X
Browse RFP templates
Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the success of your software selection project.
Browse Now


Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 disk write cache


In-Memory Analytics: A Multi-Dimensional Study
The primary bottleneck to high-performance multidimensional analysis has been slow hard drive speed—the time it takes for data to be transferred from disk

disk write cache  issues with conventional OLAP: disk space requirements and input-output (I/O).  Traditionally, multi-dimensional data for analysis is stored on hard drive as special—often proprietary—structures, commonly referred to as cubes. Cubes present a multi-dimensional perspective of a business and are typically built from several data sources. As the volume of business data grows, storage requirements for cubes also grow. The cubic puzzle has two pieces: the update process (periodic process to keep cubes

Read More


Browse RFP templates

Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the succes of your software selection project.

Browse Now
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » disk write cache

More Efficient Virtualization Management: Templates


Historically, IT administrators have provisioned new servers with every new application, resulting in a large number of servers with utilization rates of 10 to 15 percent or less, commonly known as server sprawl. Server sprawl is responsible for a range of costs, including infrastructure, hardware, software, and management costs. So why hasn’t hardware virtualization solved your server sprawl issues yet?

disk write cache  gigabytes of a complete disk image. The template-based architecture makes updates much less intrusive than a normal OS or application update, especially large scale update roll-outs. Templates are also provisioned and updated on-line, without any downtime or restarting the machine, which is important for any production level application. Summary Virtuozzo template-based software deployment provides a number of advantages including: Consolidated OS and Application Management Virtuozzo templates Read More

The 2008 Handbook of Application Delivery: A Guide to Decision Making


IT organizations can no longer manage networks in isolation from the applications they support, requiring a shift from focusing on devices to a focus on performance. But a number of factors complicate the task of ensuring acceptable application performance, including the lack of visibility into application performance. Learn tips to plan, optimize, manage, and control your application performance and improve delivery.

disk write cache  memory rather than on disk. As a result, the processing required for compression and decompression introduces only a small amount of delay, allowing the technique to be applied to real-time, streaming data. Congestion Control The goal of congestion control is to ensure that the sending device does not transmit more data than the network can accommodate. To achieve this goal, the TCP congestion control mechanisms are based on a parameter referred to as the congestion window. TCP has multiple mechanisms to Read More

Your Guide to Evaluating Data Protection Solutions


Chances are, if you’re backing up your data, you’re using backup tape as your solution. But advances in data management technologies are making disk-to-disk (D2D) backup a vital component of any sane data protection strategy. In fact, D2D backup provides answers to the challenges threatening traditional tape backup strategies. Find out how to evaluate the different advanced data protection solutions available on the market today.

disk write cache  management technologies are making disk-to-disk (D2D) backup a vital component of any sane data protection strategy. In fact, D2D backup provides answers to the challenges threatening traditional tape backup strategies. Find out how to evaluate the different advanced data protection solutions available on the market today. Read More

The Agentless Backup/Recovery Architecture: How It Works to Reduce Costs, Bolster Security, and Simplify Scaling in Remote Office Environments


IT managers today face plenty of problems when it comes to protecting remote office data—problems that agentless architecture could eliminate. Many organizations outsource their data protection, which can be costly. But an agentless architecture disk-to-disk (D2D) software solution can offer your business bottom-line benefits that range from lower administrative costs to pay-as-you-grow scalability and increased security.

disk write cache  But an agentless architecture disk-to-disk (D2D) software solution can offer your business bottom-line benefits that range from lower administrative costs to pay-as-you-grow scalability and increased security. Read More

Supply Chain Management 101


I covered the basics of ERP previously, and thought I'd move on to supply chain management (SCM), which we're also featuring in tomorrow's TEC Newsletter (go to Newsletter archives), with lots of white paper goodness, to boot. So, What is SCM? Supply chain management (SCM) systems coordinate the movement of products and services from suppliers to customers (including

disk write cache   Read More

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)


DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Read this white paper to find out all of the scary details about these attacks and what you can do to prevent them.

disk write cache  DDoS, cache poisoning, footprinting, DNS security, DDoS attack, distributed denial-of-service, network attack, IT attack, Dyn, managed DNS, Dyn white paper Read More

Deduplication Comes of Age


The capacity of today’s storage systems is increasing at an astonishing rate. But the truth is: the more storage you have, the more you use. So, how do you create an efficient data storage system? And how much space can it really save you? Advanced single instance storage (A-SIS) deduplication can reduce storage consumption up to 95 percent—helping you conserve disk space, while keeping your system overhead low.

disk write cache  95 percent—helping you conserve disk space, while keeping your system overhead low. Read More

Acronis


Acronis provides software for scalable storage management and disaster recovery. The company’s technology includes disk imaging and disk management. Its central product is Acronis True Image.

disk write cache  The company’s technology includes disk imaging and disk management. Its central product is Acronis True Image. Read More

How Charismatic Is Your ERP System?


While conducting “research” for another project, I stumbled across Max Weber’s notion of classification of authority, which was news to me, as is most serious Western thought. According to Weber, there are three types of authority: 1. Charismatic 2. Traditional 3. Legal Weber defined charismatic authority as being derived primarily from, well, charisma, or personal magnetism.

disk write cache  Charismatic Is Your ERP System? While conducting “research” for another project, I stumbled across Max Weber’s notion of classification of authority , which was news to me, as is most serious Western thought. According to Weber, there are three types of authority: 1. Charismatic 2. Traditional 3. Legal Weber defined charismatic authority as being derived primarily from, well, charisma, or personal magnetism. Examples of leaders that embody charismatic authority include Barack Obama, Ronald Read More

PeopleSoft 8 Launched - Anything to Write Home About?


PeopleSoft, once a high flyer owing to its congenial culture and slick ERP product, has unveiled a number of new, possibly revolutionary enterprise applications that it hopes will help it end a protracted dry season and put it back on the ERP top chart. The company has invested two years and over a half billion dollars to develop the product. It has now emerged with a new platform, a new set of products and a new attitude of lambasting competition.

disk write cache  8 Launched - Anything to Write Home About? PeopleSoft 8 Launched - Anything to Write Home About? P.J. Jakovljevic - September 7, 2000 Event Summary According to a press release from July 11, PeopleSoft Inc., a leading business applications provider, launched PeopleSoft 8, a new generation of pure Internet e-business applications offering browser-based access and open integration across enterprise boundaries. PeopleSoft claims to have completely rewritten its applications for the Internet. The Read More

Mobilizing Change


It's not news that people are resistant to change. Inertia, one of the rules of the universe, applies to people as well as to objects. Many organizations, seeking to improve performance, have come unstuck by under-estimating the amount of resistance that will be offered by people. This article presents a method of mobilizing change that takes the resistance to change into account.

disk write cache  Change People Are Resistant to Change It's not news that people are resistant to change. Inertia, one of the rules of the universe, applies to people as well as to objects. Many organizations, seeking to improve performance, have come unstuck by under-estimating the amount of resistance that will be offered by people. Sometimes the resistance is active, deliberately undermining the efforts of those implementing the change. Sometimes the resistance is passive, where people mouth the right words Read More

PC Encryption: Eyes Wide Open


While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier.

disk write cache  Wide Open : Full disk encryption (Wikipedia) PC Encryption; Eyes Wide Open Full Disk Encryption is also known as : Based Full Disk Encryption , Best Full Disk Encryption , Checkpoint Full Disk Encryption , Data Security , Data Security Company , Data Security Software , Data Security Software Reviews , Data Server Security , Debian Full Disk Encryption , Endpoint Full Disk Encryption , Enterprise Data Security , Fedora Full Disk Encryption , Free Full Disk Encryption , Freebsd Full Disk Encryption , Full Read More

OS SmackDown!


In the latest escalation in the battle between Windows and Linux, directions on how to replace each with the other have been published on the Web by their respective champions.

disk write cache  2000/NT4 on the newly-freed-up disk drive. Not to be outdone, Linux-philes have countered by publishing instructions on how to remove a Windows OS and replace it with Linux. To close the circle, Paul Ferris, Editor at Linux Today, highlighted the silliness by publishing his own mostly-joking piece on how to uninstall both Windows and Linux. (His directions lead to a wiped out disk drive, of course.) Market Impact Alone, these documents will have minimal market impact, except to provide fodder for the Read More