Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share This URL With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

Links 1 through 4 of 4 by Ken Robson tagged best

As has been widely publicized recently, mainstream computer architectures in the future will rely on concurrency as a way to improve performance.  This is in contrast to what we’ve grown accustomed to over the past 30+ years (see Olukotun, 05 and Sutte

Share It With Others!

This paper describes identified best practices for implementing an end-to-end automated provisioning solution. It describes architecture, trade-offs, and lessons learned and best practices derived from experiences during proofs of concept for IBM customer

Share It With Others!

Service-oriented architecture (SOA) has arrived, and with it have come a faster application development process and the ability to adapt more flexibly to changing business needs. The Gartner Group predicts that "By 2008, SOA will be a prevailing software

Share It With Others!

Although group policies are an extremely powerful security mechanism, it can be a bit tricky to deploy them in an effective manner. That’s because the effective group policy is made up of multiple and sometimes contradictory group policy elements that a

Share It With Others!