Help


[permalink] [id link]
+
Page "High Performance File System" ¶ 19
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

They and listed
They are listed clockwise, beginning south, with their respective linear distances to Aalen town centre given in brackets:
They are not listed here.
They have been listed as one of three occupational castes discriminated in East Africa.
They also listed him as one of Nintendo's best villains, simply stating that he " is an absolute fucker.
They are listed exclusively on Opencaching. us.
They are listed exclusively at Opencaching. us.
They are listed in the order " Shem, Ham, and Japheth " in Genesis 5: 32 and 9: 18, but treated in the reverse order in chapter 10.
They have been listed as metaphysics
They listed it as one of the Intolerable Acts which precipitated the American Revolution.
They conclude that the great majority of the bishops listed in the Holy See's Annuario Pontificio, including Benedict XVI himself, are in reality merely priests or even laymen.
They are not directly listed in the Torah ; elsewhere, the Mishnah observes that " the laws of Shabbat [...] are like mountains hanging by a hair, for they are little Scripture but many laws ".
They then compare their grids and play tic-tac-toe by filling in the squares by the priority they listed before.
They listed 538 summits over 3, 000 feet, of which 282 were regarded as " separate mountains "; the term Munro applies to the latter, while the lesser summits are known as tops.
They are generally listed on the Luxembourg Stock Exchange or admitted to listing in London.
They are listed as a World Heritage Site.
They date from World War II and were listed in MIL-HDBK-216 published in 1962.
They are listed as: The world was created by God ; God is one and incorporeal ; belief in revelation ( including the divine origin of tradition ); man is called to righteousness and endowed with all necessary qualities of mind and soul to avoid sin ; belief in reward and punishment ; the soul is created pure ; after death it leaves the body ; belief in resurrection ; Messianic expectation, retribution, and final judgment.
They are listed in the memorial to fallen firefighters on the Wildland Firefighter Foundation's website.
They are also listed under Annex III of the Bern Convention.
They listed stock accounts for companies involved in the holocaust, including BASF, Degussa, and Degesch.
They also listed real-estate records for Berlin property that had been forcibly taken by the Nazis, placed in Swiss accounts, and then claimed to be owned by UBS.
They are listed as chuān bèi () or zhè bèi ( Chinese: 浙貝 ), respectively, and are often in formulations combined with extracts of Loquat ( Eriobotrya japonica ).
They listed the " damsel in distress " as one of their top 25 video game archetypes, using Princess Peach as an example of this due to her frequent kidnappings.
They received names Melaina (" the Black "), Kleodora (" Famed for her Gift "), and Daphnis (" Laurel "); however, in the page in the Corycian nymphs, the third sister is listed as Corycia.

They and partitions
They are so arranged that images under the reflection about the main diagonal of the square are conjugate partitions.
They also have less water capacity at in 4x2 form, on 4x4 versions, than a modern vehicle, and poorer stability due to a lack of baffle partitions in the water tank.
They use wood bits to form partitions between the cells in the nest.
They discard the bits of wood, or re-use particles to build partitions between cells.
They start with physical volumes ( PVs ), which can be either hard disks, hard disk partitions, or Logical Unit Numbers ( LUNs ) of an external storage device.

They and networked
They include the basic Print, Copy and Scan functions with optional fax functionality as well as networked document storage with security, authentication using common network user credentials, ability to run custom software ( often a manufacturer will supply a Software Development Kit ), advanced network scan destinations such as FTP, WebDAV, Email, SMB and NFS stores, encryption for data transmission and so on.
They are well networked and, as demonstrated by their past history, are able to influence the efforts of various agencies and insurance carriers.
They could be networked together and with 200 and 300 series using the SRM ( Shared Resource Manager ).
They were networked from the outset, first with DECNET and later with X. 25.

They and computers
They effectively exploit the addressing logic of computers.
They were virtually never used with personal computers and have now been replaced by high-speed laser printers.
They did so: in 1995, Doom was estimated to have been installed on more than 10 million computers.
They are used to stabilize the frequency of most radio transmitters, and to generate the clock signal in computers and quartz clocks.
They set up and configure computers for new users and are typically responsible for any physical work relating to the computers such as repairing software or computer hardware issues and moving workstations to another location.
They believed that everyone in society could benefit from experiencing such power and that if everyone could interact with computers in the way that hackers did, then the hacker ethic might spread through society and computers would improve the world.
They both later worked on extending Linux for MIPS to run on SGI's Indy computers and wrote the original X drivers for the system.
They could also serve as a command line interface to early mainframe computers and minicomputers, sending typed data to the computer with or without printed output, and printing the response from the computer.
They typically have decades-old applications running on mainframe computers.
They crammed their dormitory room with inexpensive computers and applied Brin's data mining system to build a superior search engine.
They are a part of virtually all control and policy systems which work in computers today.
They may also be used in designing computers and software for more intuitive human use.
They got permission from Corfield to use the prototype as demoware for their computers, and hence, the primitive FrameMaker received plenty of exposure in the Unix workstation arena.
They became famous for their numerical computers, but as the market expanded they became better known for their drum memory systems.
They allow direct interface with computers, communications and Internet-based applications.
" Scholastic, an education software developer, was also confident of Apple's ability to compete with MS-DOS machines, stating: " They are just as cost-effective and as powerful as MS-DOS computers, but the Apples will have a superior comfort-level.
They needed a standardized bus for communicating device abilities between monitors and computers, and selected I²C because it required only two pins ; by re-using existing " reserved " pins in the standard VGA they could implement a complete A. b bus ( including power ).
They both were interested in maintaining a regular, open forum for people to get together to work on making computers more accessible to everyone.
They are a more secure alternative to pseudo-random number generators ( PRNGs ), software programs commonly used in computers to generate " random " numbers.
They developed the HP Interface Bus ( HP-IB ) to enable easier interconnection between instruments and controllers ( computers and other instruments ).
They developed a hard disk controller, and 2. 5 " HDDs were successfully used with BK computers.
They assigned certain user computers as " root supernodes " that acted as music hubs for their company.

0.521 seconds.