Listing 1 - 10 of 114 | << page >> |
Sort by
|
Choose an application
Choose an application
Deep dive into the unified, distributed storage system in order to provide excellent performance About This Book Leverage Ceph's advanced features such as erasure coding, tiering, and Bluestore Solve large-scale problems with Ceph as a tool by understanding its strengths and weaknesses to develop the best solutions A practical guide that covers engaging use cases to help you use advanced features of Ceph effectively Who This Book Is For If you are a developer and an administrator who has deployed a Ceph cluster before and are curious about some of the most advanced features in order to improve performance then this book is for you What You Will Learn Know when and how to use some of Ceph's advanced new features Set up a test cluster with Ansible and some virtual machines using VirtualBox and Vagrant Develop novel solutions to massive problems with librados and shared object classes. Choose intelligent parameters for an erasure coded pool and set it up. Configure the Bluestore settings and see how they interact with different hardware configurations. Keep Ceph running through thick and thin with tuning, monitoring and disaster recovery advice. In Detail Mastering Ceph covers all that you need to know to use Ceph effectively. Starting with design goals and planning steps that should be undertaken to ensure successful deployments, you will be guided through to setting up and deploying the Ceph cluster, with the help of orchestration tools. Key areas of Ceph including Bluestore, Erasure coding and cache tiering will be covered with help of examples. Development of applications which use Librados and Distributed computations with shared object classes are also covered. A section on tuning will take you through the process of optimisizing both Ceph and its supporting infrastructure. Finally, you will learn to troubleshoot issues and handle various scenarios where Ceph is likely not to recover on its own. By the end of the book, you will be able to successfully deploy and operate a resilient high performance Ceph cluster. Style and Approach A practical guide which has each chapter explaining the concept, sharing tips and tricks and a use case to implement the most powerful features of Ceph
Choose an application
Choose an application
CD-ROMs --- Information storage and retrieval systems --- Law
Choose an application
Hauptbeschreibung This study intends to investigate the status of TANROADS Information Systems and the services offered in Dar-es-salaam and Mwanza. A descriptive design is used as a tool for gathering relevant information to meet the study objectives. Hence, the study critically examines the range of services and the gap experienced in service provision. The study deployed a random sampling procedure to arrive at ist findings, i.e., achieving a representative sample from the targeted population from which the data were collected and analysing it by applying descriptive statistics. The finding
Transportation --- Information storage and retrieval systems --- Data processing. --- Transportation.
Choose an application
Neural networks are increasingly being used in real-world business applications and, in some cases, such as fraud detection, they have already become the method of choice. Their use for risk assessment is also growing and they have been employed to visualise complex databases for marketing segmentation. This boom in applications covers a wide range of business interests — from finance management, through forecasting, to production. The combination of statistical, neural and fuzzy methods now enables direct quantitative studies to be carried out without the need for rocket-science expertise.This book reviews the state-of-the-art in current applications of neural-network methods in three important areas of business analysis. It includes a tutorial chapter to introduce new users to the potential and pitfalls of this new technology.
Choose an application
This book describes the construction of algebraic models which represent the operations of the double-entry accounting system. It presents a novel and comprehensive treatment of the subject and utilizes the methods and tools of abstract algebra, including automata, graph theory and monoids.
Information storage and retrieval systems --- Accounting --- Mathematical models. --- Data processing.
Choose an application
This edited collection provides a cutting edge overview of issues of key concern for information professionals providing information services in corporate environments. Corporate information professionals serving the workplace rather than learning communities or the general public face specific challenges and demands, from providing competitive intelligence to managing information in a global environment. International contributors working across a variety of sectors pinpoint the key topics facing the corporate information professionals today and share their experiences and expertise.
Information storage and retrieval systems --- Knowledge management. --- Information technology. --- Business. --- Corporate libraries.
Choose an application
MANAGING CUSTOMER RELATIONSHIPSA Strategic Framework Praise for the first edition: ""Peppers and Rogers do a beautiful job of integrating actionable frameworks, the thinking of other leaders in the field, and best practices from leading-edge companies.""-Dr. Hugh J. Watson, C. Herman and Mary Virginia Terry Chair of Business Administration, Terry College of Business, University of Georgia ""Peppers and Rogers have been the vanguard for the developing field of customer relationship management, and in this book, they bring their wealth of experience and
Customer relations --- Consumers' preferences. --- Relationship marketing. --- Information storage and retrieval systems --- Management. --- Marketing.
Choose an application
"When "metadata" became breaking news, appearing in stories about surveillance by the National Security Agency, many members of the public encountered this once-obscure term from information science for the first time. Should people be reassured that the NSA was "only" collecting metadata about phone calls -- information about the caller, the recipient, the time, the duration, the location -- and not recordings of the conversations themselves? Or does phone call metadata reveal more than it seems? In this book, Jeffrey Pomerantz offers an accessible and concise introduction to metadata. In the era of ubiquitous computing, metadata has become infrastructural, like the electrical grid or the highway system. We interact with it or generate it every day. It is not, Pomerantz tell us, just "data about data." It is a means by which the complexity of an object is represented in a simpler form. For example, the title, the author, and the cover art are metadata about a book. When metadata does its job well, it fades into the background; everyone (except perhaps the NSA) takes it for granted. Pomerantz explains what metadata is, and why it exists. He distinguishes among different types of metadata -- descriptive, administrative, structural, preservation, and use -- and examines different users and uses of each type. He discusses the technologies that make modern metadata possible, and he speculates about metadata's future. By the end of the book, readers will see metadata everywhere. Because, Pomerantz warns us, it's metadata's world, and we are just living in it"--
Metadata. --- Information organization. --- Information storage and retrieval --- Organization of information --- Information science --- Information storage and retrieval systems --- Data about data --- Meta-data --- Information organization --- Metadata --- E-books --- INFORMATION SCIENCE/General --- COMPUTER SCIENCE/General
Listing 1 - 10 of 114 | << page >> |
Sort by
|