Xem 1-20 trên 362 kết quả Critical data
  • Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century architectures that allow the backup software to be a “commodity” item....

    pdf285p caucaphung 04-02-2013 27 3   Download

  • The data center is home to the computational power, storage, and applications necessary to support an enterprise business. The data center infrastructure is central to the IT architecture, from which all content is sourced or passes through. Proper planning of the data center infrastructure design is critical, and performance, resiliency, and scalability need to be carefully considered.

    pdf180p thaonhi 18-06-2009 244 60   Download

  • The data center is the repository for applications and data critical to the modern enterprise. The enterprise demands on the data center are increasing, requiring the capacity and flexibility to address a fluid business environment whilst reducing operational costs. Data center expenses such as power, cooling, and space have become more of a concern as the data center grows to address business requirements. Blade servers are the latest server platforms that attempt to address these business drivers.

    pdf120p batoan 11-08-2009 121 36   Download

  • Economic thinking is all about making difficult choices. Critical economic thinking is all about being aware of how you think about economic issues so that you can make the best decisions possible. All of us engage in economic thinking whether it is shopping for ourselves, making business decisions that affect our fellow workers, or deciding on government policies that affect the entire nation. Of course such decision making is not done solely from an economic perspective. Shopping decisions are affected by a variety of cultural influences.

    pdf158p namde01 11-03-2013 35 20   Download

  • For small, medium, and large businesses, it is critical to provide high availability of data for both customers and employees. The objective behind disaster recovery and business continuance plans is accessibility to data anywhere and at any time. Meeting these objectives is all but impossible with a single data center. The single data center is a single point of failure if a catastrophic event occurs. The business comes to a standstill until the data center is rebuilt and the applications and data are restored....

    pdf100p minhthanh 11-08-2009 80 14   Download

  • Nortel is a recognized leader in delivering communications capabilities that enhance the human experience, ignite and power global commerce, and secure and protect the world’s most critical information. Serving both service provider and enterprise customers, Nortel delivers innovative technology solutions encompassing end-to-end broadband, Voice over IP, multimedia services and applications, and wireless broadband designed to help people solve the world’s greatest challenges.

    pdf110p hoangtumayman 14-05-2010 58 12   Download

  • Relational databases, the heart of storing and processing data in the enterprise for over 30 years, are no longer the only game in town. The past seven years have seen the birth —and in some cases the death—of many alternative data stores that are being used in mission-critical enterprise applications. These new data stores have been designed specifically to solve data access problems that relational database can’t handle as effectively. An example of a problem that pushes traditional relational databases to the breaking point is scale.

    pdf314p bachduong1311 12-12-2012 44 12   Download

  • Information contained in this publication regarding device applications and the like is intended through suggestion only and may be superseded by updates. It is your responsibility to ensure that your application meets with your specifications. No representation or warranty is given and no liability is assumed by Microchip Technology Incorporated with respect to the accuracy or use of such information, or infringement of patents or other intellectual property rights arising from such use or otherwise.

    pdf0p anotheryou 20-11-2012 28 11   Download

  • This book is for developers who design and program devices that use the Universal Serial Bus (USB) interface. My goal is to introduce you to USB and to help you get your devices up and communicating as quickly and easily as possible. The USB interface is versatile enough for a wide range of peripheral devices. Standard peripherals that use USB include mice, keyboards, drives, printers, and audio/video devices. USB is also suitable for data-acquisition units, control systems, and other devices with specialized functions, including one-of-a-kind designs....

    pdf593p giacattan 05-01-2013 46 11   Download

  • Whether a terrorist attack, fibre cut, security breach, natural disaster or traffic overload, today's networks must be designed to withstand adverse conditions and provide continuous service. This comprehensive, leading-edge book reveals the techniques and strategies to help you keep enterprise data and voice networks in service under critical circumstances. You learn numerous ways to minimize single points of failure through redundancy and backups, and discover how to select the right networking technologies to improve survivability and performance....

    pdf433p ken333 06-07-2012 43 8   Download

  • THE EAST ASIAN FINANCIAL CRISIS: A CRITICAL EXAMINATION OF FOUR ALTERNATIVE MODELS David Card and Alan Krueger provided the SAT data used throughout. Cecilia Rouse provided the hard-to-obtain School District Data Book used in Chapters 1 and 2. Saul Geiser and Roger Studley of the University of California Office of the President provided the student records that permitted the research in Chapter 3.

    pdf328p mualan_mualan 25-02-2013 29 8   Download

  • Aimed at helping business and IT managers clearly communicate with each other, this helpful book addresses concerns straight-on and provides practical methods to building a collaborative data warehouse . You’ll get clear explanations of the goals and objectives of each stage of the data warehouse lifecycle while learning the roles that both business managers and technicians play at each stage.

    pdf482p caucaphung 04-02-2013 17 6   Download

  • In this activity, you will first identify the optimal data storage technology to use in a given situation. Next, you will analyze the data storage technology selection in a scenario. Microsoft Official Curriculum (MOC), available to IT Academies at a discounted price, is professional courseware intended for IT professionals and developers who build, support, and implement solutions by using Microsoft products and technologies. MOC is designed to cover the topics that employers know are mission-critical in the real world. ...

    pdf4p batoan 11-08-2009 73 3   Download

  • The sub-series Ternary Alloy Systems of the Landolt-Börnstein New Series provides reliable and comprehensive descriptions of the materials constitution, based on critical intellectual evaluations of all data available at the time and it critically weights the different findings, also with respect to their compatibility with today’s edge binary phase diagrams. Selected are ternary systems of importance to alloy development and systems which gained in the recent years otherwise scientific interest.

    pdf722p tom_123 14-11-2012 25 3   Download

  • Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity of the network Congestion control aims to keep number of packets below level at which performance falls off dramatically Data network is a network of queues Generally 80% utilization is critical Finite queues mean data may be lost

    ppt45p trada85 18-01-2013 15 3   Download

  • A step-by-step guide to backing up your business data using Microsoft Data Protection Manager 2010 in this practical book. Discover how to back up and restore Microsoft applications that are critical in many of today's businesses. Understand the various components and features of Data Protection Manager 2010. Gain valuable insight into using Data Protection Manager through the author's real world experience.

    pdf360p shop_123 29-04-2013 16 3   Download

  • The care of the critically ill has changed radically during the past 10 years. Technological advances have improved monitoring, organ support, and data collection, while small steps have been made in the development of drug therapies. Conversely, new challenges (e.g. severe acute respiratory syndrome [SARS], multiple antimicrobial resistance, bioterrorism) continue to arise and public expectations are elevated, sometimes to an unreasonable level.

    pdf146p gian_anh 18-10-2012 31 2   Download

  • Data-intensive applications, challenges, techniques and technologies: A survey on Big Data has been one of the current and future research frontiers. In this year, Gartner listed the Top 10 Strategic Technology Trends For 2013 and Top 10 Critical Tech Trends For The Next Five Years, and Big Data is listed in the both two.

    pdf34p doanhtuanbkhn 12-07-2016 7 2   Download

  • The new version of PHP is out. RC4 was the last step before the final release—developers have been asked to commit to the PHP CVS repository only changes that fix bugs marked as “critical” in the bug tracking system, and thankfully only lasted a few days. The PHP developers have also solved a dilemma that has all but dominated the mailing lists of late—the naming of the CLI (command-line interface) version of PHP vs. the CGI executable, which is used when using PHP as a separate executable to run scripts through a web server....

    pdf73p thutrang 17-08-2009 338 198   Download

  • This book covers everything you need to know to pass the OCP: Oracle8i Performance and Tuning and OCP: Oracle8i Network Administration exams. The first part of the book covers the most critical areas of database performance tuning and how to follow and implement Oracle’s recommended tuning methodology. The second part covers the topics of network administration including configuring the necessary client and server components of an Oracle network and helps you develop an understanding of the Oracle 8i Net8 architecture....

    pdf810p minhthanh 11-08-2009 141 24   Download

Đồng bộ tài khoản