|
|
|
|
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and... | | Linux HPC Cluster InstallationFew people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more... | | Upgrading and Repairing ServersServers are the heart and soul of businesses today. Scott and Jarret tackle the confusing array of server design form factors, power supplies, rack mounts, dual processor setups, RAID, blade technology, InfiniBand, clustering, load balancing and replication. The authors address these topics from an OS-neutral standpoint, focusing solely on how... |
|
|
|
Linux on HP Integrity ServersCompanies are increasingly turning to Linux on HP Integrity systems for high-performance computing, large enterprise and database applications, and 64-bit application development. However, Linux administration in the HP Integrity's Itanium® 2-based environment is significantly different than on conventional IA-32 platforms. Now, there's a... | | Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
... | | |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 |