Software redundancy

Xem 1-15 trên 15 kết quả Software redundancy
  • The scope, complexity, and pervasiveness of computer-based and controlled systems continue to increase dramatically. The consequences of these sys- tems failing can range from the mildly annoying to catastrophic, with serious injury occurring or lives lost, human-made and natural systems destroyed, security breached, businesses failed, or opportunities lost. As software assumes more of the responsibility of providing functionality and control in systems, it becomes more complex and more significant to the overall system performance and dependability...

    pdf358p tailieuvip13 24-07-2012 35 4   Download

  • This chapter advocates six principles that characterize various approaches and techniques for analysis and testing: sensitivity, redundancy, restriction, partition, visibility, and feedback. Some of these principles, such as partition, visibility, and feedback, are quite general in engineering.

    pdf3p allbymyself_09 23-02-2016 19 1   Download

  • This paper presents an algorithm for solving the inverse dynamics problem of redundant manipulators using MAPLE software. The method has the advantage of generating efficient symbolic solutions which reduces the computational cost. The influence of trajectories on the joint torques of redundant manipulators is considered.

    pdf8p thienthanquydu 21-10-2018 3 0   Download

  • This design guide defines the comprehensive functional components required to build an enterprise virtual private network (VPN) solution that can transport IP telephony and video. This design guide identifies the individual hardware requirements and their interconnections, software features, management needs, and partner dependencies, to enable customers to deploy, manage, and maintain an enterprise VPN solution.

    pdf236p kieuoanh 11-08-2009 126 34   Download

  • The medium of exchange function is redundant because the auction generates the real rates of exchange between all goods. Problems associated with real world barter, such as the double coincidence of wants, do not arise in a time-0 auction so the medium of exchange function of money is not required to solve them. In the real world money is an innovation that reduces risk and increases the choice, trade and production sets of agents. The Arrow- Debreu auction in a world of complete markets circumvents these challenges of the real world obviating the need for money. Goods buy goods in...

    pdf28p taisaocothedung 09-01-2013 25 3   Download

  • Some DoS attacks can be avoided by applying vendor patches to affected software. For example, many vendors have patched their IP implementations to prevent intruders from taking advantage of the IP reassembly bugs. A few DoS attacks cannot be stopped, but their scope of affected areas can be constrained.

    pdf76p cao_can 02-01-2013 32 2   Download

  • Gaia is Check Point's next generation operating system for security applications. In Greek mythology, Gaia is the mother of all, representing closely integrated parts to form a single, efficient system. The Gaia Operating System supports the full portfolio of Check Point Software Blades, Gateway and Security Management products. Gaia is a single, unified network security Operating System that combines the best of Check Point's SecurePlatform operating system, and IPSO, the operating system from appliance security products....

    pdf210p hoangtumayman 20-08-2012 70 1   Download

  • Many software projects fail unnecessarily because of unclear objectives, redundant and unproductive work, cost overruns, and a host of other avoidable process problems. In response, agile processes and lightweight tooling have begun to replace traditional engineering processes throughout the development lifecycle. Agile ALM is a guide for Java developers who want to integrate flexible agile practices and lightweight tooling along all phases of the software development process.

    pdf360p hoa_can 28-01-2013 33 6   Download

  • Oracle Exadata Database Machine provides extreme performance for both data warehousing and OLTP applications, making it the ideal platform for consolidating on private clouds. It is a complete package of servers, storage, networking, and software that is massively scalable, secure, and redundant. With Oracle Exadata, customers can reduce IT costs through consolidation, store up to ten times more data, improve performance of all applications, deliver a faster time-to- market by eliminating systems integration trial and error, and make better business decisions in real time.

    pdf6p yasuyidol 02-04-2013 30 5   Download

  • Tech Tips Top His List The First Quarter 2004 issue of Packet® was excellent with its coverage of security, IOS®, high availability, etc. I read with particular interest of the AutoSecure feature in Cisco IOS Software Release 12.3 Mainline. But all the information is very helpful to us because we’re installing a Cisco infrastructure at our facilities. I am familiar with Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) but was not familiar with Gateway Load Balancing Protocol (GLBP) until now.

    pdf82p vutrung 03-09-2009 70 4   Download

  • The Need for Gateway Clusters Gateways and VPN connections are business critical devices. The failure of a Security Gateway or VPN connection can result in the loss of active connections and access to critical data. The gateway between the organization and the world must remain open under all circumstances. ClusterXL Gateway Cluster Solution A ClusterXL cluster is a group of identical Check Point Security Gateways connected in such a way that if one fails, another immediately takes its place.

    pdf124p hoangtumayman 20-08-2012 62 3   Download

  • Peer-to-peer systems and applications are distributed systems without any centralized control or hierarchical organization, in which each node runs software with equivalent functionality. A review of the features of recent peer-to-peer applications yields a long list: redundant storage, permanence, selection of nearby servers, anonymity, search, authentication, and hierarchical naming. Despite this rich set of features, the core operation in most peer-to-peer systems is efficient location of data items.

    pdf14p doiroimavanchuadc 06-02-2013 24 3   Download

  • Real Application Clusters (RAC) comprises several Oracle instances running on multiple clustered computers, which communicate with each other by means of a so-called interconnect. RAC uses cluster software to access a shared database that resides on shared disk. RAC combines the processing power of these multiple interconnected computers to provide system redundancy, near linear scalability, and high availability. RAC also offers significant advantages for both OLTP and data warehouse systems and all systems and applications can efficiently exploit clustered environments. ...

    pdf140p nhacsihuytuan 13-04-2013 20 3   Download

  • Object-oriented programming allows you to derive new classes from existing classes. This is called inheritance. Inheritance is an important and powerful feature in Java for reusing software. Suppose you are to define classes to model circles, rectangles, and triangles. These classes have many common features. What is the best way to design these classes so to avoid redundancy and make the system easy to comprehend and easy to maintain? The answer is to use inheritance.

    ppt48p nhanmotchut_5 02-11-2016 12 1   Download

  • This paper presents an improved method based on the jacobian matrix and the error feedback. By using this method, the accuracy of the solution of inverse kinematics for the vehicle-manipulator system is improved. In addition, one of the advantages of a redundant system is exploited to avoid impact on joint limitations. Numerical simulations in software Matlab are carried out to verify the efficiencies of the proposed method.

    pdf12p thienthanquydu 17-10-2018 2 0   Download


Đồng bộ tài khoản