IBM Platform Computing Integration Solutions

Total Page:16

File Type:pdf, Size:1020Kb

IBM Platform Computing Integration Solutions Front cover IBM Platform Computing Integration Solutions Learn about solutions that integrate IBM Platform Symphony and IBM InfoSphere BigInsights for analytics See how the solutions use IBM System x and IBM GPFS Understand details about IBM Platform LSF implementation Dino Quintero Ricardo Dobelin Barros Ashraf Gomaa José Higino Archana Kumar Majid Ouassir Adam Parker Joanna Wong ibm.com/redbooks International Technical Support Organization IBM Platform Computing Integration Solutions March 2013 SG24-8081-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (March 2013) This edition applies to IBM Platform Symphony 6.1, IBM Platform Symphony 5.2, IBM Platform LSF 8.3, IBM InfoSphere BigInsights 1.4, Red Hat Enterprise Linux (RHEL) 6.2 x86_64, and RHEL 6.3 x86_64. © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team who wrote this book . ix Now you can become a published author, too! . xi Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Products and portfolio for IBM Platform Computing solutions . 1 1.1 IBM Platform LSF . 2 1.1.1 IBM Platform LSF editions . 2 1.1.2 IBM Platform LSF add-ons . 4 1.1.3 New in the IBM Platform LSF V9.1 family. 4 1.2 IBM Platform HPC. 4 1.3 IBM Platform Symphony . 5 1.3.1 IBM Platform Symphony edition features . 5 1.3.2 IBM Platform Symphony add-on tools. 6 1.3.3 New in IBM Platform Symphony V6.1. 6 1.4 IBM Platform Cluster Manager . 14 1.4.1 IBM Platform Cluster Manager features . 15 1.4.2 IBM Platform Cluster Manager supported environments . 15 Chapter 2. Integration of IBM Platform Symphony and IBM InfoSphere BigInsights. 17 2.1 IBM Platform Symphony . 18 2.1.1 How InfoSphere BigInsights works with IBM Platform Symphony . 18 2.1.2 The IBM Platform Symphony performance advantage . 20 2.2 Environment . 21 2.2.1 Preconfiguration on all nodes . 21 2.3 Configuring InfoSphere BigInsights. 26 2.4 Installing IBM Platform Symphony Advanced Edition . 29 2.5 Integrating IBM Platform Symphony and InfoSphere BigInsights . 31 2.6 Additional configuration for IBM Platform Symphony . 34 2.6.1 Identifying the management nodes in the IBM Platform Symphony configuration 34 2.6.2 TCP/IP performance tuning . 35 2.7 Benchmark tests . 36 2.7.1 Test environment and monitoring tools. 36 2.7.2 Results of the stand-alone benchmark for InfoSphere BigInsights V1.4. 37 2.7.3 Results of integration for IBM Platform Symphony V5.2 and InfoSphere BigInsights V1.4 . 38 2.7.4 Advantages of integrating IBM Platform Symphony V5.2 with InfoSphere BigInsights V1.4 . 41 2.8 Adding users . 43 2.8.1 Assumptions . 44 2.8.2 Adding a user for the integrated cluster . 44 2.9 Adding nodes . 46 2.10 Troubleshooting . 47 2.10.1 InfoSphere BigInsights . 47 2.10.2 Increasing Java virtual memory . 47 © Copyright IBM Corp. 2013. All rights reserved. iii 2.10.3 Increasing system limits . 48 Chapter 3. Implementation scenario for IBM Platform LSF. 49 3.1 Valid hardware resources to ensure that the setup can use IBM Platform LSF . 50 3.2 Sizing for I/O-intensive clusters. 50 3.3 Considerations for GPGPU intensive clusters . 51 3.4 Job queues . 51 3.4.1 Defining queues . 51 3.4.2 Default queue . 53 3.4.3 Managing queues . 54 3.5 Job scheduling . 54 3.5.1 First come, first served . 55 3.5.2 Preemption scheduling . 55 3.5.3 Fairshare scheduling. 56 3.5.4 Exclusive scheduling. 59 3.5.5 Backfill scheduling . 60 3.6 Goal-oriented scheduling . 61 3.6.1 Defining a service class . 61 3.6.2 Using a service class . 62 3.7 Job submission . 63 3.7.1 Job arrays . 65 3.7.2 Lifecycle of jobs . 67 3.8 Compute units . 69 3.8.1 Configuring compute units . 69 3.8.2 Using compute units . 70 3.9 Application profiles . 73 3.9.1 Defining application profiles . 73 3.9.2 Using application profiles . 74 3.10 Job submission prechecks and setup . 75 3.10.1 Modifying a submitted job . ..
Recommended publications
  • IBM Platform Symphony V5.2 Enables Scalable, High- Performance Grid Services for a Variety of Parallel Compute and Data Intensive Applications
    IBM United States Software Announcement 212-204, dated June 4, 2012 IBM Platform Symphony V5.2 enables scalable, high- performance grid services for a variety of parallel compute and data intensive applications Table of contents 1 Overview 7 Publications 2 Key prerequisites 8 Technical information 2 Planned availability date 13 Ordering information 2 Description 16 Terms and conditions 4 Product positioning 19 Prices 6 Program number 20 Order now At a glance IBM® Platform SymphonyTM V5.2 helps you exceed your performance goals with a fast, efficient grid computing environment. You can realize: • Faster throughput and performance • Higher levels of resource utilization • Reduced infrastructure and management costs • Reduced application development and maintenance costs • The agility to respond instantly to real-time demands For ordering, contact Your IBM representative or an IBM Business Partner. For more information contact the Americas Call Centers at 800-IBM-CALL (426-2255). Reference: YE001 Overview IBM Platform Symphony V5.2 is an enterprise-class grid manager for running distributed application services on a scalable, shared, heterogeneous grid. It accelerates a wide variety of compute and data-intensive applications, quickly computing results while making optimal use of available infrastructure. Platform Symphony's efficient low-latency middleware and scheduling architecture is designed to provide the performance and agility required to predictably meet and exceed throughput goals for the most demanding analytic workloads. Designed
    [Show full text]
  • EMS Web App Installation, Configuration, & User Guides May 2019
    EMS Web App Installation, Configuration, & User Guides May 2019 Accruent, LLC 11500 Alterra Parkway, Suite 110, Austin, TX 78758 www.accruent.com Accruent Confidential and Proprietary, copyright 2019. All rights reserved. This material contains confidential information that is proprietary to, and the property of, Accruent, LLC. Any unauthorized use, duplication, or disclosure of this material, in whole or in part, is prohibited. No part of this publication may be reproduced, recorded, or stored in a retrieval system or transmitted in any form or by any means—whether electronic, mechanical, photographic, or otherwise—without the written permission of Accruent, LLC. The information contained in this document is subject to change without notice. Accruent makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Accruent, or any of its subsidiaries, shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. Accruent Confidential and Proprietary © 2019 Page | i Table of Contents CHAPTER 1: EMS Web App Installation Guide 1 Contact Customer Support 2 CHAPTER 2: EMS Web App (V44.1) Introduction 3 Introduction to the EMS Web App 3 Installation Requirements 3 Upgrade Considerations 3 Contact Customer Support 4 CHAPTER 3: System Architecture 5 CHAPTER 4: Prerequisites and Requirements 7 Prerequisites 7 EMS Database Server Requirements
    [Show full text]
  • EGO Reference
    EGO Reference Platform EGO Version 1.2.3 January 2008 Copyright © 1994-2007 Platform Computing Corporation All rights reserved. Although the information in this document has been carefully reviewed, Platform Computing Corporation (“Platform”) does not warrant it to be free of errors or omissions. Platform reserves the right to make corrections, updates, revisions or changes to the information in this document. UNLESS OTHERWISE EXPRESSLY STATED BY PLATFORM, THE PROGRAM DESCRIBED IN THIS DOCUMENT IS PROVIDED “AS IS” AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL PLATFORM COMPUTING BE LIABLE TO ANYONE FOR SPECIAL, COLLATERAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING WITHOUT LIMITATION ANY LOST PROFITS, DATA, OR SAVINGS, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS PROGRAM. We'd like to hear You can help us make this document better by telling us what you think of the content, organization, and usefulness of the information. from you If you find an error, or just want to make a suggestion for improving this document, please address your comments to [email protected]. Your comments should pertain only to Platform documentation. For product support, contact [email protected]. Document This document is protected by copyright and you may not redistribute or translate it into another language, in part or in whole. redistribution and translation Internal You may only redistribute this document internally within your organization (for example, on an intranet) provided that you continue redistribution to check the Platform Web site for updates and update your version of the documentation.
    [Show full text]
  • Kali Linux Penetration Testing Bible
    Telegram Channel : @IRFaraExam Table of Contents Cover Title Page Introduction What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author CHAPTER 1: Mastering the Terminal Window Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary CHAPTER 2: Bash Scripting Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary CHAPTER 3: Network Hosts Scanning Basics of Networking Network Scanning DNS Enumeration Telegram Channel : @IRFaraExam Summary CHAPTER 4: Internet Information Gathering Passive Footprinting and Reconnaissance Summary CHAPTER 5: Social Engineering Attacks Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary CHAPTER 6: Advanced Enumeration Phase Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary CHAPTER 7: Exploitation Phase Vulnerabilities Assessment Services Exploitation Summary CHAPTER 8: Web Application Vulnerabilities Web Application Vulnerabilities Summary CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle Web Enumeration and Exploitation Secure Software Development Lifecycle Summary CHAPTER 10: Linux Privilege Escalation Telegram Channel : @IRFaraExam Introduction to Kernel Exploits and Missing Configurations
    [Show full text]
  • Platform LSF Foundations Chapter 1
    Platform LSF Version 9 Release 1.3 Foundations SC27-5304-03 Platform LSF Version 9 Release 1.3 Foundations SC27-5304-03 Note Before using this information and the product it supports, read the information in “Notices” on page 21. First edition This edition applies to version 9, release 1 of IBM Platform LSF (product number 5725G82) and to all subsequent releases and modifications until otherwise indicated in new editions. Significant changes or additions to the text and illustrations are indicated by a vertical line (|) to the left of the change. If you find an error in any Platform Computing documentation, or you have a suggestion for improving it, please let us know. In the IBM Knowledge Center, add your comments and feedback to any topic. You can also send your suggestions, comments and questions to the following email address: [email protected] Be sure include the publication title and order number, and, if applicable, the specific location of the information about which you have comments (for example, a page number or a browser URL). When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1992, 2014. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. IBM Platform LSF: An Job submission .............12 Overview ..............1 Job scheduling and dispatch .........13 Introduction to IBM Platform LSF .......1 Host selection .............15 LSF cluster components...........2 Job execution environment .........15 Chapter 2.
    [Show full text]
  • Arxiv:1812.02759V2 [Astro-Ph.IM] 10 Dec 2018 Abstract Twenty Years Have Passed Since first Light for the Sloan Digital Sky Survey (SDSS)
    Draft version December 12, 2018 Preprint typeset using LATEX style emulateapj v. 12/16/11 THE FIFTEENTH DATA RELEASE OF THE SLOAN DIGITAL SKY SURVEYS: FIRST RELEASE OF MANGA DERIVED QUANTITIES, DATA VISUALIZATION TOOLS AND STELLAR LIBRARY D. S. Aguado1, Romina Ahumada2, Andres´ Almeida3, Scott F. Anderson4, Brett H. Andrews5, Borja Anguiano6, Erik Aquino Ort´ız7, Alfonso Aragon-Salamanca´ 8, Maria Argudo-Fernandez´ 9,10, Marie Aubert11, Vladimir Avila-Reese7, Carles Badenes5, Sandro Barboza Rembold12,13, Kat Barger14, Jorge Barrera-Ballesteros15, Dominic Bates16, Julian Bautista17, Rachael L. Beaton18, Timothy C. Beers19, Francesco Belfiore20, Mariangela Bernardi21, Matthew Bershady22, Florian Beutler17, Jonathan Bird23, Dmitry Bizyaev24,25, Guillermo A. Blanc18, Michael R. Blanton26, Michael Blomqvist27, Adam S. Bolton28, Med´ eric´ Boquien9, Jura Borissova29,30, Jo Bovy31,32, William Nielsen Brandt33,34,35, Jonathan Brinkmann24, Joel R. Brownstein36, Kevin Bundy20, Adam Burgasser37, Nell Byler4, Mariana Cano Diaz7, Michele Cappellari38, Ricardo Carrera39, Bernardo Cervantes Sodi40, Yanping Chen41, Brian Cherinka15, Peter Doohyun Choi42, Haeun Chung43, Damien Coffey44, Julia M. Comerford45, Johan Comparat44, Kevin Covey46, Gabriele da Silva Ilha12,13, Luiz da Costa13,47, Yu Sophia Dai48, Guillermo Damke3,50, Jeremy Darling45, Roger Davies38, Kyle Dawson36, Victoria de Sainte Agathe51, Alice Deconto Machado12,13, Agnese Del Moro44, Nathan De Lee23, Aleksandar M. Diamond-Stanic52, Helena Dom´ınguez Sanchez´ 21, John Donor14, Niv Drory53, Helion´ du Mas des Bourboux36, Chris Duckworth16, Tom Dwelly44, Garrett Ebelke6, Eric Emsellem54,55, Stephanie Escoffier11, Jose´ G. Fernandez-Trincado´ 56,2,57, Diane Feuillet58, Johanna-Laina Fischer21, Scott W. Fleming59, Amelia Fraser-McKelvie8, Gordon Freischlad24, Peter M. Frinchaboy14, Hai Fu60, Llu´ıs Galbany5, Rafael Garcia-Dias1,61, D.
    [Show full text]
  • SYMPHONY 5.3.4 User's Manual 1
    SYMPHONY 5.3.4 User’s Manual 1 T.K. Ralphs2 M. G¨uzelsoy3 A. Mahajan4 May 30, 2011 1This research was partially supported by NSF Grants DMS-9527124, DMI-0534862, and DMI-0522796, as well as Texas ATP Grant 97-3604-010. A revised version of Chapters 4 of this manual now appears in the Springer-Verlag book Computational Combinatorial Optimization edited by M. J¨ungerand D. Naddef, see http://link.springer.de/link/service/series/0558/tocs/t2241.htm 2Department of Industrial and Systems Engineering, Lehigh University, Bethlehem, PA 18017, [email protected], http://www.lehigh.edu/~tkr2 3Department of Industrial and Systems Engineering, Lehigh University, Bethlehem, PA 18017, [email protected], http://coral.ie.lehigh.edu/~menal 4Mathematics and Computer Science Division, Argonne National Lab, Argonne, IL 60439 [email protected], http://www.mcs.anl.gov/~mahajan/ °c 2000-2010 Ted Ralphs Acknowledgments First and foremost, many thanks are due to Laci Lad´anyi who worked with me on the development of a very early precursor of SYMPHONY called COMPSys many years ago now and who taught me much of what I then knew about programming. Thanks are due also to Marta Es¨o,who wrote an early draft of this manual for what was then COMPSys. This release would not have been possible without the help of both Menal G¨uzelsoy, who has been instrumental in the development of SYMPHONY since version 4.0, and Ashutosh Mahajan, who has worked on SYMPHONY since version 5.0. In particular, Ashutosh and Menal did all of the work that went into improving SYMPHONY for release 5.2.
    [Show full text]
  • IBM Platform Computing Cloud Service Ready to Use Platform LSF & Symphony Clusters in the Softlayer Cloud
    Platform Computing IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud February 25, 2014 1 © 2014 IBM Corporation Platform Computing Agenda v Mapping clients needs to cloud technologies v Addressing your pain points v Introducing IBM Platform Computing Cloud Service v Product features and benefits v Use cases v Performance benchmarks 2 © 2014 IBM Corporation Platform Computing HPC cloud characteristics and economics are different than general-purpose computing • High-end hardware and special purpose devices (e.g. GPUs) are typically used to supply the needed processing, memory, network, and storage capabilities • The performance requirements of technical computing and service-oriented workloads means that performance may be impacted in a virtualized cloud environment, especially when latency or I/O is a constraint • HPC cluster/grid utilization is usually in the 70-90% range, removing a major potential advantage of a public cloud service provider for stable workload volumes HPC Workloads Recommended for Private Cloud HPC Workloads with Best Potential for Virtualized Public & Hybrid Cloud Primary HPC Workloads 3 © 2014 IBM Corporation Platform Computing IBM’s HPC cloud strategy provides a flexible approach to address a variety of client needs Private Hybrid Public Clouds Clouds Clouds Evolve existing infrastructure to Enable integrated HPC Cloud to enhance approach to improve Access additional responsiveness, HPC cost and HPC capacity with flexibility, and capability variable cost model
    [Show full text]
  • Apache Ofbiz Advanced Framework Training Video Transcription
    Page 1 of 208 Apache OFBiz Advanced Framework Training Video Transcription Written and Recorded by David E. Jones Transcription and Editing by Nathan A. Jones Brought to you by Undersun Consulting Based on: The Apache Open For Business OFBiz.org Project Copyright 2006 Undersun Consulting LLC - All Rights Reserved Page 2 of 208 Copyright 2006 Undersun Consulting LLC Copyright 2006 David E. Jones Some content from The Apache Open For Business Project and is Copyright 2001-2006 Apache Software Foundation Copyright 2006 Undersun Consulting LLC - All Rights Reserved Page 3 of 208 Biz is running inside an application server, this infra- Advanced Framework structure still applies. The Containers and Compo- nents, they're just used in a slightly different way. The Overview easiest way to run OFBiz is out of the box, using the Introducing the Series OFBiz start executable jar file, which uses the con- tainer and component infrastructure to load everything Starting screen site/training/AdvancedFramework.html up, get all the tools started when the application server Hello my name is David Jones, and this is the Ad- shuts down, and to stop all of the tools and such as vanced Framework Training Video from Undersun Con- well. And also to configure each of the framework and sulting. I'll be recording and narrating this. I'm one of applications components that make up the open for the administrators of the Open for Business Project, business project. and offer various services including things like these So we'll talk about those, how they're configured, the training videos through a company that is run by myself different things to do plus some conventions for the and Andy Zeneski called Undersun Consulting.
    [Show full text]
  • Cracking the Lens: Targeting HTTP's Hidden Attack Surface
    Cracking the Lens: Targeting HTTP's Hidden Attack Surface James Kettle - [email protected] - @albinowax Modern websites are browsed through a lens of transparent systems built to enhance performance, extract analytics and supply numerous additional services. This almost invisible attack surface has been largely overlooked for years. In this paper, I'll show how to use malformed requests and esoteric headers to coax these systems into revealing themselves and opening gateways into our victim's networks. I'll share how by combining these techniques with a little Bash I was able to thoroughly perforate DoD networks, trivially earn over $30k in vulnerability bounties, and accidentally exploit my own ISP. While deconstructing the damage, I'll also showcase several hidden systems it unveiled, including not only covert request interception by the UK's largest ISP, but a substantially more suspicious Colombian ISP, a confused Tor backend, and a system that enabled reflected XSS to be escalated into SSRF. You'll also learn strategies to unblinker blind SSRF using exploit chains and caching mechanisms. Finally, to further drag these systems out into the light, I'll release Collaborator Everywhere - an open source Burp Suite extension which augments your web traffic with a selection of the best techniques to harvest leads from cooperative websites. Outline Introduction Methodology Listening Research Pipeline Scaling Up Misrouting Requests Invalid Host Investigating Intent - BT Investigating Intent - Metrotel Input Permutation Host Override Ambiguous Requests Breaking Expectations Tunnels Targeting Auxiliary Systems Gathering Information Remote Client Exploits Preemptive Caching Conclusion Introduction Whether it's ShellShock, StageFright or ImageTragick, the discovery of a serious vulnerability in an overlooked chunk of attack surface is often followed by numerous similar issues.
    [Show full text]
  • Oracle® Java Micro Edition Software Development Kit Developer's Guide Release 3.2 for Windows E24265-04
    Oracle® Java Micro Edition Software Development Kit Developer's Guide Release 3.2 for Windows E24265-04 September 2012 This document describes how to use the Java ME SDK plugin for NetBeans. Oracle Java Micro Edition Software Development Kit, Release 3.2 for Windows E24265-04 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Design and Analysis of Adaptive Caching Techniques for Internet Content Delivery
    Dissertation Design and Analysis of Adaptive Caching Techniques for Internet Content Delivery Thesis approved by the Department of Computer Science of the University of Kaiserslautern (TU Kaiserslautern) for the award of the Doctoral Degree Doctor of Engineering (Dr.-Ing.) to Daniel S. Berger Date of the viva : June 8, 2018 Dean : Prof. Dr. Stefan Deßloch PhD committee Chair : Prof. Dr. Pascal Schweitzer Reviewers : Prof. Dr. Jens B. Schmitt Prof. Dr. Florin Ciucu (University of Warwick) Prof. Dr. Mor Harchol-Balter (Carnegie Mellon University) D 386 Abstract Fast Internet content delivery relies on two layers of caches on the request path. Firstly, content delivery networks (CDNs) seek to answer user requests before they traverse slow Internet paths. Secondly, aggregation caches in data centers seek to answer user requests before they traverse slow backend systems. The key challenge in managing these caches is the high variability of object sizes, request patterns, and retrieval latencies. Unfortunately, most existing literature focuses on caching with low (or no) variability in object sizes and ignores the intricacies of data center subsystems. This thesis seeks to fill this gap with three contributions. First, we design a new caching system, called AdaptSize, that is robust under high object size variability. Sec- ond, we derive a method (called Flow-Offline Optimum or FOO) to predict the optimal cache hit ratio under variable object sizes. Third, we design a new caching system, called RobinHood, that exploits variances in retrieval latencies to deliver faster responses to user requests in data centers. The techniques proposed in this thesis significantly improve the performance of CDN and data center caches.
    [Show full text]