| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996466741903316 |
|
|
Autore |
Cheng Songbai |
|
|
Titolo |
Safety of sodium-cooled fast reactors : particle-bed-related phenomena in severe accidents / / Songbai Cheng, Ruicong Xu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Gateway East, Singapore : , : Springer, , [2021] |
|
©2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (313 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910140740503321 |
|
|
Autore |
Buffington Jason <1970-> |
|
|
Titolo |
Data protection for virtual data centers [[electronic resource] /] / Jason Buffington |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : Wiley Technology Pub., c2010 |
|
|
|
|
|
|
|
ISBN |
|
1-282-70821-X |
9786612708213 |
1-118-25576-3 |
0-470-90823-8 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (530 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Virtual computer systems |
Data protection - Management |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Data Protection for Virtual Data Centers; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: What Kind of Protection Do You Need?; In the Beginning, There Were Disk and Tape; Overview of Availability Mechanisms; Overview of Protection Mechanisms; Summary; Chapter 2: Data Protection by the Numbers; The Technical Metrics: RPO and RTO; Business Metrics: RA and BIA; Risk Mitigation: Fixing It in Advance; Total Cost of Ownership; Return on Investment; Turning IT Needs into Corporate Initiatives; Summary; Chapter 3: The Layers of Data Protection |
What Data Looks Like from the Server's PerspectiveHardware-centric Protection; File-centric Protection; Application-centric Protection; Where to Store Your Protected Data; Summary; Chapter 4: Better Backups; Solving the Problem from the Inside Out; Volume Shadow Copy Service (VSS); The Windows Server Backup Utility; System Center Data Protection Manager; Summary; Chapter 5: File Services; File System Availability and Protection in Windows Server; What Is the Distributed File System?; Enabling DFS on Your Windows File Servers; Getting Started with DFS-N; Getting Started with DFS-R |
Mixing DFS-R and DFS-N for Real-World SolutionsDFS Enhancements in Windows Server 2008 R2; Summary; Chapter 6: Windows Clustering; Overview of Clustering in Windows Server 2008 and 2008 R2; Building Your First Cluster; How Failover Clustering Works; Quorum Models; Windows Server 2008 R2 Failover Clustering; Summary; Chapter 7: Microsoft Exchange; Exchange within Microsoft Cluster Services; Exchange 2007 Continuous Replication; Exchange 2010 Database Availability; Summary; Chapter 8: Microsoft SQL Server; SQL Server Built-in Resiliency; SQL Failover Clustering; SQL Database Mirroring |
SQL Database FailoverSQL Log Shipping and Replication; Which SQL Server HA Solution Should You Choose?; Backing Up SQL Server; Summary; Chapter 9: Virtualization; Virtualization Changes Everything; Protecting Virtual Machines; Availability of Virtual Machines; How Virtualization Makes Data Protection and Availability Better; Disaster Recovery Staging; Bare Metal Recovery; Server Rollback; Summary; Chapter 10: Management and Deployment; Well-Managed Systems for Higher Uptime; Large Enterprise Deployment and Manageability; Virtualization Management; Midsized Management: Physical and Virtual |
SummaryChapter 11: Monitoring Systems; The Need for Monitoring; Challenges in Monitoring; Enterprise End-to-End Monitoring; Monitoring the Health and Performance of Key Workloads; Monitoring in Midsized Organizations Using System Center Essentials; Summary; Chapter 12: Business Continuity and Disaster Recovery; What Makes BC and DR So Special?; Get Your Data Out of the Building; BC = DR + HA; BC/DR Solution Alternatives; Using Virtualization to Achieve Business Continuity; Planning for BC/DR to Get Better Backups and Availability; Summary; Appendix: Links and Resources; Microsoft Software |
Topical Resources |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Essential information on how to protect data in virtual environments! Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data protection technologies available today, see how to adapt to virtualization, and more. The book uses a ""good, better, best"" approach, explo |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910787447003321 |
|
|
Autore |
Borgman Christine L. <1951-> |
|
|
Titolo |
Big data, little data, no data : scholarship in the networked world / / Christine L. Borgman |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
©2015 |
|
Cambridge, Massachusetts : , : The MIT Press, , [2015] |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-262-32787-2 |
0-262-52991-2 |
0-262-32786-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Communication in learning and scholarship - Technological innovations |
Research - Methodology |
Research - Data processing |
Information technology |
Information storage and retrieval systems |
Cyberinfrastructure |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Provocations -- What are data? -- Data scholarship -- Data diversity -- Data scholarship in the sciences -- Data scholarship in the social sciences -- Data scholarship in the humanities -- Sharing, releasing, and reusing data -- Credit, attribution, and discovery of data -- What to keep and why to keep them. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
An examination of the uses of data within a changing knowledge infrastructure, offering analysis and case studies from the sciences, social sciences, and humanities. |
"'Big Data' is on the covers of Science, Nature, the Economist, and Wired magazines, on the front pages of the Wall Street Journal and the New York Times. But despite the media hyperbole, as Christine Borgman points out in this examination of data and scholarly research, having the right data is usually better than having more data; little data can be just as valuable as big data. In many cases, there are no data -- |
|
|
|
|
|
|
|
|
|
|
because relevant data don't exist, cannot be found, or are not available. Moreover, data sharing is difficult, incentives to do so are minimal, and data practices vary widely across disciplines. Borgman, an often-cited authority on scholarly communication, argues that data have no value or meaning in isolation; they exist within a knowledge infrastructure -- an ecology of people, practices, technologies, institutions, material objects, and relationships. After laying out the premises of her investigation -- six "provocations" meant to inspire discussion about the uses of data in scholarship -- Borgman offers case studies of data practices in the sciences, the social sciences, and the humanities, and then considers the implications of her findings for scholarly practice and research policy. To manage and exploit data over the long term, Borgman argues, requires massive investment in knowledge infrastructures; at stake is the future of scholarship." |
|
|
|
|
|
| |