You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Until now, the only way to capture, store, and effectively retain constantly growing amounts of enterprise data was to add more disk space to the storage infrastructure, an approach that can quickly become cost-prohibitive as information volumes continue to grow and capital budgets for infrastructure do not. In this IBM® Redbooks® publication, we introduce data deduplication, which has emerged as a key technology in dramatically reducing the amount of, and therefore the cost associated with storing, large amounts of data. Deduplication is the art of intelligently reducing storage needs through the elimination of redundant data so that only one instance of a data set is actually stored. Ded...
This IBM® Redbooks® publication provides an introduction to PowerVMTM virtualization technologies on Power System servers. PowerVM is a combination of hardware, firmware, and software that provides CPU, network, and disk virtualization. These are the main virtualization technologies: POWER7, POWER6, and POWER5 hardware POWER Hypervisor Virtual I/O Server Though the PowerVM brand includes partitioning, management software, and other offerings, this publication focuses on the virtualization technologies that are part of the PowerVM Standard and Enterprise Editions. This publication is also designed to be an introduction guide for system administrators, providing instructions for these tasks: Configuration and creation of partitions and resources on the HMC Installation and configuration of the Virtual I/O Server Creation and installation of virtualized partitions Examples using AIX, IBM i, and Linux This edition has been updated with the latest updates available and an improved content organization.
Class-tested and coherent, this textbook teaches classical and web information retrieval, including web search and the related areas of text classification and text clustering from basic concepts. It gives an up-to-date treatment of all aspects of the design and implementation of systems for gathering, indexing, and searching documents; methods for evaluating systems; and an introduction to the use of machine learning methods on text collections. All the important ideas are explained using examples and figures, making it perfect for introductory courses in information retrieval for advanced undergraduates and graduate students in computer science. Based on feedback from extensive classroom experience, the book has been carefully structured in order to make teaching more natural and effective. Slides and additional exercises (with solutions for lecturers) are also available through the book's supporting website to help course instructors prepare their lectures.
Cork oak has historically been an important species in the western Mediterranean—ecologically as a canopy or “framework” tree in natural woodlands, and culturally as an economically valuable resource that underpins local economies. Both the natural woodlands and the derived cultural systems are experiencing rapid change, and whether or not they are resilient enough to adapt to that change is an open question. Cork Oak Woodlands on the Edge provides a synthesis of the most up-to-date, scientific, and practical information on the management of cork oak woodlands and the cultural systems that depend on cork oak. In addition, Cork Oak Woodlands on the Edge offers ten site profiles written ...
A cumulative list of works represented by Library of Congress printed cards.
The six-volume set LNCS 8579-8584 constitutes the refereed proceedings of the 14th International Conference on Computational Science and Its Applications, ICCSA 2014, held in Guimarães, Portugal, in June/July 2014. The 347 revised papers presented in 30 workshops and a special track were carefully reviewed and selected from 1167. The 289 papers presented in the workshops cover various areas in computational science ranging from computational science technologies to specific areas of computational science such as computational geometry and security.
MicroRNA Protocols provides diverse, novel, and useful descriptions of miRNAs in several species, including plants, worms, flies, fish, chicks, mice, and humans. These include some useful adaptations and applications that could be relevant to the wider research community who are already familiar with the identification of miRNAs. This volume will stimulate the reader to explore diverse ways to understanding the mechanism in which miRNAs facilitate the molecular aspects of the biomedical research.