You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
IBM® zEnterprise® Data Compression (zEDC) capability and the Peripheral Component Interconnect Express (PCIe or PCI Express) hardware adapter called zEDC Express were announced in July 2013 as enhancements to the IBM z/OS® V2.1 operating system (OS) and the IBM zEnterprise EC12 (zEC12) and the IBM zEnterprise BC12 (zBC12). zEDC is optimized for use with large sequential files, and uses an industry-standard compression library. zEDC can help to improve disk usage and optimize cross-platform exchange of data with minimal effect on processor usage. The first candidate for such compression was the System Management Facility (SMF), and support for basic sequential access method (BSAM) and queu...
IBM® zEnterprise® Data Compression (zEDC) capability and the Peripheral Component Interconnect Express (PCIe or PCI Express) hardware adapter called zEDC Express were announced in July 2013 as enhancements to the IBM z/OS® V2.1 operating system (OS) and the IBM zEnterprise EC12 (zEC12) and the IBM zEnterprise BC12 (zBC12). zEDC is optimized for use with large sequential files, and uses an industry-standard compression library. zEDC can help to improve disk usage and optimize cross-platform exchange of data with minimal effect on processor usage. The first candidate for such compression was the System Management Facility (SMF), and support for basic sequential access method (BSAM) and queu...
None
Digital business has been driving the transformation of underlying IT infrastructure to be more efficient, secure, adaptive, and integrated. Information Technology (IT) must be able to handle the explosive growth of mobile clients and employees. IT also must be able to use enormous amounts of data to provide deep and real-time insights to help achieve the greatest business impact. This IBM® Redbooks® publication addresses the IBM Mainframe, the IBM z13TM. The IBM z13 is the trusted enterprise platform for integrating data, transactions, and insight. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured fro...
None
Examining manuscript illumination in Amiens in its historical and socio-economic context, the author pinpoints the artistic interchange between France and Flanders.
After 9/11, the most acute terrorist threats came from Osama bin Laden's al-Qaeda, which had orchestrated large, complex attacks from remote caves in Afghanistan. Today, Bin Laden is dead. The core of al-Qaeda as we knew it has been largely dismantled. Al-Qaeda affiliates in Yemen, Africa, and Syria have filled the void. At the same time, new terror groups like ISIS present an immediate and different kind of threat to the United States and others, both here and abroad. While the threat of major aviation attacks still remains a top concern for American counterterrorism officials, the tactics employed by these groups have broadened. Groups like ISIS, Al-Shabaab, and al-Qaeda in the Arabian Pen...
This book analyses collaborative activities across the visual arts to show the power of non-verbal rhetoric in the Middle Ages.
This title, dedicated to the memory of Caroline Villers, is the proceedings of a conference in London in 2005.