Slices & Articles Get by the slice or add to your own ebook
|Howard J. Rogers||O'Reilly Media|
Chapter 4: Improvements to RMAN
RMAN is Oracle’s ‘Recovery Manager’ utility, and has been around since version 8.0. It has variously inspired fear and loathing in many DBAs in that time, largely because of its obscure syntax and intimidating user interface. And it’s fair to say that things didn’t get a whole lot better in version 8i.
But it’s all changed in 9i! RMAN is now extremely usable, and there is frankly no excuse any more for not using it to perform your hot or cold backups. The interface is still not exactly a work of art, but there is a GUI front end that actually works; and the syntax has undergone a mammoth overhaul. How does a one-line command to back everything up in one go sound?!
Don’t panic if you did battle with RMAN in 8.0 or 8i, though: you’ll be pleased that your investments are not wasted, since 9i RMAN can run an 8.0 or 8i script totally unchanged if needed.
The marketing team from Oracle might not sell it this way, but frankly the changes to RMAN are one of the main reasons for upgrading to 9i. Accordingly, there are an awful lot of changes, and it would be tedious to list each of them. I’ll be concentrating here on the ones that make the most difference to me.See All
|National Council of Supervi Mathematics||Solution Tree Press||ePub|
When mathematics teachers have high levels of requisite knowledge, use research-based high-leverage instructional practices and resources, and use evidence of learning to plan and implement daily instruction in meaningful ways, they maximize students’ learning. This chapter describes the necessary three program components centered around teachers’ requisite knowledge: (1) mathematics content knowledge, (2) pedagogical content knowledge, and (3) mathematics curriculum knowledge. We identify the critical elements of these imperatives and link them directly to the end goal of raising achievement in mathematics for every student and effectively implementing the CCSSM in every classroom.
Raising achievement in mathematics for every student and effectively implementing the CCSSM in every classroom requires that teachers understand the mathematics content that they expect students to learn.
Raising achievement in mathematics for every student and effectively implementing the CCSSM in every classroom requires that teachers understand the mathematics content that they expect students to learn. Mathematics content knowledge refers to a person's understanding of the skills, concepts, applications, reasoning methods, and connections within mathematics that are prerequisite to what is being taught, are aligned with what is being taught, and build from what is being taught.See All
|Toby Segaran||O'Reilly Media||ePub|
DATA DOES A GREAT MANY THINGS: IT ALLOWS US TO SEPARATE SCIENCE FROM SUPERSTITION AND THE repeatable from the random. Over the past several decades, scientists have scaled tremendously the processes for collecting, collating, and storing data. From medical decision-making to soft drink marketing to supply chain management, we're relying more on fact and less on hunch. We're letting data drive.
But data doesn't drive everything. Over the past century, psychologists have poked holes in the theory that people interpret data with anything close to rational equanimity. In truth, we're biased in our interpretation of information. Moreover, the real world does not manifest itself with the easy probabilism of a game of dice. Rather, individuals must extract likelihoods from perceived patterns in experience.
This chapter is a discussion of the approximations and biases that stand between data and analysis. It describes a set of new experiments and tools to help people use data more effectively, and draws examples from the growing literature in medical, consumer, and financial decision-making.See All
|Joe Kissell||TidBITS Publishing, Inc.|
Go Beyond FileVault
FileVault is great for what it does, but I wouldn’t pretend that it solves all encryption problems—or even all encrypted file-storage problems for Mac users. After all, FileVault doesn’t protect your data at all when you’re logged in to your Mac, and it doesn’t protect files you might want to share with other people. There are numerous other uses for encryption you may want to explore, too. In this brief chapter, I review some of the ways you can use encryption on a Mac that don’t involve
FileVault or even Core Storage. These can supplement FileVault for additional security, or replace it in cases where FileVault can’t be used.
Other Full-Disk Encryption Options
FileVault isn’t the only way a Mac user can encrypt an entire disk.
Third-party apps such as Check Point Full Disk Encryption and
Symantec Drive Encryption offer roughly similar features, but with more of an enterprise focus. Their main priority is convenient, crossplatform institutional management. There’s nothing wrong with that, but these tools aren’t the sort of things that individual users would typically buy and install on their own Macs.See All
|Chuck Parsons and Norman Wayne Brown||University of North Texas Press|
“The pursuing party [was] fixing to surround us again, [so] we got on our horses and ran off from them. It seemed to me as if their horses stood still. . . . Good horseflesh is a good thing in a tight.”
John Wesley Hardin
he herd in Hamilton County was no longer in control of any of
Hardin’s hands, but confiscated by the Rangers. Waller’s men had arrested the cowboys, or most of them, including James M. “Doc”
Bockius, Rufus P. “Scrap” Taylor, Alf “Kute” Tuggle, Thomas Bass,
James White, G. W. Parkes, and John Elder. Alf Day and Charley the cook were also taken in, but Day and Charley had somehow managed to get away. Whether the seven cowboys were placed in the inadequate
Comanche jail or remained prisoners in the Ranger camp is unknown.
Attorney at Law John D. Stephens wanted them out of the country as quickly as possible and started arrangements to have them delivered to
The authorities had no real control over the volatile situation either.
Major Jones ordered Captain Waller to remain in the Comanche County area as Hardin and Taylor’s whereabouts were uncertain. As late as JuneSee All
Business & Economics