Remove 2005 Remove Cache Remove Latency Remove Systems
article thumbnail

The Surprising Effectiveness of Non-Overlapping, Sensitivity-Based Performance Models

John McCalpin

The presentation discusses a family of simple performance models that I developed over the last 20 years — originally in support of processor and system design at SGI (1996-1999), IBM (1999-2005), and AMD (2006-2008), but more recently in support of system procurements at The Texas Advanced Computing Center (TACC) (2009-present).

article thumbnail

SQL Server I/O Basics Chapter #2

SQL Server According to Bob

​​ Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.

Servers 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Avoid Vendor Lock In

IO River

CloudFront makes a simple choice here as it offers direct integration with all these services to let you cache responses across its global edge locations. Therefore, there might be cases where your system could experience a downtime during the migration process. How does vendor lock-in occur?

Lambda 52
article thumbnail

How to Avoid Vendor Lock In

IO River

CloudFront makes a simple choice here as it offers direct integration with all these services to let you cache responses across its global edge locations. Therefore, there might be cases where your system could experience a downtime during the migration process. Akamai tried to convince many users to use this new framework.

Lambda 52