TITLE

CIM: Net management's best kept secret

AUTHOR(S)
Caruso, Jeff
PUB. DATE
November 1998
SOURCE
Network World;11/02/98, Vol. 15 Issue 44, p24
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the potential of Common Information Model (CIM) technology to improve the way networks and systems are managed. Possibility of building applications using CIM data; Encoding of specification for representing CIM data using Extensible Markup Language.
ACCESSION #
2519001

 

Related Articles

  • Program Consolidates Mainframe Consoles on UNIX Wokstations.  // Mainframe Computing;Feb2000, Vol. 13 Issue 2, p1 

    Announces the release of I/O Concepts MVS Console Consolidation System, a complete system that makes the consolidation of mainframe consoles onto both UNIX and Windows workstations easier.

  • Storage area Networks: A closer look. Gilmer, Brad // World Broadcast Engineering;Feb2001, Vol. 24 Issue 2, p50 

    Focuses on the benefits from the use of storage area networks (SAN). Multiple processors' sharing of a pool of common storage; SAN assembly; SAN concerns.

  • Production room networks: Achieving unification. Blumenfeld, Steven M. // World Broadcast Engineering;Sep2001, Vol. 24 Issue 9, p58 

    Focuses on achieving unification of computer systems in production room networks. Complications in the connection of various networks; Plan on the better use of equipment; Interconnection of equipment to minimize complexity.

  • Doing things the 'route' way. Brakeman, Lynne // Pest Control;Aug2002, Vol. 70 Issue 8, p32 

    Features the computer network system at the U.S.-based company, Viking Termite and Pest Control, Inc. Applications of the computer system; Benefits to employees; Use of web-based software; Implications for optimizing workday and office operations. INSET: On the Web.

  • Building a small business network.  // APC (Bauer Media Group);Feb2008, Vol. 28 Issue 2, p94 

    The article offers tips in building a small business computer network.

  • Mac OS X Secrets. Brisbin, Shelly // Macworld;Nov2001, Vol. 18 Issue 11, p84 

    Provides tips on protecting a computer system. Use of the sudo command; Care in using the file sharing application; Benefits of using software firewalls.

  • A Tight Layout of the Butterfly Network. Avior, A.; Calamoneri, T.; Even, S.; Litman, A.; Rosenberg, A. L. // Theory of Computing Systems;1998, Vol. 31 Issue 4, p475 

    Abstract. We establish upper and lower bounds on the layout area of the butterfly network (without wraparound), which differ only in low-order terms. Specifically, the N-input, N-output butterfly network can be laid out in area (1 + o(1))N², while no layout of the network can have area...

  • Survivable Network System Analysis: A Case Study. Ellison, Robert J.; Linger, Richard C. // IEEE Software;Jul/Aug99, Vol. 16 Issue 4, p70 

    Presents information on a case study which focused on survivability research to analyze and design network systems against attacks and failures. Overview of the survival network analysis method; Methodology of the case study; Discussion.

  • Scale grid computing down to size. Brodsky, Ira // Network World;1/27/2003, Vol. 20 Issue 4, p47 

    Comments on grid computing. Challenges and opportunities; Different types of grid computing; Supply-chain grid computing.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics