Data architecture

Results: 7882



#Item
321Computing / Internet / Content delivery network / Network architecture / Akamai Technologies / Internet service provider / Distributed data storage / Computer networking / Streaming / Hacking

1 Internet Structural Analysis by End-to-End Measurement NTT Communications

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-30 06:39:46
322Computing / Computer hardware / Computer memory / Computer architecture / Database management systems / Computer storage devices / Dynamic random-access memory / Cache / In-memory database / Storage area network / Computer data storage / File server

The Case for RAMClouds: Scalable High-Performance Storage Entirely in DRAM

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2011-02-02 19:01:43
323

2016 Class Weekend Schedule SOFTWARE ENGINEERING SPRING 2016 E E 382C Software Architecture| Dr. Barber E E 382V Data Engineering| Dr. Miranker

Add to Reading List

Source URL: lifelong.engr.utexas.edu

- Date: 2016-03-04 15:11:01
    324System software / Computer architecture / Software / Network file systems / File system / Server / XFS / Inode / Directory services

    Secure Untrusted Data Repository (SUNDR) Jinyuan Li, Maxwell Krohn∗, David Mazi`eres, and Dennis Shasha NYU Department of Computer Science Abstract SUNDR is a network file system designed to store data

    Add to Reading List

    Source URL: nil.csail.mit.edu

    Language: English - Date: 2015-01-05 06:37:33
    325Computing / Computer hardware / Information science / Computer storage devices / Data management / Computer peripherals / Computer architecture / Computer data storage / Pure Storage / Solid-state drive / Data storage device / Cloud computing

    BY MIT TECHNOLOGY REVIEW CUSTOM SPONSORED BY PURE STORAGE IT Transformation Trends:

    Add to Reading List

    Source URL: s3.amazonaws.com

    Language: English - Date: 2016-06-06 10:53:30
    326Computing / Network architecture / Computer networking / Crime prevention / Cryptography / National security / Network segmentation / Virtual firewall / Data center / Check Point / Computer security / Information security

    Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

    Add to Reading List

    Source URL: www.nttsecurity.com

    Language: English - Date: 2016-07-26 13:04:40
    327Real estate / Building information modeling / Construction / Computer-aided design / Data modeling / Architecture

    SXC Local Conference Agenda

    Add to Reading List

    Source URL: www.epbl.ee

    Language: English - Date: 2014-08-26 01:19:30
    328Computing / Cryptography / Cryptographic protocols / Network architecture / IPsec / Encryption / Information Security Group / Data

    Jean Paul Degabriele Information Security Group Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK

    Add to Reading List

    Source URL: www.isg.rhul.ac.uk

    Language: English - Date: 2012-04-07 15:14:14
    329Computing / Computer architecture / System software / Computer data storage / Telecommunications engineering / Nexsan / Storage virtualization / ISCSI / Storage area network / Hyper-V / Windows Server / Logical volume management

    Nexsan Accelerates Cloud Business Models to Improve Operating Savings

    Add to Reading List

    Source URL: openbench.com

    Language: English - Date: 2012-03-13 08:13:15
    330Multiplexing / Optics / Photonics / Optical devices / Network architecture / Technology / Fiber-optic communications / Wavelength-division multiplexing / Optical amplifier / Bandwidth / Waveguide / Multiplexer

    Data Transmission Through a 1092-Channel Two Dimension Array Wavelength Multiplexer UCSD Photonics

    Add to Reading List

    Source URL: psilab.ucsd.edu

    Language: English - Date: 2007-11-01 15:03:00
    UPDATE