Fulltext results:
- ibm_mainframe_glossary
- face and run the same binary code on a variety of systems, without having to re-compile or re-link. Applica... ed 24-bit addressing. ABS: Application Business Systems. For many years, the part of IBM responsible for ... S government standard), which uses it for writing systems for controlling guided missiles and the like. IBM provided ADA systems for VM, MVS, and AIX, and supported the language
- what_s_really_new_with_newsql
- ads in a way that is not possible with [[legacy]] systems. The term NewSQL was first used by one of the aut... is report discussing the rise of new [[database]] systems as challengers to these established vendors ([[Or... this term (rightly and wrongly) to describe their systems. Given that [[relational DBMS]]s have been aroun... the history of databases to understand how NewSQL systems came about. We then provide a detailed explanatio
- systems_performance_introduction
- ==Systems Performance Introduction== Return to [[Systems Performance Table of Contents]], [[Systems Performance Glossary]], [[Systems Performance, 2nd Edition]], [[Performance Bibliography]], [[Systems Perf
- cybersecurity_glossary
- including definitions about [[intrusion detection systems (IDS)]] and words and phrases about [[asset manag... ect and remove malicious software (malware) on IT systems, as well as individual computing devices. * [[an... on individual computing devices, networks and IT systems. * [[application blacklisting]] - Application bl... ity deficiencies of Microsoft's Windows operating systems. * [[backdoor (computing)]] - A [[backdoor]] is
- glossary_of_computer_science
- attribute|attributes}} in the study of objects or systems in order to more closely attend to other details ... ures or attributes to various concrete objects or systems of study.<ref name="abstraction" />}} {{term|[[a... ent|software agents}} and [[intelligent control]] systems depicting the arrangement of components. The arch... t combines elements of [[game theory]], [[complex systems]], [[emergence]], [[computational sociology]], [[
- systems_performance_2nd_edition_by_brendan_gregg_table_of_contents
- ==Systems Performance Table of Contents== Return to [[Systems Performance Index]], [[Systems Performance Glossary]], [[Systems Performance, 2nd Edition]], [[Performance Bibliography]], [[Systems Perf
- software_engineering_glossary
- [[attribute|attributes in the study of objects or systems in order to more closely attend to other details ... ures or attributes to various concrete objects or systems of study. * [[agent architecture]] - A [[bluepr... agent|software agents and [[intelligent control]] systems depicting the arrangement of components. The arch... t combines elements of [[game theory]], [[complex systems]], [[emergence]], [[computational sociology]], [[
- software_engineering_topics
- [[attribute|attributes in the study of objects or systems in order to more closely attend to other details ... ures or attributes to various concrete objects or systems of study. * [[agent architecture]] - A [[bluepr... agent|software agents and [[intelligent control]] systems depicting the arrangement of components. The arch... t combines elements of [[game theory]], [[complex systems]], [[emergence]], [[computational sociology]], [[
- cloud_monk_s_book_purchases
- chitecture - Design, Operate and Evolve API-Based Systems by James Gough, Daniel Bryant, Matthew Auburn]], ... 28, [[2022]] # [[Database Security and Integrity (SYSTEMS PROGRAMMING SERIES) by Fernandez, Eduardo B.]]; [... ] on July 24, [[2022]] # [[Mac OS X Internals - A Systems Approach by Singh, Amit]]; [[Publisher]]: [[Addis... of Data Engineering - Plan and Build Robust Data Systems Plan and Build Robust Data Systems by Reis, Joe,
- cloud_monk_s_book_purchases_in_2022
- chitecture - Design, Operate and Evolve API-Based Systems by James Gough, Daniel Bryant, Matthew Auburn]], ... 28, [[2022]] # [[Database Security and Integrity (SYSTEMS PROGRAMMING SERIES) by Fernandez, Eduardo B.]]; [... ] on July 24, [[2022]] # [[Mac OS X Internals - A Systems Approach by Singh, Amit]]; [[Publisher]]: [[Addis... of Data Engineering - Plan and Build Robust Data Systems Plan and Build Robust Data Systems by Reis, Joe,
- cybersecurity_topics
- entities with the intention of compromising their systems and gaining information from or about them. For m... ter that is connected to the internet. Air-gapped systems were believed to be more secure until Stuxnet dis... lso refer to the method of gaining access to user systems undetected. For an in-depth look at backdoors, s... ation stored and processed through online banking systems. Behavior In the context of computer malware, be
- computing
- [cybersecurity]], [[data science]], [[information systems]], [[information technology]] and [[software engi... udes designing and building hardware and software systems for a wide range of purposes; processing, structu... ientific studies using computers; making computer systems behave intelligently; creating and using communic... ich the term is used. For example, an information systems specialist will view computing somewhat different
- awesome_scalability
- ], [[reliable]], and [[performant]] [[large-scale systems]]. Concepts are explained in the articles of [[pr... [[Case studies]] are taken from [[battle-tested]] systems that serve millions to billions of users. == If ... now how they build, scale, and [[optimize]] their systems. There are some selected [[books]] - (book) for y... essons and Advice from Building Large Distributed Systems - Jeff Dean, Google]] - (https://www.cs.cornell.e
- cloud_native_transformation
- her What Could Possibly Go Wrong? (Distributed) Systems Shock Shocking Immaturity The Executive Summary... Source Internal Projects Pattern: Distributed Systems Pattern: Automated Testing Pattern: Continu... Delegating Power PHASE 2: DESIGN Distributed Systems and Friends Exploratory Experiments Proof of Co... methodologies composing cloud native, Distributed Systems and Friends-Distributed Systems and Friends unde
- high_availability
- n English|date = March 2019}} {{Short description|systems with high up-time, a.k.a. "always on"}} {{Use mdy... on has resulted in an increased reliance on these systems. For example, hospitals and data centers require high availability of their systems to perform routine daily activities. [[Availabili... . ==Principles== There are three principles of [[systems design]] in [[reliability engineering]] which can