
Parametry
Kategorie
Více o knize
Computing power performance was important at times when hardware was still expensive, because hardware had to be put to the best use. Later on this criterion was no longer critical, since hardware had become inexpensive. Meanwhile, however, people have realized that performance again plays a significant role, because of the major drain on system resources involved in developing complex applications. This book distinguishes between three levels of performance optimization: the system level, application level and business processes level. On each, optimizations can be achieved and cost-cutting potentials can be identified. The book presents the relevant theoretical background and measuring methods as well as proposed solutions. An evaluation of network monitors and checklists rounds out the work.
Nákup knihy
Computer performance optimization, Wolfgang W. Osterhage
- Jazyk
- Rok vydání
- 2013
Doručení
Platební metody
Navrhnout úpravu
- Titul
- Computer performance optimization
- Podtitul
- Systems - Applications - Processes
- Jazyk
- anglicky
- Autoři
- Wolfgang W. Osterhage
- Vydavatel
- Springer
- Rok vydání
- 2013
- ISBN10
- 3642299709
- ISBN13
- 9783642299704
- Kategorie
- Počítače, IT, programování
- Anotace
- Computing power performance was important at times when hardware was still expensive, because hardware had to be put to the best use. Later on this criterion was no longer critical, since hardware had become inexpensive. Meanwhile, however, people have realized that performance again plays a significant role, because of the major drain on system resources involved in developing complex applications. This book distinguishes between three levels of performance optimization: the system level, application level and business processes level. On each, optimizations can be achieved and cost-cutting potentials can be identified. The book presents the relevant theoretical background and measuring methods as well as proposed solutions. An evaluation of network monitors and checklists rounds out the work.