Learning About Distributed Systems
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ETSI TR 102 659-1 V1.2.1 (2009-10) Technical Report
ETSI TR 102 659-1 V1.2.1 (2009-10) Technical Report GRID; Study of ICT Grid interoperability gaps; Part 1: Inventory of ICT Stakeholders 2 ETSI TR 102 659-1 V1.2.1 (2009-10) Reference RTR/GRID-0001-1[2] Keywords analysis, directory, ICT, interoperability, testing ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. -
TR 102 659-1 V1.1.1 (2008-06) Technical Report
ETSI TR 102 659-1 V1.1.1 (2008-06) Technical Report GRID; Study of ICT Grid interoperability gaps; Part 1: Inventory of ICT Stakeholders 2 ETSI TR 102 659-1 V1.1.1 (2008-06) Reference DTR/GRID-0001-1 Keywords analysis, directory, ICT, interoperability, testing ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. -
SAIC: Identifying Configuration Files for System Configuration Management
SAIC: Identifying Configuration Files for System Configuration Management Zhen Huang, David Lie University of Toronto [email protected],[email protected] ABSTRACT However, these solutions are not quite satisfactory for recover- Systems can become misconfigured for a variety of reasons suchas ing from misconfigurations. Versioning an entire disk or file system operator errors or buggy patches. When a misconfiguration is dis- consumes a lot of disk space. As a result, such systems take snap- covered, usually the first order of business is to restore availability, shots, so they may miss file versions, and even then, usually can often by undoing the misconfiguration. To simplify this task, we only maintain several weeks’ worth of versions. In addition, when propose the Statistical Analysis for Identifying Configuration Files a misconfiguration occurs, the user is confronted with a legion (SAIC), which analyzes how the contents of a file changes over time of files and versions within which she must find the causeofthe to automatically determine which files contain configuration state. problem. Thus, current versioning systems will only work if the In this way, SAIC reduces the number of files a user must manu- cause of the misconfiguration is recent, and still require the userto ally examine during recovery and allows versioning file systems to try rolling back many different files to find the right one. make more efficient use of their versioning storage. Manually maintaining versions in revision control or manual The two key insights that enable SAIC to identify configuration backup reduces the number of files versioned, saving both space and files are that configuration state must persist across executions of effort. -
Cloud Computing: a Practical Approach
Cloud Computing: A Practical Approach Anthony T. Velte Toby J. Velte, Ph.D. Robert Elsenpeter New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2010 by The McGraw-Hill Companies. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-162695-8 MHID: 0-07-162695-6 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-162694-1, MHID: 0-07-162694-8. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please e-mail us at [email protected]. Information has been obtained by McGraw-Hill from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill, or others, McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information. -
LISA14 Proceedings Interior
USENIX Association Proceedings of the 28th Large Installation System Administration Conference (LISA14) November 9–14, 2014 Seattle, WA Conference Organizers Program Chair Workshops Coordinator Nicole Forsgren Velasquez, Utah State University Cory Lueninghoener, Los Alamos National Laboratory Content Coordinators USENIX Board Liaisons Amy Rich, Mozilla Corporation David Blank-Edelman, Northeastern University College Adele Shakal, Cisco of Computer and Information Science Carolyn Rowland, NIST Research Committee Co-Chairs Kyrre Begnum, Oslo University College of USENIX Training Program Manager Applied Sciences Rik Farrow, Security Consultant Marc Chiarini, MarkLogic Corporation Tutorial Coordinators Research Committee Thomas A. Limoncelli, Stack Exchange, Inc. Theophilus Benson, Duke University Matthew Simmons, Northeastern University Adam Oliner, University of California, Berkeley and Kuro Labs LISA Lab Chair Paul Krizak, Qualcomm, Inc. Invited Talks Coordinators Patrick Cable, MIT Lincoln Laboratory LISA Lab Coordinator Chris McEniry, Sony Network Entertainment Doug Hughes, D. E. Shaw Research, LLC Matthew Simmons, Northeastern University LISA Build Coordinators Branson Matheson, Blackphone Invited Talks Committee Brett Thorsen, Cranial Thunder Solutions John Looney, Google, Inc. Branson Matheson, Blackphone Local Chair Gareth Rushgrove, Puppet Labs Lee Damon, University of Washington Jeffrey Snover, Microsoft THE USENIX Staff Mandi Walls, Chef John Willis, Stateless Networks Lightning Talks Coordinator Lee Damon, University of Washington