• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 6
  • 4
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 25
  • 5
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

MAGNETIC TAPE CARE & RESTORATION

Wheeler, Jim 10 1900 (has links)
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California / For the past thirty years, many people around the world have been engaged in studies to determine how long tape will last. We have learned how to extend the life of tapes but no one has come up with a method for predicting the life of a tape. This paper will summarize the present-day recommended practices for tape care and storage and will also describe the most common tape problems and how to overcome them. The most common problem with playing an old tape is finding a machine to play it. Machine obsolescence is probably a bigger problem than tape degradation.
2

Efficient Bare Metal Backup and Restore in OpenStack Based Cloud InfrastructureDesign : Implementation and Testing of a Prototype

TADESSE, ADDISHIWOT January 2016 (has links)
No description available.
3

Balancing the trinity the fine art of conflict termination /

Strednansky, Susan E. January 1900 (has links)
Thesis--School of Advanced Airpower Studies, Maxwell Air Force Base, Ala., 1994-95. / Title from title screen (viewed Nov. 7, 2003). "February 1996." Includes bibliographical references.
4

Predikce hodnot tíhových veličin na základě terestrických měření a digitálního modelu terénu / Prediction of gravity quantities values based on the terrestrial measurements and digital elevation model

Letko, Ivan January 2013 (has links)
The main objective of this master thesis is random equipartition concentration of measured gravimetric points in the area of interest pursuant by digital terrain model. Remove-Compute-Restore method was used for this purpose. In this thesis normal acceleration of gravity, topographic effect and Faye anomaly were subtracted from measured gravity. The result is Bouguer anomaly with general topographic effect which is interpolated for concentration points. We obtained predicated values of gravity after the restoration of subtracted effects. The main result of the thesis is the map of real gravity and precision evaluation of used method. Furthermore, the reductions of gravity, interpolation methods in programme ArcGIS, Remove-Compute-Restore method and the term of digital terrain model are explained in the thesis.
5

Balancing the Trinity the Fine Art of Conflict Termination /

Strednansky, Susan E. 23 March 1998 (has links)
Thesis (M.M.A.S)--School of Advanced Airpower Studies, 1995. / Subject: Conflict termination during MOOTW. Cover page date: June 1995. Vita. Includes bibliographical references.
6

Mitteilungen des URZ 2/2009

Anders, Jörg, Ehrig, Matthias, Riedel, Wolfgang, Ziegler, Christoph 13 May 2009 (has links)
Informationen des Universitätsrechenzentrums
7

Zálohování dat a datová úložiště / Data Backup and Data Storages

Kavánková, Iva January 2021 (has links)
This diploma thesis is about data backup and following data archiving in real environment of concrete IT company engaged in software development. Theoretical knowledge concerning the area of data backup and data storages is described here. It also describes the current situation of data backup and problems with the current solution. There are suggestions for improving the current situation, including economic evaluation, to achieve efficient and most importantly secure data backup.
8

Technologie vysoké dostupnosti MS SQL Serveru / High availability Microsoft Sql Server

Pyszko, Pavel January 2015 (has links)
The thesis contains a complete theoretical overview of high availability technologies in Microsoft SQL Server. For each technology, guidance is provided for the deployment of technologies. Technologies are analyzed from a security perspective, they are determined advantages and disadvantages of using technology in practice and is determined the optimal variant of use of the technology. High availability technology are compared with each other and is given the availability of individual technologies in versions of MS SQL Server. The thesis contains three scenarios with practical examples of using technology for high availability in practice. It provides an analysis of high-availability features in Oracle and are subsequently compared high availability features in Oracle environments with high availability technology in MS SQL Server.
9

Marie Anna Savojská a zámek Ploskovice / Maria Anna of Savoy and chateau Ploskovice

Slívková, Hana January 2016 (has links)
Annotation: The present thesis is dedicated to the former Czech queen and Austrian Empress Maria Anna of Savoy (1803-1884) and the location of her frequent visits, Northern Bohemia's castle of Ploskovice. Anna Marie and her husband Ferdinand V (1793-1875) chose the castle as their summer residence after the Emperor's abdication in 1848. In order to properly represent the dignity of the former ruler of the House of Habsburg-Lorraine, both outside and inside, it was necessary to adjust the palace significantly in quite a short time, which was successfully realised in the spirit of contemporary rococo style by Czech artists and craftsmen. The individual chapters of the thesis deal with the life story of Anne Marie and the changes of castle Ploskovice - its history, reconstructions, facilities and decorations, especially from the perspective of history of art.
10

DynaCut: A Framework for Dynamic Code Customization

Mahurkar, Abhijit 03 September 2021 (has links)
Software systems are becoming increasingly bloated to accommodate a wide array of features, platforms and users. This results not only in wastage of memory but also in an increase in their attack surface. Existing works broadly use binary-rewriting techniques to remove unused code, but this results in a binary that is highly customized for a given usage context. If the usage scenario of the binary changes, the binary has to be regenerated. We present DYNACUT– a framework for Dynamic and Adaptive Code Customization. DYNACUT provides the user with the capability to customize the application to changing usage scenarios at runtime without the need for the source code. DYNACUT achieves this customization by leveraging two techniques: 1) identifying the code to be removed by using execution traces of the application and 2) by rewriting the process dynamically. The first technique uses traces of the wanted features and the unwanted features of the application and generates their diffs to identify the features to be removed. The second technique modifies the process image to add traps and fault-handling code to remove vulnerable but unused code. DYNACUT can also disable temporally unused code – code that is used only during the initialization phase of the application. To demonstrate its effectiveness, we built a prototype of DYNACUT and evaluated it on 9 real-world applications including NGINX, Lighttpd and 7 applications of the SPEC Intspeed benchmark suite. DYNACUT removes upto 56% of executed basic blocks and upto 10% of the application code when used to remove initialization code. The total overhead is in the range of 1.63 seconds for Lighttpd, 4.83 seconds for NGINX and about 39 seconds for perlbench in the SPEC suite. / Master of Science / Software systems are becoming increasingly bloated to accommodate a wide array of users, features and platforms. This results in the software not only occupying extra space on com- puting platforms but also in an increase in the ways that the applications can be exploited by hackers. Current works broadly use a variety of techniques to identify and remove this type of vulnerable and unused code. But, these approaches result in a software that has to be modified with the changing usage scenarios of the application. We present DYNACUT, a dynamic code customization tool that can customize the application at its runtime with a minimal overhead. We use the execution traces of the application to customize the ap- plication according to user specifications. DYNACUT can identify code that is only used in the initial stages of the application execution (initialization code) and remove them. DYNA- CUT can also disable features of the application. To demonstrate its effectiveness, we built a prototype of DYNACUT and evaluated it on 9 real-world applications including NGINX, Lighttpd and 7 applications of the SPEC Intspeed benchmark suite. DYNACUT removes upto 56% of executed basic blocks and upto 10% of the application code when used to remove initialization code. The total overhead is in the range of 1.63 seconds for Lighttpd, 4.83 seconds for NGINX and about 39 seconds for perlbench in the SPEC suite.

Page generated in 0.054 seconds