73 Results for:CD-ROM

  • Sort by: 

DefinitionCD-ROM

A CD-ROM (Compact Disc Read-Only Memory) is a type of compact disc that can only be read, not written to.Read More

VMware ESX essentials: Virtual Machine File System

By David Marshall 01 Dec 2008

This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the difference between direct- and network-attached storage and how to configure a client's ... Read More

Dell offers new Latitude to mobile users

04 Oct 2001

PC maker Dell is offering a new Latitude C610 notebook PC with extended battery life of up to eight hours. Read More

Leave no trace: Understanding attackers' motives

21 Sep 2005

This excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks. Read More

Resolving VMware ESX problems without pulling the plug

By Eric Siebert 24 Jun 2008

Instead of being driven to desperation and being forced to press Restart, you can learn resolve VMware ESX problems quickly. Read More

Understanding VMware ESX virtual machine physical and virtual hardware

By Eric Siebert 03 Dec 2008

You can better manage virtual machines by understanding the virtual hardware that makes up a VM. This tip explores VM physical and virtual hardware issues, including configuring virtual hardware and assigning ... Read More

Defining dimensional vs. normalized database design, dimension vs. fact tables

By Mark Whitehorn 14 Apr 2009

Find out if your existing database is in dimensional style or normalized database design style, learn the benefits and drawbacks of fact-dimension and normalized database schemas and read a comparison of dimension ... Read More

Hard disk drive specifications guide: What to look for when buying disk storage

By Bilal Mehdi 17 Aug 2009

Seek times, latency, data transfer rates, error correction codes and cache are important hard disk drive specifications. Learn the key features of hard disks drives so you can specify the right one for your data ... Read More

Ten steps to a Windows Server 2003 virtual cluster configuration

04 Aug 2009

Configure and test a Windows Server 2003 cluster on your desktop using virtualization technology with these ten easy steps. Read More

Security on a Shoestring: Creating Internet policies on the cheap

10 Jan 2005

No matter how small the organization, it's impractical to stand over employees and make sure they properly use the Internet. So here's how to write a decent acceptable use policy, and make sure everyone abides by ... Read More

Security Bytes: George Mason U. hacked; new Trojans on the loose

10 Jan 2005

Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company. Read More