Read more
Computing power performance was important at times when hardware was still expensive, because hardware had to be employed optimally. Later on this criterion was no longer critical, since hardware had become inexpensive. Meanwhile, however, people have realized that performance again plays a significant role, because of the large input of system resources when developing complex applications. This book distinguishes between three levels of performance optimization: system level, application level and business processes. On each level optimizations can be realized and cost-cutting potentials can be identified. The relevant theoretical background and measuring methods as well as solution proposals are presented. An evaluation of network monitors and checklists completes the work.
List of contents
Preface.- Performance Theory.- Performance Measurement.- Analysis.- Optimization.- Network Performance.- Process Performance.- Best Practice Examples.- Wider Context.- Checklists.- Appendix.- References.- Index.
About the author
Wolfgang Osterhage, geb. 1948, Promotionen in Physik und Informationswissenschaften, ist selbstständiger Technologieberater und Autor sowie Lehrbeauftragter an der Johann Wolfgang Goethe Universität Frankfurt/Main. Er lebt im Rheinland in der Nähe von Bonn.
Summary
Computing power performance was important at times when hardware was still expensive, because hardware had to be put to the best use. Later on this criterion was no longer critical, since hardware had become inexpensive. Meanwhile, however, people have realized that performance again plays a significant role, because of the major drain on system resources involved in developing complex applications. This book distinguishes between three levels of performance optimization: the system level, application level and business processes level. On each, optimizations can be achieved and cost-cutting potentials can be identified. The book presents the relevant theoretical background and measuring methods as well as proposed solutions. An evaluation of network monitors and checklists rounds out the work.