![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Here it is ... the bestseller now greatly expanded to reveal the
most important Cloud innovations for 2014 and revised in response
to reader requests and comments. This new, 29000-word edition
incorporates coverage of such late-breaking tools and programs as
IBM's SoftLayer Integration, Storwize V5000, PureFlex and PureData
for Analytics ... Microsoft's new "Cloud OS" for facilitating
hybrid installations ... Microsoft's Windows Azure Pack for
off-the-shelf, "cloud-in-a-box" implementation ... and Red Hat
CloudForms 3.0 and RHEV 3.3. For the first time, the book also
includes an eloquent introduction to the fundamentals and history
of the Hadoop platform: the heart of all Big Data processing in the
Cloud environment.
Backup and recovery are mission-critical DBA tasks, and it is critical that every Oracle professional develop a RMAN strategy that guarantees recoverability while minimizing unplanned downtime. RMAN is one of the world's most sophisticated backup and recovery tools. It is robust and complex with thousands of options. This landmark book demonstrates, by example, how to create a successful backup and recovery infrastructure using RMAN. This book also contains links to RMAN video tutorials and a download of working RMAN scripts to guide users through full automation of a backup strategy. Together, backup and recovery are the single most important combined DBA activity, and it is crucial that you master the RMAN and Data Pump Import utilities to protect against catastrophic data loss. Written by practicing Oracle DBAs with years of RMAN experience, this is a pragmatic approach to RMAN, focusing less on theory and more on real-world, practical RMAN tools, tips and techniques. This Oracle backup and recovery book is unique because it provides real-world examples on how to use RMAN and other tools to protect your mission critical data. Even with reliable mirrored disks, your important Oracle database is still at-risk from from software corruption, user error and hardware failures. This book details Oracle RMAN best practices and shows the best ways to minimize backup and recovery time, which is critical for maximizing system availability This is the definitive RMAN reference that guides you, step-by-step, through all of the techniques for Oracle backup and recovery, from simple cold backups to complex incremental backups. Experienced RMAN experts guide you through the installation, setup and configuration for a complete RMAN backup and recovery infrastructure using proven techniques and Oracle best practices. Best of all, you be given the opportunity to learn from supplemental video tutorials and working examples how to recover from every possible data scenario. This book has step-by-step checklists that you can follow to guide you through a complex recovery with minimal unplanned system outages. This is an indispensible RMAN reference for every professional DBA who needs to ensure that they understand every possible backup and recovery strategy. It also contains a download of working RMAN scripts to help you easily automate and monitor your RMAN backups.
A practical and fast-paced guide that gives you all the information you need to get up and running with Opsview. This book is for anyone interested in using Opsview as a potential monitoring solution or for those who are already running Opsview Core and who would like to improve on their setup by exploring the features of Pro and Enterprise. Some working knowledge of monitoring and Linux is assumed, and it is recommended to have an Opsview system at hand while reading, allowing you to immediately try out the features discussed.
As a network or system administrator, your primary responsibility is to ensure high availability of all managed IT services. There are a number of monitoring tools available; but these can be complicated and expensive, and may only monitor certain areas of your network. SolarWinds Server & Application Monitor is an intuitive, all-encompassing, yet cost effective, enterprise-level network monitoring service. A concise and practical, hands-on guide that will teach you how utilize SolarWinds SAM. It provides step-by-step tutorials to walk you through every feature, while teaching you how to tailor the product to your own network environment. This book will guide you through equipping your network devices and servers for SolarWinds SAM utilization. It will provide a sequential, hands-on overview of the product, and is suited for networks of all sizes, ranging from small businesses to larger enterprises. You will learn how to populate SolarWinds SAM with nodes, then classify and group nodes to tailor the product to your network environment. By doing so, you will benefit from key features such as automated alerts, traps, and reports. Each feature is explained in a practical and useful manner via tutorials and real-world examples to help you start monitoring your network quickly and efficiently, while keeping security implications in mind by applying enterprise-level best practices.
This book will give beginners an introduction to building voice-based applications on Android. It will begin by covering the basic concepts and will build up to creating a voice-based personal assistant. By the end of this book, you should be in a position to create your own voice-based applications on Android from scratch in next to no time. Voice Application Development for Android is for all those who are interested in speech technology and for those who, as owners of Android devices, are keen to experiment with developing voice apps for their devices. It will also be useful as a starting point for professionals who are experienced in Android application development but who are not familiar with speech technologies and the development of voice user interfaces. Some background in programming in general, particularly in Java, is assumed.
This book is a tutorial guide for new users that aims to help you understand the basics of and become accomplished with the use of R for quantitative finance. If you are looking to use R to solve problems in quantitative finance, then this book is for you. A basic knowledge of financial theory is assumed, but familiarity with R is not required. With a focus on using R to solve a wide range of issues, this book provides useful content for both the R beginner and more experience users.
A concise and practical guide to using SolarWinds Server & Application Monitor. If you are an IT professionals ranging from an entry-level technician to a more advanced network or system administrator who is new to network monitoring services and/or SolarWinds SAM, this book is ideal for you.
A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands. Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.
Operating Systems Interview Questions You'll Most Likely Be Asked is a perfect companion to stand ahead above the rest in today's competitive job market. Rather than going through comprehensive, textbook-sized reference guides, this book includes only the information required immediately for job search to build an IT career. This book puts the interviewee in the driver's seat and helps them steer their way to impress the interviewer. Includes: a) 200 Operating Systems Interview Questions, Answers and Proven Strategies for getting hired as an IT professional b) Dozens of examples to respond to interview questions c) 51 HR Questions with Answers and Proven strategies to give specific, impressive, answers that help nail the interviews d) 2 Aptitude Tests download available on www.vibrantpublishers.com
Control-Based Operating System Design describes the application of system- and control-theoretical methods to the design of computer operating system components. It argues that computer operating system components should not be first 'designed' and then 'endowed with control', but rather when possible conceived from the outset as controllers, synthesised and assessed in the system-theoretical world of dynamic models, and then realised as control algorithms. Doing so is certainly a significant perspective shift with respect to current practices in operating system design, but the payoff is significant too. In some sense, adopting the suggested attitude means viewing computing systems as cyber-physical ones, where the operating system plays the computational role, the physical elements are the managed resources, and the various (control) functionalities to be realised, interact and co-operate as a network. The book includes both a theoretical treatment of the usefulness of the approach, and the description of a complete implementation in the form of Miosix, a microcontroller kernel made available as free software.
Achieve the performance, scalability, and ROI your business needs What can you do at the start of a virtualization deployment to make things run more smoothly? If you plan, deploy, maintain, and optimize vSphere solutions in your company, this unique book provides keen insight and solutions. From hardware selection, network layout, and security considerations to storage and hypervisors, this book explains the design decisions you'll face and how to make the right choices. Written by two virtualization experts and packed with real-world strategies and examples, "VMware vSphere Design, Second Edition" will help you design smart design decisions.Shows IT administrators how plan, deploy, maintain, and optimize vSphere virtualization solutions Explains the design decisions typically encountered at every step in the process and how to make the right choices Covers server hardware selection, network topology, security, storage, virtual machine design, and more Topics include ESXi hypervisors deployment, vSwitches versus dvSwitches, and FC, FCoE, iSCSI, or NFS storage Find out the "why" behind virtualization design decisions and make better choices, with "VMware vSphere Design, Second Edition," which has been fully updated for vSphere 5.x.
Relational databases place heavy demands on their underlying hardware and many of these databases are mission-critical resources for multiple applications, where performance bottlenecks are immediately noticeable and often very costly to the business. Despite this, many database administrators are not very knowledgeable about server hardware. Many medium-to-large companies have completely separate departments that are responsible for hardware selection, configuration, and maintenance, and the DBA with no knowledge of hardware is often completely at their mercy. Likewise, many DBAs are also unaware of the performance implications of the various options and configurations for SQL Server, and the Operating System on which it is installed. Glenn Berry is a highly experienced Database Architect, teacher and SQL Server MVP, and his book is designed to provide the fundamental knowledge and resources you need to make intelligent choices about optimal installation and configuration of SQL Server hardware, operating system and the SQL Server RDBMS. With what you learn in this book, you'll be able to ensure that your SQL Server instances can handle gracefully the CPU, memory and IO workload generated by your applications, and that the operating system and SQL Server itself are installed, patched, and configured for maximum performance and reliability.
Learn the basics of how to use Windows 7 with easy to follow directions and color pictures guiding you through each step.
'A Concise Windows 8 Guide for Homes and Corporates' is a
screenshots enriched 'Must-Have' guide book especially written for
Home Users.
USB is likely the most successful communication interface in the history of computer systems, and is the de-facto standard for connecting computer peripherals. Micri m's C/USB-Device is a USB device stack designed specifically for embedded systems. Built from the ground up with Micri m's quality, scalability and reliability, it has gone through a rigorous validation process to comply with the USB 2.0 specification. The first part of this book describes the inner-workings of USB using Micri m's C/USB-Device stack as a reference. The second part demonstrates how the Renesas YRDKRX63N Demonstration Kit (sold separately) and Micri m's C/USB-Device stack can be used as the foundation to build a USB device that relies on a combination of proven hardware and software platforms. Renesas' ultra-low-power RX63N MCU is at the core of the YRDKRX63N board, which incorporates communication functions such as USB 2.0 full-speed (host or device) among others. The examples featured in this book include USB devices with the most basic functionality that will allow you to understand the USB concepts covered in the first part of the book and at the same time, they provide a framework to quickly build devices such as: - USB-to-serial adapter (Communications Device Class) - Mouse or keyboard (Human Interface Device Class) - Removable storage device (Mass Storage Class) - USB medical device (Personal Healthcare Device Class) - Custom device (Vendor Class)
This MCITP Windows 7 Exam Study Guide has excellent coverage of all the exam objectives in a systematic approach. So you can be confident that you're getting the instruction you need to take Microsoft's new MCITP exam (70-685) called the Windows 7 Enterprise Desktop Support Technician (EDST7). This book is packed with practical guidance and step-by-step exercises to reinforce critical skills. Over 350 screenshots and figures, as well as oustanding authors who brings real-world scenarios, comprehensive self assessments tests, and step-by-step instructions to put what you've learned in the context of actual job roles. Also includes a challenging Self Assessment tests at the end of the book to prepare you for exam day.
The first motivation for writing this book is to teach my
colleagues about RTOS (Real-Time Operating System) concepts and the
proprietary RTOS developed for our project by me. I realized that
the same material with some extension can be useful to most
embedded engineers who are beginners in learning about RTOS. I came
across many embedded engineers who are not comfortable to use
real-time operating system. A significant fraction of these people
have taken operating systems course during their undergraduate or
graduate studies The unease obviously even more aggravated for
those embedded engineers who do not take operating systems course
during their college level studies. I think this is the main reason
that some companies still use tricky, messy workarounds to solve
their scheduling problems in their simple and moderately complex
projects. The operating systems course the engineers studied during
their undergraduation is too broad which only cover theoretical
aspects of all kinds of systems, and mostly devoid of practical
training that students can not gain the ability to develop one
This book gives an overview of Cloud Computing and Virtualization. It discusses the issues in Computational Resource Allocation and does an extensive experiments to evaluate the performance of web servers hosted on virtual operating systems. As multiple operating systems run on a single physical server, and multiple servers are running in the data center all connected via high speed network links, at some point of time, one of the servers may be overloaded, while others may remain underutilized. This poses challenges related to distributing the load and to carry out the work perfectly by using load balancing algorithm over the virtual machines. This book tries to find out the insights to balance the load based on computational time parameter of the virtual machines. We have also tried to evaluate and compare the performance of the web servers on different virtualization softwares including Xen, OpenVZ and Linux Operating Systems. It also discusses few algorithms related to resource allocation using control theory concepts and distributed computing algorithms.
The goal of workload modeling is to predict a computer's workload well enough to design it correctly. A poor model will lead to degraded performance and user satisfaction. Analyzing logs from multiple real parallel computers uncovers several statistical features - locality of sampling, daily cycles, weekly cycles, self similarity and flurries - that are missing from current workload models. Their practical importance is demonstrated by two new kinds of scheduling algorithms - adaptive scheduling and shortest job backfill first scheduling - which achieve an average 10% bottom- line performance gain and 35% stability gain on the production workloads. The second part of this book presents a user based workload model. It identifies four stable user types and five stable session types. It then deduces model parameters, the distributions of the arrival and activity patterns for both users and sessions, their dependencies and temporal structure. The methodology and statistical toolset is explained to make it easier to reuse in other domains. The insights and practical advice provided will be of use to anyone building or operating a large-scale parallel computer.
This book contains 36 chapters and is structured to facilitate readers to grasp concepts, understand implementation procedures, learn command syntax, configuration files and daemons involved, and understand basic troubleshooting. The 36 chapters are divided into three key areas: UNIX Fundamentals, HP-UX System Administration and HP-UX Network Administration. These chapters cover topics that are on HP s recommended certification courses UNIX Fundamentals, System and Network Administration I, System and Network Administration II, and HP-UX for Experienced UNIX System Administrators as well as on official exam objectives list. 1.UNIX Fundamentals (chapters 1 to 6, and 22) covers the basics of UNIX and HP-UX. Most information is not specific to a particular UNIX flavor, rather, includes general UNIX concepts, file manipulation and security techniques, vi editor, shell and awk programming, basic commands and other essential topics. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration area. This is done purposely to provide readers with practical examples based on the knowledge they gain from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration (chapters 7 to 21) covers the HP-UX-specific system administration concepts and topics including server hardware information and mass storage stack; virtualization technologies and HP-UX installation; software and patch management; user and group administration; LVM and file system administration; EVFS and swap management; system shutdown and startup procedures; kernel configuration and management techniques; backup and restore functions; printer and print request management, job automation and process control; and system logging and performance monitoring. 3.HP-UX Network Administration (chapters 23 to 36) covers HP-UX network and security administration concepts and topics such as OSI and TCP/IP reference models; network hardware overview and LAN interface administration; IP subnetting and routing techniques; basic network testing and troubleshooting; internet services and sendmail; time synchronization (NTP) and resource sharing (NFS, AutoFS and CIFS) services; naming (DNS, NIS and LDAP) services and automated installation techniques; and high-availability concepts and system security tools and practices. Throughout the book figures, tables, screen shots and examples are given for explanation purposes. The book includes 863 exam review questions with answers.
Sexy Web Design is an easy-to-follow guide that reveals the secrets of how to build your own breathtaking web interfaces from scratch. You'll be guided through the entire process of creating a gorgeous, usable web site by applying the timeless principles of user-centered design. Even if you're short on design skills, with this book you'll be creating your own stunning web sites in no time at all. Throughout, the focus is on simple and practical techniques that anyone can use - you don't need to have gone to art school or have artistic flair to create stunning designs using the methods outlined in this book. The book's full-color layout and large format (8" x 10") make Sexy Web Design a pleasure to read. Master key web interface design principles Design amazing web interfaces from scratchCreate beautiful, yet functional, web sitesUnleash your artistic talentsAnd much more Who should read this book? Whether you're completely new to web design, a seasoned pro looking for inspiration, or a developer wanting to improve your sites' aesthetics, there's something for everyone here. How? Because instead of trying to cover every possible area of creating a web site, we've focused purely on the design stage; that is, everything that happens before a single line of code is written. However, great design is more than just aesthetics. Long before we open our graphics program of choice, we'll be conducting research, dealing with clients, responding to briefs, sketching out sitemaps, planning information architecture, moving from doodles to diagrams, exploring different ways of interactivity, and building upon design traditions. But ultimately, you'll be finding out how to create web sites that look drop-dead gorgeous.
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unifi ed Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fi fty articles packed into this book, it will be an essential reference for any Systems Administrator, whether you have years of experience or are just starting out.
For any organisation to be successful in an increasingly competitive and global working environment, it is essential that there is a clear understanding of all aspects of the business. Given that no two organisations are exactly alike, there is no definitive understanding of exactly what these aspects are as they will depend on the organisation's nature, size and so on. Some of the aspects of the business that must be considered include: process models, process descriptions, competencies, standards, methodologies, infrastructure, people and business goals. It is important that these different aspects of the business are not only understood, but also that they are consistent and congruent with one another. The creation of an effective Enterprise Architecture (EA) provides a means by which an organisation can obtain such an understanding. This book looks at the practical needs of creating and maintaining an effective EA within a twenty-first-century business through the use of pragmatic modelling. The book introduces the concepts behind enterprise architectures, teaches the modelling notation needed to effectively realise an enterprise architecture and explores the concepts more fully through a real-life enterprise architecture. |
You may like...
A C/OS-III for the Renesas RX62N
J Labrosse Jean, Kovalski Fabiano
Hardcover
R1,817
Discovery Miles 18 170
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,482
Discovery Miles 24 820
|