Xem 1-20 trên 125 kết quả Server level
  • Linux is gaining increasing popularity within the workplace. Primarily it is deployed within the Internet marketplace at server level but it is beginning to make in roads into other areas such as internal network servers and desktop workstations. With this in mind and for reasons given below, my company decided to deploy a Linux based LAN server into our Windows9x based network. I started this project with basic knowledge of Linux and some knowledge of Unix. During the course of the project it ocurred to me that some sort of document describing the tasks involved would be helpful.

    pdf11p batrinh 07-08-2009 348 76   Download

  • This guide explains how features work in the Exchange Server architecture, and how to configure and manage these features for optimal results. This content ranges from configuring global settings at an organizational level, to managing individual servers, to managing Exchange clusters. After reading this guide, you will have a solid understanding of what it takes to configure and manage your Exchange Server 2003 organization.

    pdf503p mrheorung 17-11-2009 272 156   Download

  • Businesses today want actionable insights into their data—they want their data to reveal itself to them in a natural and user–friendly form. What could be more natural than human language? Natural–language search is at the center of a storm of ever–increasing web–driven demand for human–computer communication and information access. SQL Server 2008 provides the tools to take advantage of the features of its built–in enterprise–level natural–language search engine in the form of integrated full–text search (iFTS).

    pdf297p nguyen5 20-11-2009 467 130   Download

  • This white paper describes how to configure a test lab with five computers for testing Network Access Quarantine Control and remote access certificate provisioning for computers not joined to a domain. This white paper offers only step-by-step procedures, not a conceptual overview of all the required technologies.

    doc43p bantoisg 09-12-2009 296 116   Download

  • Các tính năng kỹ thuật của DirectAccess trong Windows Server DirectAccess là một kỹ thuật truy cập từ xa có sẵn nhờ sự kết hợp của Windows Server 2008 R2 và Windows 7 phiên bản Enterprise hay Ultimate DirectAccess hứa hẹn cách mạng hóa toàn bộ trải nghiệm truy cập từ xa để mọi nhân viên có thể làm việc từ bất cứ nơi đâu, bất cứ lúc nào mà không cần ràng buộc với các kỹ thuật truy cập từ xa truyền thống chẳng hạn như network-level VPN, SSL VPN gateway, và proxy ngược.

    pdf6p hangkute_1 08-08-2010 137 52   Download

  • Máy chủ tên miền (Name Server) là máy chủ chứa cơ sở dữ liệu dùng cho việc chuyển đổi giữa tên miền và địa chỉ IP. Như cách phân cấp của hệ thống tên miền, tương ứng với mỗi cấp có máy chủ tên miền phục vụ tên miền ở cấp đó. Máy chủ tên miền ở mức root sẽ chứa cơ sở dữ liệu quản lý tên miền ở mức top-level-domain. Ở mức quốc gia sẽ có máy chủ tên miền quản lý domain ở mức quốc gia. ...

    ppt38p okinrino1 24-07-2012 93 45   Download

  • Pro SQL Server 2012 Reporting Services opens the door to delivering customizable, web-enabled reports across your business at reasonable cost. Reporting Services is Microsoft's enterprise-level reporting platform. It is included with many editions of SQL Server, and is something you'll want to take advantage of if you're running SQL Server as your database engine.

    pdf506p bongbong_hong 13-12-2012 99 26   Download

  • Analyze tabular data using the BI Semantic Model (BISM) in Microsoft® SQL Server® 2012 Analysis Services—and discover a simpler method for creating corporate-level BI solutions. Led by three BI experts, you’ll learn how to build, deploy, and query a BISM tabular model with step-by-step guides, examples, and best practices. This hands-on book shows you how the tabular model’s in-memory database enables you to perform rapid analytics—whether you’re a professional BI developer new to Analysis Services or familiar with its multidimensional model....

    pdf655p rose_12 06-12-2012 64 20   Download

  • Get a head start evaluating Window Server 2012—with technical insights from a Microsoft MVP who’s worked extensively with the beta release. This practical introduction illuminates new features and capabilities, with scenarios demonstrating how the platform can meet the needs of your business. Based on final, release-to-manufacturing (RTM) software, this book provides the high-level information you need to begin preparing now for deployment and management.

    pdf256p hoa_can 26-01-2013 40 18   Download

  • Pro SQL Database for Windows Azure, 2nd Edition shows how to create enterprise-level database deployments without the usual investment in datacenter and other infrastructure. Take advantage instead of Microsoft’s worldwide backbone for cloud computing that delivers all the power of SQL Server in the form of the cloud-based SQL Database for Windows Azure.

    pdf306p phungnguyet_123 20-02-2013 43 17   Download

  • This Training Kit is designed for information technology (IT) professionals who support or plan to support data warehouses, extract-transform-load (ETL) processes, data quality improvements, and master data management. It is designed for IT professionals who also plan to take the Microsoft Certified Technology Specialist (MCTS) exam 70-463. The authors assume that you have a solid, foundation-level understanding of Microsoft SQL Server 2012 and the Transact-SQL language, and that you understand basic relational modeling concepts.

    pdf848p hotmoingay3 09-01-2013 73 16   Download

  • Level 2 - Tìm hiểu cam kết SQL Server mặc định của cấp cô lập giao dịch, đọc cam kết, (được mô tả trước đây) cũng giống như một hàng rào, đẹp picket trắng lịch sự giữa hai nước láng giềng tốt. Nó ngăn ngừa bẩn đọc, nhưng không bog xuống với hệ thống khóa tranh quá mức. Vì lý do này, đó là cấp cô lập mặc định của SQL Server và sự lựa chọn lý tưởng cho hầu hết các dự án OTLP.

    pdf10p yukogaru8 26-10-2010 41 12   Download

  • This book is meant to be a resource for anyone involved in the design, production, overseeing, or troubleshooting of a site that employs server load balancing (SLB). Managers and other high-level people can use this book to improve their understanding of the overall technology. Engineers and site architects can use this book to give insight into their designs and implementations of SLB. Technicians can use this book to help configure and troubleshoot SLB implementations, as well as other in-the-trenches work....

    pdf182p tailieuvip13 19-07-2012 28 9   Download

  • Designed to handle the most demanding server operations, Snow Leopard Server is up to twice as fast as its predecessor,Snow Leopard Server is designed so people of all technical levels can easily manage servers, Allow users to exchange files, synchronize contact information/calendars, schedule events, Deploy the server that's right for you, without the need for expensive hardware: use an Xserve, a Mac Pro, an iMac, or even a Mac mini Enhanced core technologies include 64-bit computing, an advanced networking architecture, Conduct live video conferences, send/receive emai...

    pdf58p ken333 14-06-2012 471 3   Download

  • Tham khảo tài liệu 'sql server interview questions by shivprasad koirala', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf13p khangoc2399 21-09-2012 16 3   Download

  • This book combines clear factual information with easy-to-use step-by-step instructions. There are chapters with background information on the architecture and features of the BlackBerry Enterprise Server, and chapters with specific installation and configuration instructions. This combined approach gives you the knowledge to make the best implementation decisions for your environment.This book is written for IT professionals and network administrators who need to implement a BlackBerry Enterprise Server.

    pdf216p lock_123 08-04-2013 15 3   Download

  • Module 9: Configuring IPsec. Internet Protocol security (IPsec) is a framework of open standards for protecting communications over IP networks through cryptographic security services. IPsec supports network-level peer authentication, data-origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft IPsec implementation is based on standards that the Internet Engineering Task Force (IETF) IPsec working group developed. In this module, you will learn how to implement, configure, and troubleshoot IPsec.

    pdf42p tangtuy20 28-07-2016 3 1   Download

  • This module provides students with an overview of the Extensible Markup Language (XML) and its related technologies, as well as a high-level overview of the XML support in Microsoft® SQL Server™ 2000. After completing this module, students will be able to: Use XML to represent business data. Format an XML document by referencing an Extensible Stylesheet Language (XSL) style sheet. Use XML Path Language (XPath) expressions in XSL programming. List the XML features in SQL Server 2000. Describe the SQL Server 2000 XML architecture....

    pdf44p vuthuong 11-08-2009 186 42   Download

  • The Seattle, Las Vegas, and Atlanta arrays should use the same enterprise policy. Only the Chicago site has a connection to the Internet. You want the other three sites to use dial-up connections to the Chicago site. The ISA Server computers at the Seattle, Las Vegas, and Atlanta sites should provide Internet access to client computers on the network. At what level should you configure dial-up connections, dial-up entry policy elements, and routing rules at these three sites.

    pdf102p thuxuan 07-08-2009 115 33   Download

  • Network security spans a large number of disciplines, ranging from management and policy topics to operating system kernel fundamentals. Historically, the coverage of these and the other network security areas was presented in multiple, specialized publications or given a high-level treatment that was not suited to the practitioner. Network Security Bible approaches network security from the view of the individual who wants to learn and apply the associated network security best practices without having to sort through a myriad of extraneous material from multiple sources.

    pdf697p vinhnghi 17-08-2009 108 30   Download

Đồng bộ tài khoản