MIGRATORY COMPRESSION Coarse-Grained Data Reordering to Improve Compressibility

Total Page:16

File Type:pdf, Size:1020Kb

MIGRATORY COMPRESSION Coarse-Grained Data Reordering to Improve Compressibility MIGRATORY COMPRESSION Coarse-grained Data Reordering to Improve Compressibility Xing Lin*, Guanlin Lu, Fred Douglis, Philip Shilane, Grant Wallace *University of Utah EMC Corporation Data Protection and Availability Division © Copyright 2014 EMC Corporation. All rights reserved. 1 Overview Compression: finds redundancy among strings within a certain distance (window size) – Problem: window sizes are small, and similarity across a larger distance will not be identified Migratory compression (MC): coarse-grained reorganization to group similar blocks to improve compressibility – A generic pre-processing stage for standard compressors – In many cases, improve both compressibility and throughput – Effective for improving compression for archival storage © Copyright 2014 EMC Corporation. All rights reserved. 2 Background • Compression Factor (CF) = ratio of original / compressed • Throughput = original size / (de)compression time Compressor MAX Window size Techniques gzip 64 KB LZ; Huffman coding bzip2 900 KB Run-length encoding; Burrows-Wheeler Transform; Huffman coding 7z 1 GB LZ; Markov chain-based range coder © Copyright 2014 EMC Corporation. All rights reserved. 3 Background • Compression Factor (CF) = ratio of original / compressed • Throughput = original size / (de)compression time Compressor MAX Window size Techniques gzip 64 KB LZ; Huffman coding bzip2 900 KB Run-length encoding; Burrows-Wheeler Transform; Huffman coding 7z 1 GB LZ; Markov chain-based range coder © Copyright 2014 EMC Corporation. All rights reserved. 4 Background • Compression Factor (CF) = ratio of original / compressed • Throughput = original size / (de)compression time Compressor MAX Window size Techniques Example Throughput vs. CF gzip 64 KB LZ; Huffman coding 14 gzip bzip2 900 KB Run-length encoding; Burrows- 12 Wheeler Transform; Huffman coding 10 (MB/s) 7z 1 GB LZ; Markov chain-based range 8 coder Tput 6 bzip2 4 7z 2 0 Compression 2.0 2.5 3.0 3.5 4.0 4.5 5.0 Compression Factor (X) The larger the window, the better the compression but slower © Copyright 2014 EMC Corporation. All rights reserved. 5 Background • Compression Factor (CF) = ratio of original / compressed • Throughput = original size / (de)compression time Compressor MAX Window size Techniques Example Throughput vs. CF gzip 64 KB LZ; Huffman coding 14 gzip bzip2 900 KB Run-length encoding; Burrows- 12 Wheeler Transform; Huffman coding 10 (MB/s) 7z 1 GB LZ; Markov chain-based range 8 coder Tput 6 bzip2 rzip 4 7z rzip (from rsync): 2 0 Compression intra-file deduplication; 2.0 2.5 3.0 3.5 4.0 4.5 5.0 bzip2 the remainder Compression Factor (X) The larger the window, the better the compression but slower © Copyright 2014 EMC Corporation. All rights reserved. 6 Motivation Compress a single, large file – Traditional compressors are unable to exploit redundancy across a large range of data (e.g., many GB) gz window A B A’ C … (GBs) A” B’ … 7z window transform compress A A’ A” B B’ C … … … compress … Standard compressor mzip © Copyright 2014 EMC Corporation. All rights reserved. 7 Motivation Better compression for long-term retention – Data migration from backup to archive tier – Observation: similar blocks could be scattered across “compression regions” (CRs) in the backup tier CR: unit of data that is CR1 A B C compressed together (e.g. 128 KB) CR2 A’ B’ C’ … Backup tier © Copyright 2014 EMC Corporation. All rights reserved. 8 Motivation Better compression for long-term retention – Data migration from backup to archive tier – Observation: similar blocks could be scattered across “compression regions” (CRs) in the backup tier CR1 A B C CR1 A B C Migrate CR2 A’ B’ C’ CR2 A’ B’ C’ … … Backup tier Archive tier Current practice © Copyright 2014 EMC Corporation. All rights reserved. 9 Motivation Better compression for long-term retention – Data migration from backup to archive tier – Observation: similar blocks could be scattered across “compression regions” (CRs) in the backup tier – Proposal: fill each CR with similar data CR1 A B C CR1 A A’ B B’ Migrate CR2 A’ B’ C’ CR2 C C’ … … … Backup tier Archive tier Migratory compression © Copyright 2014 EMC Corporation. All rights reserved. 10 Recap Migratory compression – Idea: improve compression by grouping similar blocks – Use cases ▪ mzip: compress a single, large file ▪ Data migration for archival storage Considerations ▪ How to identify similar blocks? ▪ How to reorganize blocks efficiently? ▪ Other tradeoffs (refer to the paper) © Copyright 2014 EMC Corporation. All rights reserved. 11 mzip Workflow File Segmentation Segmentation: partition into blocks, calculate similarity “features” Similarity detector Similarity detector: group by content and identify duplicate and Reorganizer similar blocks; output migrate and restore recipe Reorganized file Reorganizer: rearrange the input file – Reorganized file may exist only as a pipe into compressor Compressor Compressed file © Copyright 2014 EMC Corporation. All rights reserved. 12 mzip Workflow Compressed File file Segmentation Decompressor Similarity detector Reorganized file Reorganizer Extract restore Reorganized recipe file Restorer Compressor File Compressed file © Copyright 2014 EMC Corporation. All rights reserved. 13 mzip Example migrate recipe 0 3 1 5 2 4 . Block ID 0 A 1 B File 2 C Similarity 3 A’ detector 4 D 5 B’ … … 0 2 4 1 5 3 . restore recipe © Copyright 2014 EMC Corporation. All rights reserved. 14 mzip Example migrate recipe 0 3 1 5 2 4 . Block ID Reorganize 0 A A 0 1 B A’ 1 File Reorganized 2 C B 2 3 A’ B’ 3 File 4 D C 4 5 B’ D 5 … … … … Restore 0 2 4 1 5 3 . restore recipe © Copyright 2014 EMC Corporation. All rights reserved. 15 Similarity Detection Similarity feature (based on [Broder 1997]) • A strong hash for duplication detection • Features: weak hashes provide hints about similarity among blocks • Two blocks are similar when they share values for some weak hashes Mature technique • REBL: Redundancy Elimination at Block Level [Kulkarni et al. 2004] • WAN Optimized Replication [Shilane et al. 2012] © Copyright 2014 EMC Corporation. All rights reserved. 16 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level 0 A 1 B 2 C 3 A’ 4 D 5 B’ input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 17 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level 0 A 1 B 2 C 3 A’ 4 D 5 B’ input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 18 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level 0 A 1 B A’ 2 C 3 4 D 5 B’ input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 19 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level 0 A 1 A’ 2 C B 3 4 D 5 B’ input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 20 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level 0 A 1 A’ 2 C B 3 B’ 4 D 5 input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 21 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level 0 A 1 A’ 2 B 3 B’ 4 D C 5 input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 22 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level 0 A 1 A’ 2 B 3 B’ 4 C 5 D input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 23 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level ▪ Random IOs 0 A ▪ Fine for memory and SSD 1 A’ 2 B 3 B’ 4 C 5 D input Block-level © Copyright 2014 EMC Corporation. All rights reserved. 24 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level ▪ Random IOs 0 A ▪ Fine for memory and SSD 1st scan 1st 1 B Buffer – Multipass (HDD) 2 C 3 A’ 4 D 5 B’ input Block-levelMultipass © Copyright 2014 EMC Corporation. All rights reserved. 25 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level ▪ Random IOs 0 A ▪ Fine for memory and SSD 1st scan 1st 1 A’ Buffer – Multipass (HDD) 2 C B 3 4 D 5 B’ input Block-levelMultipass © Copyright 2014 EMC Corporation. All rights reserved. 26 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level ▪ Random IOs 0 ▪ Fine for memory and SSD scan 2nd 1 Buffer – Multipass (HDD) 2 C 3 4 D 5 B’ input Block-levelMultipass © Copyright 2014 EMC Corporation. All rights reserved. 27 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level ▪ Random IOs 0 B’ ▪ Fine for memory and SSD scan 2nd 1 C Buffer – Multipass (HDD) 2 D 3 4 5 input Block-levelMultipass © Copyright 2014 EMC Corporation. All rights reserved. 28 Data Reorganization Re-arrange the input file, according to a recipe – Reorganizer & Restorer Options recipe 0 3 1 5 2 4 – Block-level ▪ Random IOs 0 B’ ▪ Fine for memory and SSD scan 2nd 1 C Buffer – Multipass (HDD) 2 D ▪ Convert random IOs into 3 sequential scans 4 5 input Block-levelMultipass © Copyright 2014 EMC Corporation.
Recommended publications
  • The Basic Principles of Data Compression
    The Basic Principles of Data Compression Author: Conrad Chung, 2BrightSparks Introduction Internet users who download or upload files from/to the web, or use email to send or receive attachments will most likely have encountered files in compressed format. In this topic we will cover how compression works, the advantages and disadvantages of compression, as well as types of compression. What is Compression? Compression is the process of encoding data more efficiently to achieve a reduction in file size. One type of compression available is referred to as lossless compression. This means the compressed file will be restored exactly to its original state with no loss of data during the decompression process. This is essential to data compression as the file would be corrupted and unusable should data be lost. Another compression category which will not be covered in this article is “lossy” compression often used in multimedia files for music and images and where data is discarded. Lossless compression algorithms use statistic modeling techniques to reduce repetitive information in a file. Some of the methods may include removal of spacing characters, representing a string of repeated characters with a single character or replacing recurring characters with smaller bit sequences. Advantages/Disadvantages of Compression Compression of files offer many advantages. When compressed, the quantity of bits used to store the information is reduced. Files that are smaller in size will result in shorter transmission times when they are transferred on the Internet. Compressed files also take up less storage space. File compression can zip up several small files into a single file for more convenient email transmission.
    [Show full text]
  • Encryption Introduction to Using 7-Zip
    IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: [email protected] www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff Version: 5.3 Training Guide Introduction to Using 7-Zip Page 2 IT Services Training Introduction to Using 7-Zip Table of Contents Contents Introduction ......................................................................................................................... 4 Compress/encrypt individual files ....................................................................................... 5 Email compressed/encrypted files ....................................................................................... 8 Decrypt an encrypted file ..................................................................................................... 9 Create a self-extracting encrypted file .............................................................................. 10 Decrypt/un-zip a file .......................................................................................................... 14 APPENDIX A Downloading and installing 7-Zip ................................................................. 15 Help and Further Reference ............................................................................................... 18 Page 3 Training Guide Introduction to Using 7-Zip Introduction 7-Zip is an application that allows you to: Compress a file – for example a file that is 5MB can be compressed to 3MB Secure the
    [Show full text]
  • Table of Contents Modules and Packages
    Table of Contents Modules and Packages...........................................................................................1 Software on NAS Systems..................................................................................................1 Using Software Packages in pkgsrc...................................................................................4 Using Software Modules....................................................................................................7 Modules and Packages Software on NAS Systems UPDATE IN PROGRESS: Starting with version 2.17, SGI MPT is officially known as HPE MPT. Use the command module load mpi-hpe/mpt to get the recommended version of MPT library on NAS systems. This article is being updated to reflect this change. Software programs on NAS systems are managed as modules or packages. Available programs are listed in tables below. Note: The name of a software module or package may contain additional information, such as the vendor name, version number, or what compiler/library is used to build the software. For example: • comp-intel/2016.2.181 - Intel Compiler version 2016.2.181 • mpi-sgi/mpt.2.15r20 - SGI MPI library version 2.15r20 • netcdf/4.4.1.1_mpt - NetCDF version 4.4.1.1, built with SGI MPT Modules Use the module avail command to see all available software modules. Run module whatis to view a short description of every module. For more information about a specific module, run module help modulename. See Using Software Modules for more information. Available Modules (as
    [Show full text]
  • The Ark Handbook
    The Ark Handbook Matt Johnston Henrique Pinto Ragnar Thomsen The Ark Handbook 2 Contents 1 Introduction 5 2 Using Ark 6 2.1 Opening Archives . .6 2.1.1 Archive Operations . .6 2.1.2 Archive Comments . .6 2.2 Working with Files . .7 2.2.1 Editing Files . .7 2.3 Extracting Files . .7 2.3.1 The Extract dialog . .8 2.4 Creating Archives and Adding Files . .8 2.4.1 Compression . .9 2.4.2 Password Protection . .9 2.4.3 Multi-volume Archive . 10 3 Using Ark in the Filemanager 11 4 Advanced Batch Mode 12 5 Credits and License 13 Abstract Ark is an archive manager by KDE. The Ark Handbook Chapter 1 Introduction Ark is a program for viewing, extracting, creating and modifying archives. Ark can handle vari- ous archive formats such as tar, gzip, bzip2, zip, rar, 7zip, xz, rpm, cab, deb, xar and AppImage (support for certain archive formats depends on the appropriate command-line programs being installed). In order to successfully use Ark, you need KDE Frameworks 5. The library libarchive version 3.1 or above is needed to handle most archive types, including tar, compressed tar, rpm, deb and cab archives. To handle other file formats, you need the appropriate command line programs, such as zipinfo, zip, unzip, rar, unrar, 7z, lsar, unar and lrzip. 5 The Ark Handbook Chapter 2 Using Ark 2.1 Opening Archives To open an archive in Ark, choose Open... (Ctrl+O) from the Archive menu. You can also open archive files by dragging and dropping from Dolphin.
    [Show full text]
  • Working with Compressed Archives
    Working with compressed archives Archiving a collection of files or folders means creating a single file that groups together those files and directories. Archiving does not manipulate the size of files. They are added to the archive as they are. Compressing a file means shrinking the size of the file. There are software for archiving only, other for compressing only and (as you would expect) other that have the ability to archive and compress. This document will show you how to use a windows application called 7-zip (seven zip) to work with compressed archives. 7-zip integrates in the context menu that pops-up up whenever you right-click your mouse on a selection1. In this how-to we will look in the application interface and how we manipulate archives, their compression and contents. 1. Click the 'start' button and type '7-zip' 2. When the search brings up '7-zip File Manager' (as the best match) press 'Enter' 3. The application will startup and you will be presented with the 7-zip manager interface 4. The program integrates both archiving, de/compression and file-management operations. a. The main area of the window provides a list of the files of the active directory. When not viewing the contents of an archive, the application acts like a file browser window. You can open folders to see their contents by just double-clicking on them b. Above the main area you have an address-like bar showing the name of the active directory (currently c:\ADG.Becom). You can use the 'back' icon on the far left to navigate back from where you are and go one directory up.
    [Show full text]
  • An Optimal Real-Time Controller for Vertical Plasma Stabilization N
    1 An optimal real-time controller for vertical plasma stabilization N. Cruz, J.-M. Moret, S. Coda, B.P. Duval, H.B. Le, A.P. Rodrigues, C.A.F. Varandas, C.M.B.A. Correia and B. Gonc¸alves Abstract—Modern Tokamaks have evolved from the initial ax- presents important advantages since it allows the creation isymmetric circular plasma shape to an elongated axisymmetric of divertor plasmas, the increase of the plasma current and plasma shape that improves the energy confinement time and the density limit as well as providing plasma stability. However, triple product, which is a generally used figure of merit for the conditions needed for fusion reactor performance. However, the an elongated plasma is unstable due to the forces that pull elongated plasma cross section introduces a vertical instability the plasma column upward or downward. The result of these that demands a real-time feedback control loop to stabilize forces is a plasma configuration that tends to be pushed up or the plasma vertical position and velocity. At the Tokamak down depending on the initial displacement disturbance. For Configuration Variable (TCV) in-vessel poloidal field coils driven example, a small displacement downwards results in the lower by fast switching power supplies are used to stabilize highly elongated plasmas. TCV plasma experiments have used a PID poloidal field coils pulling the plasma down, with increased algorithm based controller to correct the plasma vertical position. strength as the plasma gets further from the equilibrium posi- In late 2013 experiments a new optimal real-time controller was tion. To compensate this instability, feedback controllers have tested improving the stability of the plasma.
    [Show full text]
  • Aligning Intent and Behavior in Software Systems: How Programs Communicate & Their Distribution and Organization
    © 2020 William B. Dietz ALIGNING INTENT AND BEHAVIOR IN SOFTWARE SYSTEMS: HOW PROGRAMS COMMUNICATE & THEIR DISTRIBUTION AND ORGANIZATION BY WILLIAM B. DIETZ DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2020 Urbana, Illinois Doctoral Committee: Professor Vikram Adve, Chair Professor John Regehr, University of Utah Professor Tao Xie Assistant Professor Sasa Misailovic ABSTRACT Managing the overwhelming complexity of software is a fundamental challenge because complex- ity is the root cause of problems regarding software performance, size, and security. Complexity is what makes software hard to understand, and our ability to understand software in whole or in part is essential to being able to address these problems effectively. Attacking this overwhelming complexity is the fundamental challenge I seek to address by simplifying how we write, organize and think about programs. Within this dissertation I present a system of tools and a set of solutions for improving the nature of software by focusing on programmer’s desired outcome, i.e. their intent. At the program level, the conventional focus, it is impossible to identify complexity that, at the system level, is unnecessary. This “accidental complexity” includes everything from unused features to independent implementations of common algorithmic tasks. Software techniques driving innovation simultaneously increase the distance between what is intended by humans – developers, designers, and especially the users – and what the executing code does in practice. By preserving the declarative intent of the programmer, which is lost in the traditional process of compiling and linking and building software, it is easier to abstract away unnecessary details.
    [Show full text]
  • Deduplicating Compressed Contents in Cloud Storage Environment
    Deduplicating Compressed Contents in Cloud Storage Environment Zhichao Yan, Hong Jiang Yujuan Tan* Hao Luo University of Texas Arlington Chongqing University University of Nebraska Lincoln [email protected] [email protected] [email protected] [email protected] Corresponding Author Abstract Data compression and deduplication are two common approaches to increasing storage efficiency in the cloud environment. Both users and cloud service providers have economic incentives to compress their data before storing it in the cloud. However, our analysis indicates that compressed packages of different data and differ- ently compressed packages of the same data are usual- ly fundamentally different from one another even when they share a large amount of redundant data. Existing data deduplication systems cannot detect redundant data among them. We propose the X-Ray Dedup approach to extract from these packages the unique metadata, such as the “checksum” and “file length” information, and use it as the compressed file’s content signature to help detect and remove file level data redundancy. X-Ray Dedup is shown by our evaluations to be capable of breaking in the boundaries of compressed packages and significantly Figure 1: A user scenario on cloud storage environment reducing compressed packages’ size requirements, thus further optimizing storage space in the cloud. will generate different compressed data of the same con- tents that render fingerprint-based redundancy identifi- cation difficult. Third, very similar but different digital 1 Introduction contents (e.g., files or data streams), which would other- wise present excellent deduplication opportunities, will Due to the information explosion [1, 3], data reduc- become fundamentally distinct compressed packages af- tion technologies such as compression and deduplica- ter applying even the same compression algorithm.
    [Show full text]
  • Volume 5: DAF Variable Detail Pages
    Anc hor Volume 5: DAF Variable Detail Pages August 2020 Submitted to: Social Security Administration Office of Retirement and Disability Policy Office of Research, Demonstration, and Employment Support Washington, DC 20024-2796 Project Officers: Paul O’Leary and Debra Tidwell-Peters Contract Number: SS00-16-60003 Submitted by: Mathematica 1100 1st Street, NE 12th Floor Washington, DC 20002-4221 Telephone: (202) 484-9220 Facsimile: (202) 863-1763 Project Director: Jody Schimmel Hyde Reference Number: 50214.Y3.T05.530.360 Suggested Citation: “Disability Analysis File 2018 (DAF18) Documentation: Data from January 1994 through December 2018.” Washington, DC: Mathematica, August 2020. This page has been left blank for double-sided copying. MATHEMATICA CONTENTS GLOSSARY .................................................................................................................................................. .v OVERVIEW OF DAF DOCUMENTATION ................................................................................................... .ix QUICK REFERENCE GUIDE ....................................................................................................................... 1 PART A DAF VARIABLE DETAIL PAGES .................................................................................................. 7 PART B RSA VARIABLE DETAIL PAGES .............................................................................................. 635 iii This page has been left blank for double-sided copying. MATHEMATICA GLOSSARY AB Accelerated
    [Show full text]
  • Kafl: Hardware-Assisted Feedback Fuzzing for OS Kernels
    kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Sergej Schumilo1, Cornelius Aschermann1, Robert Gawlik1, Sebastian Schinzel2, Thorsten Holz1 1Ruhr-Universität Bochum, 2Münster University of Applied Sciences Motivation IJG jpeg libjpeg-turbo libpng libtiff mozjpeg PHP Mozilla Firefox Internet Explorer PCRE sqlite OpenSSL LibreOffice poppler freetype GnuTLS GnuPG PuTTY ntpd nginx bash tcpdump JavaScriptCore pdfium ffmpeg libmatroska libarchive ImageMagick BIND QEMU lcms Adobe Flash Oracle BerkeleyDB Android libstagefright iOS ImageIO FLAC audio library libsndfile less lesspipe strings file dpkg rcs systemd-resolved libyaml Info-Zip unzip libtasn1OpenBSD pfctl NetBSD bpf man mandocIDA Pro clamav libxml2glibc clang llvmnasm ctags mutt procmail fontconfig pdksh Qt wavpack OpenSSH redis lua-cmsgpack taglib privoxy perl libxmp radare2 SleuthKit fwknop X.Org exifprobe jhead capnproto Xerces-C metacam djvulibre exiv Linux btrfs Knot DNS curl wpa_supplicant Apple Safari libde265 dnsmasq libbpg lame libwmf uudecode MuPDF imlib2 libraw libbson libsass yara W3C tidy- html5 VLC FreeBSD syscons John the Ripper screen tmux mosh UPX indent openjpeg MMIX OpenMPT rxvt dhcpcd Mozilla NSS Nettle mbed TLS Linux netlink Linux ext4 Linux xfs botan expat Adobe Reader libav libical OpenBSD kernel collectd libidn MatrixSSL jasperMaraDNS w3m Xen OpenH232 irssi cmark OpenCV Malheur gstreamer Tor gdk-pixbuf audiofilezstd lz4 stb cJSON libpcre MySQL gnulib openexr libmad ettercap lrzip freetds Asterisk ytnefraptor mpg123 exempi libgmime pev v8 sed awk make
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Systems Cost/Performance Analysis (Study 2.3) Final Report
    AEROSPffE REPORT NO. AZ "'14(7343)-1, VOL III Systems Cost/Performance Analysis (Study 2.3) Final Report Volume IH: Programmer's Manual and User's Guide Prepared by V'< ADVANCED MISSION ANALYSIS DIRECTORATE Advanced Orbital Systems Division 27 September 1974 Prepared for OFFICE OF MANNED SPACE FLIGHT NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Washington, D.C. 20546 Contract No. NASW-2575 Systems Engineering Operations THE AEROSPACE CORPORATION .(NASA-C-lP3377) SYSTEMS COSr/PERFORACE N75-309211 ANALYSIS (STUDY 2.3). VOLUME 3: IPROG AMER'S MANUAL AND USER'S GUIDE Final Report (Aerospace Corp., El Segundo, Calif.) Unclas 592 p HC $13.25 CSCL 05A G3/8-1 34377 ) Aerospace Report No. ATR-74(7343)-I, Vol, III SYSTEMS COST/PERFORMANCE ANALYSIS (STUDY 2. 3) FINAL REPORT Volume III: Programmer's Manual and User's Guide Prepared by Advanced Mission Analysis Directorate Advanced Orbital Systems Division Z7 September 1974 Systems Engineering Operations THE AEROSPACE CORPORATION El Segundo, California Prepared for OFFICE OF MANNED SPACE FLIGHT NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Washington, D. C. Contract No. NASW-2575 PAGE INTENTIONALLY BLANK Aerospace Report No. ATR-74(7343)-I, Vol. III SYSTEMS COST/PERFORMANCE ANALYSIS (STUDY 2. 3) FINAL REPORT Volume III: Programmer's Manual and User's Guide Prepared R *F.OJ , Man e Data Sys ems An sis Section Data Processing Subdivision Approved L. Sashkin, Director R. H. Herndon, Assoc. Group Data Processing Subdivision Director Information Processing Division Advanced Mission Analysis Engineering Science Operations Directorate Advanced Orbital Systems Division PRECEDING PAGE-iii- BLANK NOT FILMED PAGE INTENTIONALLY BLANK FOREWORD This report documents The Aerospace Corporation effort on Study 2.3, Systems Cost/Perfbrmance Analysis, performed under NASA Contract NASW-2575 during Fiscal Year 1974.
    [Show full text]