参考文献
|
-
The Cost Benefits of a SAN, An Analysis of Total Cost of Ownership of an iSCSI SAN, Fibre Channel SAN, and Direct Attached Storage, Comp. Technology Review. Retrieved on February 29, 2010, from http://findarticles.com/p/articles/mi_m0BRZ/is_7_24/ai_n6185910
-
Executive Summary, ROI–The Storage Perspective, Satyam Computers. Retrieved on January 9, 2009, from http://www.scribd.com/doc/11541574/The-storage-perspective.htm
-
Taking the Mystery Out of SAN and NAS Convergence, Hitachi Data Systems, Technical White Paper. Retrieved on February 29, 2010, from http://www.strategic-reports.com/guides/SANNASCoexistenceWHP-149.html
-
Storage Area Networks Design Reference Guide, Hewlett-Packard. Retrieved on February 29, 2010, from http://www.ost-india.com/services/san/understanding%20sans.pdf
-
The Rise of YouTube: A Big Deal, TechTalk, EMERGIC. Retrieved on January 9, 2009, from http://archives.emergic.org/collections/tech_talk_the_rise_of_youtube.htm
-
Storage Area Networks, Overview of SAN, StorageWorld. Retrieved on February 29, 2010, from http://www.forbiddenhistory.co.uk/storageworld/tech/san/overview.htm
-
Avresky, D. R.,Shurbanov, V.,Horst, R.,Watson, W.,Young, L.,Jewett, D.(2004).Performance Modeling of ServerNet™ SAN Topologies.The Journal of Super computing,10(4),19-37.
-
Craine. Kevin, The Growth of Digital Information. Retrieved on July 12, 2010, from http://www.tdan.com/view-articles/4917.htm
-
Gank,Rochester(2005).Pirates of the Digital Millennium.:FT.
-
J. Gantz, C. Chute, A. Manfrediz, S. Minton, D. Reinsel, W. Schlichting, and A. Toncheva, The Diverse and Exploding Digital Universe. IDC. Retrieved on July 12, 2010, from http://www.emc.com/colate/analyst-reports/diverse-exploding-digital-universe.pdf
-
Gibson, Garth A.,Nagle, David,Amiri, Khalil,Butler, Jeff,Chang, Fay W.,Gobioff, Howard,Hardin, Charles,Riedel, Erik,Rochberg, David,Zelenka, Jim(1998).A Cost-Effective, High-Bandwidth Storage Architectur.Proceedings of the 8th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
James, R., Principles of Information Management, Step Two Designs. Retrieved on July 12, 2010, from http://www.steptwo.com.au/papers/kmc_effectiveim/index.htm.
-
Mahalingam, P.,Jayaprakash, N.,Karthikeyan, S.(2009).Enhanced Data Security Framework for Storage Area Networks.Proceedings of The 2nd International Conference on Environmental and Computer Science (ICECS 2009),Dubai, UAE:
-
Morris, R. J.,Truskowski, B. J.(2003).The Evolution of Storage Systems.IBM Systems Journal,42(2),205-217.
-
Ng, J. M.,Susilo, R.N.(2005).Controlled Shared Backup Strategy Based on Channel Availability.International Journal of Computer Application Technology,24(1),25-32.
-
Pentakalos, O. I.,Menascé, D. A.,Halem, M.,Yesha, Y.(1997).Analytical Performance Modeling of Hierarchical Mass Storage Systems.IEEE Transactions on Computers,46(10),1103-1118.
-
Riedel, E.,Kallahalla, M.,Swaminathan, R.(2002).A Framework for Evaluating Storage System Security.Proceedings of the 1st USENIX Conference on File and Storage Technologies,Monterey, CA:
-
S., Jiwu,L., Bigang,Zheng, Weimin(2005).Design and Implementation of a SAN System Based on the FC Protocol.IEEE Transactions on Computers,54(4),439-448.
-
SafeNet, Multi-Factor Authentication - Protecting Applications and Critical Data against Unauthorized Access. Retrieved on February 29, 2010, from http://www.safenet-inc.com
-
J. Bigelow. Stephen, SAN Management Overview. Retrieved on February 29, 2010, from http://searchstorage.techtarget.com/article/0,289142,sid5_gci1218232,00.html
|