Bookmark
An Introduction to Hibernate 3 Annotations
www.onjava.com/pub/a/onjava/2007/02/08/an-introduction-to-hibernate-3-annotations.html, posted 2008 by peter in development howto java storage toread
In this article, we look at how Java 5 annotations can be used to simplify your Hibernate code and make coding your persistence layer even easier.
G.ho.st provides every person in the world with a free Virtual Computer (VC). [...] Available from any browser in the world instead of being installed on one physical machine.
Our Basic Plan gives you up to 50GB of free online storage for all of your files: music, video, photos, documents, and other files.
The Linkup is a place to easily send & receive files with friends and store massive amounts of files. Link with friends, create private or public groups, store files for later access – it’s all inside and just a click (or two) away.
Bookmark
[linux-lvm] Howto suggestion: Reducing a logical volume
https://www.redhat.com/archives/linux-lvm/2006-August/msg00081.html, posted 2008 by peter in howto linux storage
If the volume to be reduced is the root partition that you currently have booted, then you won't be able to unmount, and a somewhat more involved procedure is needed.
Bookmark
How-To: Install Ubuntu on LVM partitions
www.debuntu.org/how-to-install-ubuntu-over-lvm-filesystem, posted 2008 by peter in howto linux storage
This article will cover how to create LVM partitions and how-to generate your partitions from this LVM volume.
Bookmark
Lest We Remember: Cold Boot Attacks on Encryption Keys
citp.princeton.edu/memory/, posted 2008 by peter in privacy science security storage
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard.
Bookmark
FireWire Memory Dump of a Windows XP Computer: A Forensic Approach
www.friendsglobal.com/papers/FireWire%20Memory%20Dump%20of%20Windows%20XP.pdf, posted 2008 by peter in privacy science security storage
A firewire device can read (and write) to a computer’s main memory by accessing a system’s DMA controller, while the operating system, be it Windows, Mac OS, Linux, a Multiple Independent Levels of Security kernel, etc., is oblivious to the event.
Bookmark
Joyent Accelerator Technical Specs
joyent.com/accelerator/technical-specifications/, posted 2008 by peter in cloudcomputing development distributed hosting storage
Compared with LayeredTech GridLayer, Amazon EC2, Media Temple Grid, etc.
Bookmark
Gluster, GNU Clustering Platform
www.gluster.org/, posted 2008 by peter in cloudcomputing distributed p2p software storage
Gluster is a GNU cluster distribution aimed at commoditizing Supercomputing and Superstorage. Core of the Gluster provides a platform for developing clustering applications tailored for a specific tasks such as HPC Clustering, Storage Clustering, Enterpri
|< First < Previous 51–60 (68) Next > Last >|