Thursday, October 21, 2010

An amplifier world, share NEC


An amplifier world, share NEC
- Your business data safe?

Into the 21st century, corporate business and information technology more closely connected, information has become the core competitiveness an important part. For example, according to Qualix Group's statistics, the loss of the securities industry, down 45 per million, communications, banking and other industries each downtime and 27, respectively 350 000 million. An important feature of these industries is very strong degree of information technology, the dependence of the entire information system is also very strong. In a sense, business dependence on information systems stronger, then the information loss caused by system failure is greater. Information important in the enterprise to raise the degree, but also more and more emphasis on the enterprise server in the enterprise application reliability.
On the other hand, the development of information technology, data followed the collapse of the threat of downtime will be growing. According to the National Computer Security Association, 20MB each lost critical data, sales / marketing department will lose 17 thousand U.S. dollars, the financial sector will lose 19,000 U.S. dollars, engineering department will lose 98 thousand U.S. dollars. Even third-party statistics that the loss of business critical data for more than 80% of enterprises are bankrupt eventually. Therefore, in this sense, the enterprise data storage also requires a very safe environment.
For companies in these two needs, NEC Corporation in 2005 September 16 to October 28, in Beijing, Shanghai, Shenzhen and other 11 cities, followed by start the theme of "Generosity security world, share the NEC "large-scale server and storage customers nationwide tour activities, through practical application shows users and partners to introduce NEC servers and storage products, features, and they are the perfect integration solution.
In the event, NEC server specialist will be fully introduced the latest NEC server products and technologies, including the latest upgrade of fault-tolerant servers, and storage experts will thoroughly explain the NEC's storage strategy. Participants will also invite users to the implementation stage of the three simulation experiments to show that NEC products and solutions with high reliability and high availability. NEC servers and storage technologies perfect match, will provide a strong adaptability of Chinese enterprises IT platform to help Chinese enterprises in the fierce market environment for rapid growth.

The first experiment is to verify the fault tolerance fault-tolerant servers. Removal of fault-tolerant server, the user can any of these components to simulate the server computing system failure - we can see, the server monitoring equipment to detect anomalies and administrators as the police, but the practical application of front running are not affected.
Can be said that application security is not a new topic, in order to address the application of downtime may lead to disruption of the losses, the industry already has a very long "hot standby" solution, the program is still in many applications place widely. However, as "hot standby" mode technology to provide system redundancy still exists more than 10 seconds of application switching time, a number of real-time data may be lost, while the system has only achieved 99.5% availability. This means that for has a 365 脳 7 脳 24 job demand enterprises, 43.8 hours per year are forced downtime.
Fault-tolerant servers in the fundamental solution to this problem, the server which are mirror images of the system 1 and System 2 to run the same program. And fully synchronized in order to achieve the continuous operation of the maintenance, and provides an efficient exchange of maintenance mode module. In the fault-tolerant servers to achieve fault-tolerant hardware component availability, the system all the hardware module (CPU module and PCI modules) are designed with redundant and equipped with ASIC circuits for data processing results to the continued synchronous cross-verification; so that the failure of these modules will be automatically detected, the module also fails immediately and the system can be separated.
Domestically, the market hot standby system reliability essential in 99.9%, while the fault-tolerant system has been able to achieve 99.999% reliability. That is, application fault-tolerant servers, the company can be the down time throughout the year from 8 hours a day down to 5 minutes. In troubleshooting, traditional hot standby failover is when the host fails, the Standby machine to restart all applications. In other words, the client will terminate the ongoing operation, carried out by the business needs to start from scratch, this will inevitably lead to the loss of the user's current task. And because all applications need to re-start, switching time over at least 1 minute. In contrast, fault-tolerant system, the more obvious advantages. When a failure, because Cache, memory and hard disk data is fully synchronized, and two systems to work simultaneously, so just need to switch the output from the fault section can be transferred to a normal part of. The current task without end, completely seamless switch in the past, almost no switching time (applications that do not feel them).

The second experiment is the NEC's highly reliable storage device experiments. NEC's storage device to provide a redundant RAID 6 technology that allows the storage array damage any two hard drives simultaneously. In the field simulation, the user can from the system random device among them two hard drives, then the user still maintains the integrity of the data, no data loss.
The development of enterprise information so that enterprises in the explosive growth of data, this also means that as the basis of enterprises in hard disk storage unit number is increasing. When companies increase the number of hard drives, hard drive also means increased risk of damage. Traditional RAID 5 redundancy mode allows only damage a hard drive, in which case the data can rebuild.
However, in the user's data center practice, sometimes there may be damage to the hard disk to happen without warning. Therefore, two hard drives to ensure data security can still damage the RAID 6 technology for providing a square level of reliability. NEC's implementation of RAID 6 technology independently developed by LSI (logic) to hardware implementation, fully able to meet the needs of the user's IOPS. NEC said that if the combination of RAID 6 and NEC's dynamic pool of storage technology, 1 TB of data reconstruction can be completed in 2 hours. In the Tour presentation live, the data reconstruction only takes a few minutes, and can dynamically increase storage capacity. In contrast, many storage devices to add storage capacity, still need to break applications.
Be noted that, NEC's RAID 6 technology is evenly distributed in all the data on your hard disk. Therefore, in this tour, NEC is removed which allows the user to any two hard drives. In the early stage of RAID 6 technology which, for data redundancy check code is mainly distributed in two hard disk, two hard drives which can only be allowed to damage the piece, otherwise the data will be lost. Although this is higher than before the raid 5 in redundancy level must be high, but not ideal for RAID 6.
NEC's S2400 family of storage products also provide the Phoenix (Phoenix) technology, when the hard drive or temporary 澶辫触 response delay when the time is detected, Ta immediately for the shortest temporal isolation and back-Zhen Duan, and Zuochu rapid processing, the temporary failure if yes, the system automatically after the repair bay. Thus without loss of data can be achieved under the premise of 1 / 3 to 1 / 2 to save hard disk replacement. Not only saves money for enterprises, but also reduced the staff time and other maintenance costs.

The third experiment is zero risk of online expansion demo. In the last experiment two simultaneous drive failures, based on the data line into the hard disk to restore the system on-site users at the same time, please create trouble, unplug the power lead to system failures, power supply connected to continue to run after the system restarts, the data is not lost, to complete the whole process of online expansion. NEC said that it is the combination of RAID 6 and dynamic pool of technology, sufficient to prove that the IOPS performance RAID 6 system has been able to meet customer demand on the transmission performance.
NEC is the world's fifth-largest server brand, product line complete, including traditional tower, rack, blade, and fault-tolerant servers, water-cooled servers to industry-leading high-performance, high reliability and manageability for customers with the most excellent standard solutions to provide customers a wider choice and value. NEC servers and storage technologies perfect match, will provide a strong adaptability of Chinese enterprises IT platform to help Chinese enterprises in the fierce market environment, to achieve dynamic growth.
The exhibition is the NEC server and storage market in 2005 the main activities will NEC's server and storage products provide a good opportunity for promotion and sales, but also will better support the channel partners. Can see that with customers, partners, close contacts and exchanges, NEC servers and storage will be broader and more in-depth application.






相关链接:



New Wang Zhidong: Eliminating "Sina label"



FTP SPACE is filled with how to FTP space for alarm?



Pause SLIDESHOW tips



3GPP converter



Failure from Shutdown trouble



To prevent leakage of the internal IP address of the second law



MP4 to Flash



Digital Cable and IPTV play against Shanghai, "the Eleventh TV Festival"



Fax Tools Comparison



combining the power of gmail and outlook email



MP4 to 3GP



Storage Games Arcade



Dynamic Power-BIV5.4 Chi Aowei Grand Fat Version!



Wednesday, October 20, 2010

Post to defer consideration of the draft law calling for the right to know the private courier


Yesterday, the "First Financial Daily" informed that the original plan by the end of September to discuss the adoption of relevant meetings of the "Postal Law" Eighth Draft ("the eighth draft of"), the discussion has been postponed, which means that the eighth draft It also will be delayed into the NPC Standing Committee, the agency review process.

At the same time, private express delivery companies and foreign express delivery companies have asked the eighth draft of the public.

By the end of September, the relevant state ministries and commissions for the first time on the eighth draft of non-postal business exchanges in Shanghai, but 4 hours of the forum is still unable to resolve conflicts.

"11" holiday on the eve of the State Council Legislative Affairs Office Deputy Director Dong Chaojie industry, transport, industry, the State Post Management Division of Dawa and others with 20 private companies and four major international express delivery giant, held a discussion meeting with the two non-postal business hour or so presentation of views, including a call for fair competition in the postal sector, to correct "Postal Law" legislation in the unfair practices.

End of the forum, the Dongchao Jie said that she was related to the State Council leadership shown with Fan Ying everyone's views, but these views, "To step" which should all postal 浼佷笟 An Zhao Fei's observations may be difficult to promote reform, the legal system to further improved, taking into account the special situation in China.

钁h秴娲佹墍鎸囩殑鈥滅壒娈婂浗鎯呪?锛屽叾瀹炲氨鏄鍏鑽夋涓?150鍏嬩互涓嬬殑淇′欢涓洪偖鏀夸笓钀モ?鐨勮瀹氬湪涓浗閭斂鏂归潰鍜屾皯钀ュ揩閫掓柟闈㈡病鑳借揪鎴愪竴鑷达紝姘戣惀蹇?浼佷笟璁や负鏄墺澶轰簡浠栦滑鐢熷瓨鐨勬潈鍒╋紝璁や负搴旇缂╁皬涓撹惀鑼冨洿锛屾垨鑰呮寜鐓ч噸閲忓拰璧勮垂鐩哥粨鍚堢殑鏂瑰紡銆?br />
鍙﹀锛屾皯钀ュ揩閫掍紒涓氭寚鍑猴紝涓庣浜旂鑽夋涓嶅悓鐨勬槸锛岀鍏鑽夋涓儚鎶ュ叧鍗曘?鎻愬崟绛夊晢鍔′俊鍑戒篃瑕佽绾冲叆涓撹惀鑼冨洿銆?br />
瀵规锛屼腑鍥介偖鏀挎湁鍏充汉澹〃绀猴紝涓栫晫涓婂叾浠栧浗瀹堕噸閲忓拰璧勮垂鐩哥粨鍚堢殑鏂瑰紡鏄竴涓巻鍙叉紨鍙樼殑杩囩▼锛岃?鏍规嵁涓浗鐩墠鐨勫浗鎯呭拰鍙戝睍闃舵锛屽苟涓嶈兘涓?鍒颁綅锛涘彟澶栵紝涓浗鐨勪俊鎭畨鍏ㄨ姹傛帶鍒跺皢淇′欢鐨勫瘎閫掔浉瀵归泦涓?

涓嶈繃锛岄櫎浜嗕笓钀ユ潈鐨勭煕鐩撅紝闈為偖鏀夸紒涓氱洰鍓嶆渶杩垏鐨勮姹傚氨鏄叕寮??閭斂娉曘?鑽夋绗叓绋裤?鑰岄偖鏀挎柟闈㈠拰鐩稿叧绔嬫硶鍙備笌浜哄垯璁や负锛岀洰鍓嶈繕涓嶉?鍚堝叕甯冿紝绛変粖鍚庢彁浜ゅ叏鍥戒汉澶у悗鎵嶄簣浠ュ叕甯冨苟寰佹眰鎰忚銆?br />





相关链接:



Tongfang response TO piracy crisis: is the distributor of pirated security



How to download psp games



3G2 To WMV



Lightning Fast Shortcut Keys Used To Grasp Thunder 5.9



Report CALCULATORS And Converters



Using Visual Basic's Timer Control



C + + / CLI object of speculation recorded the Object Layout



FreeBSD Serial (49): access to X Window



My favorite Computer Education



Jiang Qiping Family Laboratory of Beijing University speech sounded "New Life Movement" horn



Fireworks PRODUCED way back in effect



3G2 to AVI



for you Flash TOOLS



RMVB To MPEG



Report Dictionaries Education



Digital China to enhance profitability yet ready to fight a protracted war



CCTV SP 3.15 show the annihilation OF the dying



Tuesday, October 12, 2010

Hong Kong dollar 76 million a formal decision to auction 3G licenses



Although the operators of Hong Kong Government should grant the licenses CDMA 2000 views varied, however, on August 31 decided to remain in Hong Kong Telecommunications Authority, Hong Kong dollar will reserve 76 million CDMA 2000 official auction of the licenses.

Hong Kong Telecommunications Authority spokesman said the auction of the licenses in addition to overseas and Chinese mainland tourists in Hong Kong continue to use the CDMA 2000 services, but also will increase Hong Kong consumers, a new 3G service options. A spokesman for that, CDMA 2000 services can strengthen Hong Kong as an international gateway cities and into the mainland's strategic position.

This is the Telecommunications Authority of Hong Kong in September 2001 following the auction since the 3G frequencies, the second held auction of wireless frequencies, According to reports, the Hong Kong Telecommunications Authority will issue a single license, the license holder will receive the 7.5MHz 850MHz frequency X2 band.

Hong Kong Telecommunications Authority data show that the global economic system has 85 350 000 000 CDMA 2000 subscribers, of which the mainland has reached 39 million CDMA users.

Before that, China Unicom in Hong Kong have clearly expressed interest in CDMA 2000 license. It is reported that China Unicom has and electricity, the city electricity and Wharf T & T and other local operators invitation cooperation bid for the license. But also the management of the Hong Kong telecom operators that give away even if the CDMA 2000 licenses are not worth, "from the network alone would one billion Hong Kong dollars, plus launch base rent, maintenance and promotion fees, at least 5 billion per year, CDMA 2000 business opportunities in Hong Kong is not difficult to grow. "

At the recent performance of China Unicom at the conference on the mainland, China Unicom Chairman Chang Xiaobing said this explained, Unicom involved in bidding, because of Unicom, the high-end CDMA roaming users can not be achieved in Hong Kong, but Hong Kong's Hutchison Telecom has switched to WCDMA, CDMA network investment and therefore you do not vote are difficult, be sure to improve Hong Kong's CDMA network roaming revenue growth can bring, so Unicom decided to take a license to promote through cooperation and operations.

He also pointed out that this is outside of China Unicom in Macau 3G network operators try to be a good opportunity. June 8, 2005, China Unicom's CDMA 2000 the Macao government awarded a 3G license, and in October 18, 2005 the official service.

Information, the existing CDMA frequency will be November 19, 2008 expiration, the license period of 15 years, the applicant may within the next 6 weeks to prepare, the deadline for the October 12, 2007, auction will be the end of October 2007 or early in November at the new license owners will be rolling out their networks in a year, and from November 20, 2008 from the official launch of CDMA 2000 services.







Recommended links:



New Ad Blockers



MOD To MPG



Name Enterprises HR Field Coaching "candidates"



Several important concepts introduced J2ME



Selected Fifth One, Peking University Guanghua New Year's Forum



DAT to MP4



Kelon did not deny that Gu Chujun was Under surveillance



The world to those who have access



Delicious Stop! Photoshop baked pizza word



Directory Gallery And Cataloging Tools



Mars V2.7.2 latest version OF the text input text input easy Fun



Best File Sharing Or PEER to Peer



Toyota Authorized Dealer



MOD CONVERTER



transfer TS to sony nwz-e436fblu



Monday, October 11, 2010

Servlet API's gluten strength



In the September 26, 2005, Sun introduced the latest version of Servlet API: Servlet2.5. The Servlet API and the previous Servlet is very different. The biggest difference is Servlet2.5 is based solely on J2SE5.0 of. Therefore, it naturally has all the characteristics of the J2SE5.0. Servlet2.5 use J2SE5.0 the configuration of the comment features make it easier. However, in 2005 J2SE5.0 introduced not long ago, the Web server to support J2SE5.0 not many, it was Servlet2.5 in use and did not immediately popular. Two years later, Sun has introduced the Servlet based J2SE5.0 the second version of 3.0 (that is JSR-315). In this version added a lot of interesting features. Such as programmable login logout configuration through annotations, asynchronous communication. Let us look at Servet3.0 following main features.

A more flexible Web Framework

Now almost all Java-based Web frameworks are built on top of the Servlet. Most Web frameworks are by Servlets or web.xml to configure and released. The newly added annotation features J2SE provides us with a better choice. We can use annotation to set Servlets, Listeners, filters and so on. But the comment is written directly in the program and can not dynamically change the configuration, therefore, JSR also provides two ways to operate Servlet. This Web application will have more flexibility.

2, EOD support

Servlet3.0 will use a variety of techniques to enhance the capacity of API. Such as the type of use Note to declare the program. This will be one of the goals EOD: make Web program zero configuration. In other words we will use the release to cover the traditional description of the configuration of the article. There is the generic application, will greatly enhance the process of Servlet's expression. J2SE version of the will in the future by adding the ability to support other languages, it also helps increase the strength of Servlet API itself.

Third, support for asynchronous communication

Servlet3.0 asynchronous communication support the following features:

1. Nonblocking (Non-blocking) input: the use of such input, the data for some reason can not yet arrived when the program will not be blocked.

2. Non-blocking output: and non-blocking input similar to that when writing data due to network problems and slow process will not be blocked.

3. Delay request processing: in AJAXWeb client program can send asynchronous requests to the server until the timeout or event returns to handle the request. Delay request is also very useful in other areas, such as processing of data before we have to get some resources, but these resources are in remote networks, but the speed is not fast. This requires asynchronous to deal with this situation.

4. Obstruction - non-blocking notification: This function is to inform the information into blocking or non-blocking events. Then extracted by the client is responsible.

5. Support channel: channel is JDK1.4 and above to provide a new communication API. Channel can be better used for network communication. Can also enhance the creation, subscription, cancellation and other security operations.

6. Security: support for logon and log off function.

7. Other features

(1) support the Welcome screen.

(2) ServletContentListener sort.

(3) initialize the size of the container can be customized.

(4) can monitor the file upload process.

The above is only a part of properties Servlet3.0. These features can be seen from, Servlet API does have a lot of flying, in addition to Servlet, EJB3.0 also use the new features J2SE5.0 rebirth. Perhaps in the near future Servlet3.0 and EJB3.0 will become the new combination, in the J2EE application plays an important role, let us wait and see!







Recommended links:



DivX To IPhone



svchost exe fix automatic solution



MPEG To 3GPP



AVI to FLV