBSD UFS2 -- 4.4.3 ZFS -- 4.5 Windows 文件系统 -- 4.5.1 FAT32 -- 4.5.2 NTFS -- 4.6 PostgreSQL 的磁盘布局 -- 4.6.1 符号 接 -- 4.6.2 空 -- 4.6.3 数据库目录树 -- 4.6.4 磁盘 列、RAID 以及磁盘布局 -- 4.7 小结 -- 第5 章数据库 缓存内存 -- 5.1 postgresql.conf 文件中的内存单元 -- 5.2 检查数据库 缓存 -- 5.2.1 在数据库中安 pg_buffercache -- 5.2.2 数据库磁盘布局 -- 5.2.3 在数据库中创建新的块 -- 5.2.4 将" "块写到磁盘 -- 5.3 故 恢复和缓冲区 缓存 -- 5.3.1 检查点处理基础 -- 5.3.2 写式日志和恢复处理 -- 5.3.3 检查点的时机掌握 -- 5.4 数据库缓冲区 缓存与操作系统 缓存 -- 5.4.1 双 缓存数据 -- 5.4.2 检查点开 -- 5.4.3 始大小指南 -- 5.5 分析缓冲区 缓存当中的内容 -- 5.5.1 缓冲区缓存查 的检查 -- 5.5.2 使用缓冲区 缓存检查 模的反 -- 5.6 小结 -- 第6 章服务器 置 整 -- 6.1 与当前 置 交互 -- 6.1.1 值和 置值 -- 6.1.2 允 更改的上下文信息 -- 6.1.3 新加 置文件 -- 6.2 服务器 围内的 置 -- 6.2.1 数据库 接 -- 6.2.2 共享内存 -- 6.2.3 日志 -- 6.2.4 清理与统 信息 -- 6.2.5 检查点 -- 6.2.6 WAL 置 -- 6.2.7 PITR 和WAL 复制 -- 6.3 每个客户端的 置 -- 6.3.1 effective_cache_size -- 6.3.2 整以 免某些情况的出现 -- 6.4 整新服务器 -- 6.5 专用服务器指南…”
    Libro electrónico
  17. 257
    Publicado 2018
    “…But you may also have one or more external devices (such as hard drives, flash drives, SD cards, or RAID devices), not to mention network-attached storage (NAS) devices or cloud storage (like Dropbox or iCloud Drive). …”
    Libro electrónico
  18. 258
    por Kessell, John L.
    Publicado 2016
    “…Expansionists repeatedly saw their plans dashed by Indian raids, uncooperative military officials, or lack of financial support. …”
    Libro electrónico
  19. 259
    Publicado 2015
    “…These capabilities are achieved by using network access protocols such as Network File System (NFS), Common Internet File System (CIFS), Hypertext Transfer Protocol Secure (HTTPS), File Transfer Protocol (FTP), and Secure Copy Protocol (SCP). Using built-in RAID technologies, all data is well-protected with options to add more protection through mirroring, replication, snapshots, and backup. …”
    Libro electrónico
  20. 260
    Publicado 2017
    “…. • Properly index and partition Oracle Database 12c Release 2 • Work effectively with Oracle Cloud, Oracle Exadata, and Oracle Enterprise Manager • Efficiently manage disk drives, ASM, RAID arrays, and memory • Tune queries with Oracle SQL hints and the Trace utility • Troubleshoot databases using V$ views and X$ tables • Create your first cloud database service and prepare for hybrid cloud • Generate reports using Oracle’s Statspack and Automatic Workload Repository tools • Use sar, vmstat, and iostat to monitor operating system statistics…”
    Libro electrónico