Exploiting seek overlap

R.A. Geilleit, J. Wessels

Research output: Book/ReportReportAcademic

48 Downloads (Pure)

Abstract

In this paper it is demonstrated how with simple techniques it is possible to obtain insight into the effects of minor hardware alterations on the behaviour of a central computing facility. In the case described here the disks and disk control units formed the bottleneck. However, the only allowable alterations were in core size and central processor speed. The practical solution was to use such alterations in such a way that seek overlap was exploited as good as possible.
Original languageEnglish
Place of PublicationEindhoven
PublisherTechnische Hogeschool Eindhoven
Number of pages10
Publication statusPublished - 1981

Publication series

NameMemorandum COSOR
Volume8102
ISSN (Print)0926-4493

Fingerprint

Dive into the research topics of 'Exploiting seek overlap'. Together they form a unique fingerprint.

Cite this