نتایج جستجو برای: host storage
تعداد نتایج: 394978 فیلتر نتایج به سال:
Advanced networking technology has led to the genesis of the storage area network model, where host servers can access storage as a service from various devices connected to the network. While the initial approach to storage area networks has involved specialized networking technology, the emergence of Gigabit Ethernet technology has raised the question of whether we can use commodity IP networ...
vampirolepis nana is the most common cestode in humans especially children. domestic mice and rats can serve as definitive hosts for v. nana. confusion exists over the species status and host-specificity of this tapeworm. in a previous study done by the same authors it was found that the egyptian human isolates of v. nana could be used to infect mice for experimental work. eggs in human feces a...
This memo describes a snapshot of the reasoning behind a proposed new namespace, the Host Identity namespace, and a new protocol layer, the Host Identity Protocol (HIP), between the internetworking and transport layers. Herein are presented the basics of the current namespaces, their strengths and weaknesses, and how a new namespace will add completeness to them. The roles of this new namespace...
VMware ESX enables multiple hosts to share the same physical storage reliably through its highly optimized storage stack and VMware Virtual Machine File System (VMFS). Centralized storage of virtual machines using VMFS provides more control and flexibility. It also enables such unique virtualization capabilities as live migration (VMware VMotion), VMware Distributed Resource Scheduler, VMware H...
The almond moth, Cadra cautella (Walker), is a common storage pest known to infest a wide range of dried plant materials, and it has been recorded from a warehouse in Florida during storage of dried passion-flower ( Passiflora incarnata L.) and dried saw palmetto berries Serenoa repens (Bartram) Small. Its status as a pest of stored saw palmetto was confirmed by trapping in a second warehouse u...
Cloud-based storage services, such as Wuala, and password managers, such as LastPass, are examples of socalled host-proof web applications that aim to protect users from attacks on the servers that host their data. To this end, user data is encrypted on the client and the server is used only as a backup data store. Authorized users may access their data through client-side software, but for eas...
We report microporous carbon nanosheets containing numerous redox active heteroatoms fabricated from exfoliated waste coffee grounds by simple heating with KOH for pseudocapacitive charge storage. We found that various heteroatom combinations in carbonaceous materials can be a redox host for lithium ion storage. The bio-inspired nanomaterials had unique characteristics, showing superior electro...
To satisfy increasing storage demands in both capacity and performance, industry has turned to multiple storage technologies, including Flash SSDs and SMR disks. These devices employ a translation layer that conceals the idiosyncrasies of their mediums and enables random access. Device translation layers are, however, inherently constrained: resources on the drive are scarce, they cannot be ada...
Hardware consolidation in the datacenter occasionally leads to scalability bottlenecks due to the heavy utilization of critical resources, such as the shared network bandwidth. Hostside caching on durable media is already applied at the block level in order to reduce the load of the storage backend. However, block-level caching is often criticized for added overhead, and restricted data sharing...
Along with the introduction of HTML5 a new data storage technique, Web Storage, has been added to browsers. This technique stores larger amounts of data for an extended period of time on a client system. This technology does not (as of this writing) have a fully implemented interface to support end user control. The authors interest is modeling the use of Web Storage to store illicit data. The ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید