Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Carolan J., Radeztsky S., Strong P. — Buliding N1 Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers
Carolan J., Radeztsky S., Strong P. — Buliding N1 Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Buliding N1 Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers

Авторы: Carolan J., Radeztsky S., Strong P.

Аннотация:

The N1 Grid is Sun's vision, strategy, and architecture—and a set of products—that redefine the nature of data center computing. The N1 Grid architecture uses the network, physically and logically, as its fundamental organizing principle.

This book enables the reader to implement service-centric data center solutions through the use of N1 Grid-based principles and architectures, which are more efficient and flexible. It opens with an overview of how this approach evolved and then takes the reader through the process of preparing, architecting, and implementing N1 Grid-based solutions.


Язык: en

Рубрика: Строительство и архитектура/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 336

Добавлена в каталог: 09.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
1
10
10015      
11
11519      
11822      
12
12047      
12783      
13
13275      
14455      
14664      
14742      
14963      
16799      
17780      
18348      
19604      
19609      
19854      
2
21329      
22318      
22897      
23425      
23457      
23489      
23970      
24296      
24638      
25156      
26077      
27420      
28338      
28699      
28908      
29494      
3
32064      
33405      
35225      
35434      
36128      
36888      
37234      
39119      
4
40192      
41171      
42170      
42773      
44084      
46728      
48081      
48280      
5
50668      
51885      
52564      
53446      
53675      
53984      
54019      
54068      
58362      
59278      
59809      
6
60483      
62722      
63964      
65329      
67022      
67983      
68747      
69939      
70860      
71791      
72921      
73116      
73120      
73325      
73552      
74875      
75832      
78045      
78393      
78585      
79295      
8
81845      
82832      
89164      
89728      
89782      
9
90156      
90939      
91182      
91372      
92514      
93107      
94491      
94833      
95522      
97573      
97833      
98600      
99196      
A
Abstraction      2nd 3rd 4th 5th 6th 7th
academic      
Acceptance      
acceptance criteria      
ACCESS      
account names      
accounting      
achieving      2nd
Acquisition      
Activities      
Adaptability      
additional costs      
additive use of      
adequately sized      
Administration      
administration costs      
administrative      
agents      
aggregated accounting      
aggregation of records      
AMD      
Analysis      
analyzing      
Appliances      
Application      
application binary interface      
application data      
application deployment      
application level      2nd
application optimization      
Application Provisioning      
application versus infrastructure      
application-level virtualization      
applications      
approach      
Approaches      
arcane      
architects      
architectural      
Architecture      
architecture centric      
Architectures      
Archives      
Array      2nd
Arrays      
aspects      
assembling      
assets      
assignment, dynamic      
assurance      
asymmetric      
attached storage      
Authentication      
authentication-authorization middleware      
Authorized access      
Automated      
automated provisioning      
AUTOMATIC      
automatic deployment      
automatic management      
automatic optimization      
automating      2nd 3rd
Automation      2nd 3rd
Autonomous      
Availability      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Backups      2nd 3rd
Bandwidth      2nd 3rd 4th
Base      
baseline level      
basic automated      
basic automated install      
basic provisioning      
batch      
batch jobs      
Best practices      2nd 3rd
billing      
binaries, application      
bit transfers      
blade server      
blades      2nd 3rd 4th 5th
Bluetooth      2nd
bootable      
Boundaries      
broadcast load      
buiding blocks      
build inefficiencies      
Building block      
building blocks      
Building Infrastructure Optimization      
Building Modules      
building optimization      
builds      
Business      
business continuity      
business level      
Campus      
CAP      
Capabilities      
Capacity      2nd 3rd
Central      
central data repository      
central version control      
centralized      
centralized pool      
Change      2nd
changes      
changing      
channel partners      
Chaos      
Chaotic      2nd
ChapNumber      
ChapNumberA      
ChapTitle      
ChapTitleA      
Characteristics      
chargeback      
checking      
Client      
Clients      
cloning, complete system      
Cluster      
cluster consolidation      
cluster grid      
cluster grids      
CLUSTERED      
Clustering      2nd 3rd 4th 5th
Code      
coexistence      
collection of      
command level      
COMMON      
Common language      
common platform      
common platforms      
commonly performed      
Communication      2nd
Compact disc      2nd
Comparison      
compatibility, operating system      
competitive      
Complete system      
complex software      
complexity      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
Compliance      2nd
complicated      
Component      
component centric      
Component level      
components      
comprehensive      
computational      
COMPUTE      
compute element      
compute intensive      
Computing      
conditions      
Confidentiality      
Configurability      
Configuration      
configuration of      
configurations      
Configuring      
conflicting      
conflicts      
Connected      2nd
Connections      
Consistent      
Consolidation      
Constraint      
Constraints      2nd
Construction      
constructive virtualization      
Consumers      
consumption      2nd 3rd 4th
container      
containers      2nd 3rd 4th 5th 6th 7th 8th 9th
Contention      2nd
Continuity      2nd 3rd
continuous delivery      
Control      
Control Center      
controlled      
controllers      
controlling      
Conventions      2nd 3rd
Coordination      
cost effective      
cost savings      
costs      2nd 3rd
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2020
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте