CQRTRICTING-OUT: a CASE for Reallsllc COWTRACT VS

Total Page:16

File Type:pdf, Size:1020Kb

CQRTRICTING-OUT: a CASE for Reallsllc COWTRACT VS Y’? CQRTRICTING-OUT: A CASE FOR REALlSllC COWTRACT VS. IN-HOUSE DECISION-MAKlRS STATUS OF FORCES AGREEMENTS AS A BASIS FOR UNITED STATES CUSTODY OF AN ACCUSED MARTIAL LAW TODAY TBE STAFF 1UD6E ADVOCATE AS LEGAL HE POST SUR6EOH: MlllfilACflCf, NESLICENCE AW0 RELATED MATTERS Cornme& DEFENSE IN OUTER SPACE c PREFACE The Military Law Review is designed to provide a medium for those interested in the field of military law to share the product of their experience and research with their fellow lawyers. Arti- cles should be of direct concern and import in this area of schol- arship, and preference will be given to those articles having last- ing value as reference material for the military lawyer. The Military Law Review does not purport to promulgate De- partment of the Army policy or to be in any sense directory. The opinions reflected in each article are those of the author and do not necessarily reflect the views of The Judge Advocate General or the Department of the Army. Articles, comments, and notes should be submitted in duplicate, triple spaced, to the Editor, Military Law Review, The Judge Ad- vocate General’s School, U.S. Army, Charlottesville, Virginia 22901. Footnotes should be triple spaced, set out on pages sepa- rate from the text. Citations should conform to A Uniform Sys- tem of Citation (11th ed. 1967)) copyright by the Columbia, Har- vard, and University of Pennsylvania Law Reviews and the Yale Law Journal. This Review may be cited as 49 Mil. L. Rev. (number of page) (1970) (DA Pam 27-100-49,l July 1970). For sale by the Superintendent of Documents United States Government Printing Office, Washington, D.C. 20402, Price : $.75 (single copy). Subscription price : $2.50 a year ; $.75 additional for foreign mailing. i Pam 27-100-49 PAMPHLET HEADQUARTERS DEPARTMENT OF THE ARMY NO. 27-100-49 I WASHINGTON, D.C., 1 July 1970 MILITARY LAW REVIEW-VOL. 49 Page Articles : Contracting-Out : A Case for Realistic Contract Vs. In-House Decision-Making Major John G. Wildermuth __..- - - - ~- - - ~ ~.- -. 1 Status of Forces Agreements As A Basis for United States Custody Of An Accused Major Stratton R. Heath, Jr. --.-..~~-- .-. 45 Martial Law Today Frederick Bernays Wiener ~ -.~ ~ 89 The Staff Judge Advocate as Legal Adviser to the Post Surgeon : Malpractice, Hospital Negligence and Related Matters Major Richard E. Cumming - - ~ - . .- .- 109 Comments: Defense in Outer Space (Lieutenant Colonel George D. Schrader) - -.- . 157 iii CONTRACTING-OUT: A CASE FOR REALISTIC CONTRACT VS. IN-HOUSE DECISION-MAKING* By Major John G. Wildermuth"':' Contracting officers frequently have to decide between using military or federal service employees and con- tracting out to private enterprise for support services. The author discusses the expressed policy in favor of contracting-out, and how it has been eroded by numerous decisions of the Bureau of the Budget, the General Ac- counting Office, the Department of Defense, and the Army itself. In conclusion, the author suggests that the decision be made easier by redefining the criteria on which it is based, and by elevating the decisionmaking function to an authority who has the necessary resources to make a sound decision. I. INTRODUCTION The Government of the United States currently spends an esti- mated twenty billion dollars annually for support services.1 Sup- port services are those operations ancillary to the function of a government agency, which do not involve a product and can be performed either by "in-house" personnel (active duty military and civil service employees) or by civilian personnel furnished by private contractors.2 Expenditures by all government agencies for support services obtained by contract approach eight and one-quarter billion dollars annually, seven and three-quarters bil- lion of which are accounted for by the Department of Defen~e.~ Contracting-out, as the government practice of obtaining goods and services from private industry has often been labeled, is based primarily on a permissive policy declaration by the Presi- *This article was adapted from a thesis presented to The Judge Ad- vocate General's School, U.S. Army, Charlottesville, Virginia, while the author was a member of the Seventeenth Advanced Course. The opinions and conclusions presented herein are those of the author and do not necessarily represent the views of The Judge Advocate General's School or any other governmental agency. ** JAGC, U.S. Army; Assistant Command Staff Judge Advocate, U.S. Army Aviation Systems Command, St. Louis, Missouri; B.S., 1961, United States Military Academy; LL.B., 1967, Duke Law School; member of the North Carolina Supreme Court, the Federal District Court for the Eastern District of North Carolina, the North Carolina State Bar, and the U.S. Court of Military Appeals. 'Hearings on a Cost Profile for Support Services Before a Subcomm. of the House Comm. on Government Operations, 90th Cong., 2d Sess. 1 (1968) [hereinafter cited as 1968 Hearings]. 2H.R. REP. NO. 1850, 90th Cong., 2d Sess. 1 (1968). '1968 Hem'ngs 2. 1 49 MILITARY LAW REVIEW dent that the Government will rely prima$& upon the private en- terprise system to supply its needs.4 Restricting this espoused policy in favor of the private enter- prise system in the area of support services, and often in conflict with it, are administrative interpretations of various contract- ing-out activities by the General Accounting Office and Civil Ser- vice Commission. Decision-making organs of these agencies have interpreted existing federal personnel statutes to mean that cer- tain services-((personal services”-may be performed only by government employees and have often struck down contracts for such services as having effectively violated those laws.5 Inter- meshed between the initial policy in favor of contracting-out and decisions by the Comptroller General and the General Counsel of the Civil Service Commission restricting that policy is the cur- rent requirement for a cost analysis of in-house vs. contracted-out alternatives. Frequent conflicts between the policy, administrative decision and cost analysis procedures have created a number of problems, not the least of which is the difficulty operational-level personnel have performing their mission under existing regulations. Faced with time limits, such personnel often decide to follow the proce- durally easier path of contracting-out, ’in obvious disregard of in- terpretive and regulatory restrictions. Furthermore, such person- nel do not always have the resources to make a sound decision be- tween contracting out and developing in-house capabilities. This article analyzes the apparent conflict between policy and practice in the area of contracting-out in general, with special emphasis on contracting-out for support services, to determine : (1) Whether there still exists, in fact, a policy in favor of contracting-out to private industry and, if so, what the legal and practical limits of that policy are ; and (2) What corrective action, if any, is necessary, either under existing law or in the form of additional legislation, to resolve the problem of ambiguity and lack of definitive guidance in this area of policy vs. practice, and to permit realistic “contract vs. in- house’’ decision-making, either at the operational or at a higher level. ‘BUREAU OF THE BUDGET, CIRC. NO. A-76, POLICIES FOR ACQUIRING COMMERCIAL OR INDUSTRIAL PRODUCTS AND SERVICES FOR GOVERNMENT USE, para. 2 (Revised 1967) [hereinafter cited as CIRC. A-76 (Revised)]. ‘See note 126 infra and accompanying text. CIRC. A-76 (Revised), para. 6. 2 CONTRACTING OUT 11. DEVELOPMENT OF THE POLICY A. GENERAL Since the early 1950’s, the Government has initiated and pur- sued a policy which encourages the use of private enterprise to satisfy government requirements for goods and services. The pol- icy, as first expressed, was grounded primarily on Executive con- cern about government competition with private enterprise.? Congressional support for the policy has been manifested by nu- merous committee hearings in both houses and various proposals of legislation.* Also, the various government agencies, including the important Department of Defense, have expressed their in- terpretive affirmance of the policy since its in~eption.~ An examination of the development of the policy will show that it exists now in much weaker form, having fallen victim to con- siderations of cost and those who desire to perpetuate the govern- ment’s imvolvement in business.10 B. THE BUREAU OF THE BUDGET The public first became aware of the Government‘s pro-private enterprise policy in 1954 when, in his first budget message to Congress after taking office, President Eisenhower stated : “This budget marks the begninning of a movement to shift to , . pri- ‘See note ll infra and accompanying text. STAFF OF SENATE COMM. ON GOVERNMENT OPERATIONS, 88th Cong., 1st Sess., REPORT ON GOVERNMENT COMPETITION WITH PRIVATE ENTERPRISE 14, 19 (Comm. Print 1963) [hereinafter cited as 1963 Comm. Print]. Congressional committees have studied numerous aspects of the problem of government competition with private enterprise in various hearings begun in an ex- tensive study in 1932 by a Special Committee of the House of Representa- tives, and have not since abated. During the referenced period, investigations were made by the Senate, and House Appropriations Committees, the House Armed Services Committee, the Senate and House Committee on Govern- ment Operations, and the Senate Select Committee on Small Businss. Id. at 14-24. Dep’t of Defense Directive No.
Recommended publications
  • Melinda's Marks Merit Main Mantle SYDNEY STRIDERS
    SYDNEY STRIDERS ROAD RUNNERS’ CLUB AUSTRALIA EDITION No 108 MAY - AUGUST 2009 Melinda’s marks merit main mantle This is proving a “best-so- she attained through far” year for Melinda. To swimming conflicted with date she has the fastest her transition to running. time in Australia over 3000m. With a smart 2nd Like all top runners she at the State Open 5000m does well over 100k a champs, followed by a week in training, win at the State Open 10k consisting of a variety of Road Champs, another sessions: steady pace, win at the Herald Half medium pace, long slow which doubles as the runs, track work, fartlek, State Half Champs and a hills, gym work and win at the State Cross swimming! country Champs, our Melinda is looking like Springs under her shoes give hot property. Melinda extra lift Melinda began her sports Continued Page 3 career as a swimmer. By 9 years of age she was representing her club at State level. She held numerous records for INSIDE BLISTER 108 Breaststroke and Lisa facing racing pacing Butterfly. Her switch to running came after the McKinney makes most of death of her favourite marvellous mud moment Coach and because she Weather woe means Mo wasn’t growing as big as can’t crow though not slow! her fellow competitors. She managed some pretty fast times at inter-schools Brent takes tumble at Trevi champs and Cross Country before making an impression in the Open category where she has Champion Charles cheered steadily improved. by chance & chase challenge N’Lotsa Uthastuff Melinda credits her swimming background for endurance
    [Show full text]
  • The Basic Principles of Data Compression
    The Basic Principles of Data Compression Author: Conrad Chung, 2BrightSparks Introduction Internet users who download or upload files from/to the web, or use email to send or receive attachments will most likely have encountered files in compressed format. In this topic we will cover how compression works, the advantages and disadvantages of compression, as well as types of compression. What is Compression? Compression is the process of encoding data more efficiently to achieve a reduction in file size. One type of compression available is referred to as lossless compression. This means the compressed file will be restored exactly to its original state with no loss of data during the decompression process. This is essential to data compression as the file would be corrupted and unusable should data be lost. Another compression category which will not be covered in this article is “lossy” compression often used in multimedia files for music and images and where data is discarded. Lossless compression algorithms use statistic modeling techniques to reduce repetitive information in a file. Some of the methods may include removal of spacing characters, representing a string of repeated characters with a single character or replacing recurring characters with smaller bit sequences. Advantages/Disadvantages of Compression Compression of files offer many advantages. When compressed, the quantity of bits used to store the information is reduced. Files that are smaller in size will result in shorter transmission times when they are transferred on the Internet. Compressed files also take up less storage space. File compression can zip up several small files into a single file for more convenient email transmission.
    [Show full text]
  • Optimal Parsing for Dictionary Text Compression Alessio Langiu
    Optimal Parsing for dictionary text compression Alessio Langiu To cite this version: Alessio Langiu. Optimal Parsing for dictionary text compression. Other [cs.OH]. Université Paris-Est, 2012. English. NNT : 2012PEST1091. tel-00804215 HAL Id: tel-00804215 https://tel.archives-ouvertes.fr/tel-00804215 Submitted on 25 Mar 2013 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UniversitadegliStudidiPalermo` Dipartimento di Matematica e Applicazioni Dottorato di Ricerca in Matematica e Informatica XXIII◦ Ciclo - S.S.D. Inf/01 UniversiteParis-Est´ Ecole´ doctorale MSTIC Th´ese de doctorat en Informatique Optimal Parsing for Dictionary Text Compression Author: LANGIU Alessio Ph.D. Thesis in Computer Science April 3, 2012 PhD Commission: Thesis Directors: Prof. CROCHEMORE Maxime University of Paris-Est Prof. RESTIVO Antonio University of Palermo Examiners: Prof. ILIOPOULOS Costas King’s College London Prof. LECROQ Thierry University of Rouen Prof. MIGNOSI Filippo University of L’Aquila Referees: Prof. GROSSI Roberto University of Pisa Prof. ILIOPOULOS Costas King’s College London Prof. LECROQ Thierry University of Rouen ii Summary Dictionary-based compression algorithms include a parsing strategy to transform the input text into a sequence of dictionary phrases. Given a text, such process usually is not unique and, for compression purposes, it makes sense to find one of the possible parsing that minimize the final compres- sion ratio.
    [Show full text]
  • Acronis Revive 2019
    Acronis Revive 2019 Table of contents 1 Introduction to Acronis Revive 2019 .................................................................................3 1.1 Acronis Revive 2019 Features .................................................................................................... 3 1.2 System Requirements and Installation Notes ........................................................................... 4 1.3 Technical Support ...................................................................................................................... 5 2 Data Recovery Using Acronis Revive 2019 .........................................................................6 2.1 Recover Lost Files from Existing Logical Disks ........................................................................... 7 2.1.1 Searching for a File ........................................................................................................................................ 16 2.1.2 Finding Previous File Versions ...................................................................................................................... 18 2.1.3 File Masks....................................................................................................................................................... 19 2.1.4 Regular Expressions ...................................................................................................................................... 20 2.1.5 Previewing Files ............................................................................................................................................
    [Show full text]
  • Archive and Compressed [Edit]
    Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc.
    [Show full text]
  • The Pillars of Lossless Compression Algorithms a Road Map and Genealogy Tree
    International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 6 (2018) pp. 3296-3414 © Research India Publications. http://www.ripublication.com The Pillars of Lossless Compression Algorithms a Road Map and Genealogy Tree Evon Abu-Taieh, PhD Information System Technology Faculty, The University of Jordan, Aqaba, Jordan. Abstract tree is presented in the last section of the paper after presenting the 12 main compression algorithms each with a practical This paper presents the pillars of lossless compression example. algorithms, methods and techniques. The paper counted more than 40 compression algorithms. Although each algorithm is The paper first introduces Shannon–Fano code showing its an independent in its own right, still; these algorithms relation to Shannon (1948), Huffman coding (1952), FANO interrelate genealogically and chronologically. The paper then (1949), Run Length Encoding (1967), Peter's Version (1963), presents the genealogy tree suggested by researcher. The tree Enumerative Coding (1973), LIFO (1976), FiFO Pasco (1976), shows the interrelationships between the 40 algorithms. Also, Stream (1979), P-Based FIFO (1981). Two examples are to be the tree showed the chronological order the algorithms came to presented one for Shannon-Fano Code and the other is for life. The time relation shows the cooperation among the Arithmetic Coding. Next, Huffman code is to be presented scientific society and how the amended each other's work. The with simulation example and algorithm. The third is Lempel- paper presents the 12 pillars researched in this paper, and a Ziv-Welch (LZW) Algorithm which hatched more than 24 comparison table is to be developed.
    [Show full text]
  • Vital and Health Statistics; Series 10, No. 40
    NATIONAL CENTER For HEALTH STATISTICS VITAL and HEALTH STATISTICS DATA FROM THE NATIONAL HEALTH SURVEY PROPEfW OFTHE PUBLICATIONSBRANCH EOIT(IRIAL LIBRARY characteristics of Persons With Diabetes United States =July 1964-June 1965 Statistics on the prevalence of diabetes as reported in inter- views, the socioeconomic and health characteristics of dia­ betics, their disabi Iity from diobetes and from all chronic con- ditions, and type of medical and hame care. Based on data collected in household interviews during the period July 1964- June 1965. Washington, D.C. Ocfober 1967 U.S. DEPARTMENT OF HEALTH, EDUCATION, AND WELFARE Public Health Service John W. Gardner William H. Stewart Secretary Surgeon General ~ublic Health Service Publication No. 10@O-Series IO-NO. 40 For sale by the Superintendent of Documents, U.S. flovernment F’rinting Office. \\’ashington, D.C. , !20402 - Price 35 cents NATIONAL CENTER FOR HEALTH STATISTICS FORREST E. LIND13R, PH. D., DirectoT THEODORE D. WOOLSEY, Deputy Dzrector OSWALD K. SAGEN, PH. D., Assistant Director /or State Relatzons WALT R. SIMMONS,M.A., Statzstt cal A dvz sor PHILIP S. LAWRENCE, .SC. D. , Pbzning o//zcer ALICE M. WATERHOUSE, M.D., MedrcaI Consultant JAMES E. KELLY, D.D.S., Dental Advzsor LOUIS R. STOLCIS, M.A., Executzve O//7cer DONALD GREEN, in/ormation O//icer DIVISION OF HEALTH INTERVIEW STATISTICS ELIJAH L. WHITE, AM., Dz~ecfo7 ROBERT R. FUCHSBERG, Chief Survey Methods Branch GERALDINE A. GLEESON, Chic/, Analysis and Reports Branch COOPERATION OF THE BUREAU OF THE CENSUS Under the legislation establishing the National Health Survey, the Public Health Service is authorized to use, insofar as possible, the services or facilities of other Federal, State, or private agencies.
    [Show full text]
  • The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on Iot Nodes in Smart Cities
    sensors Article The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities Ammar Nasif *, Zulaiha Ali Othman and Nor Samsiah Sani Center for Artificial Intelligence Technology (CAIT), Faculty of Information Science & Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia; [email protected] (Z.A.O.); [email protected] (N.S.S.) * Correspondence: [email protected] Abstract: Networking is crucial for smart city projects nowadays, as it offers an environment where people and things are connected. This paper presents a chronology of factors on the development of smart cities, including IoT technologies as network infrastructure. Increasing IoT nodes leads to increasing data flow, which is a potential source of failure for IoT networks. The biggest challenge of IoT networks is that the IoT may have insufficient memory to handle all transaction data within the IoT network. We aim in this paper to propose a potential compression method for reducing IoT network data traffic. Therefore, we investigate various lossless compression algorithms, such as entropy or dictionary-based algorithms, and general compression methods to determine which algorithm or method adheres to the IoT specifications. Furthermore, this study conducts compression experiments using entropy (Huffman, Adaptive Huffman) and Dictionary (LZ77, LZ78) as well as five different types of datasets of the IoT data traffic. Though the above algorithms can alleviate the IoT data traffic, adaptive Huffman gave the best compression algorithm. Therefore, in this paper, Citation: Nasif, A.; Othman, Z.A.; we aim to propose a conceptual compression method for IoT data traffic by improving an adaptive Sani, N.S.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 8,013,862 B2 Mathe (45) Date of Patent: Sep
    US0080 13862B2 (12) United States Patent (10) Patent No.: US 8,013,862 B2 Mathe (45) Date of Patent: Sep. 6, 2011 (54) TEXTURE CODEC 2004/O151372 A1* 8, 2004 Reshetov et al. ............. 382,166 2004/0227552 Al 11/2004 Markovic et al. 327/215 (75) Inventor: Zsolt Mathe, Issaquah, WA (US) 2005/0206784 A1* 9, 2005 Li et al. ......... ... 348/441 2006, OO17722 A1 1/2006 Hong et al. ... 345,419 2006/0092.169 A1 5, 2006 Wetzel ....... 345,582 (73) Assignee: Microsoft Corporation, Redmond, WA 2006/0268990 A1* 11, 2006 Lin et al. .... 375,240.24 (US) 2007/0070.083 A1* 3, 2007 Fouladi et al. ................ 345 604 2007, 0140554 A1* 6, 2007 Strom et al. .. ... 382,166 (*) Notice: Subject to any disclaimer, the term of this 2007/0172120 A1, 7/2007 Roimela et al... ... 382,166 patent is extended or adjusted under 35 2007/024208.6 A1* 10/2007 Tsujimoto et al. ............ 345,632 U.S.C. 154(b) by 890 days. OTHER PUBLICATIONS (21) Appl. No.: 11/941,337 DXTex Tool, (C) 2007. http://msdn.microsoft.com/archive, 3 pages, date unknown. (22) Filed: Nov. 16, 2007 van Waveren, J.M.P., “Real-Time DXT Compression'. May 20, 2006, http://cache-www.intel.com, 43 pages. (65) Prior Publication Data van Waveren, J.M.P., “Real-Time Texture Streaming & Decompres sion”, Nov. 11, 2006, http://softwarecommunity.intel.com, 57 pages. US 2009/O128576A1 May 21, 2009 * cited by examiner (51) Int. Cl. G09G 5/00 (2006.01) Primary Examiner — M Good Johnson (52) U.S. Cl.
    [Show full text]
  • Answers to Exercises
    Answers to Exercises A bird does not sing because he has an answer, he sings because he has a song. —Chinese Proverb Intro.1: abstemious, abstentious, adventitious, annelidous, arsenious, arterious, face- tious, sacrilegious. Intro.2: When a software house has a popular product they tend to come up with new versions. A user can update an old version to a new one, and the update usually comes as a compressed file on a floppy disk. Over time the updates get bigger and, at a certain point, an update may not fit on a single floppy. This is why good compression is important in the case of software updates. The time it takes to compress and decompress the update is unimportant since these operations are typically done just once. Recently, software makers have taken to providing updates over the Internet, but even in such cases it is important to have small files because of the download times involved. 1.1: (1) ask a question, (2) absolutely necessary, (3) advance warning, (4) boiling hot, (5) climb up, (6) close scrutiny, (7) exactly the same, (8) free gift, (9) hot water heater, (10) my personal opinion, (11) newborn baby, (12) postponed until later, (13) unexpected surprise, (14) unsolved mysteries. 1.2: A reasonable way to use them is to code the five most-common strings in the text. Because irreversible text compression is a special-purpose method, the user may know what strings are common in any particular text to be compressed. The user may specify five such strings to the encoder, and they should also be written at the start of the output stream, for the decoder’s use.
    [Show full text]
  • Data Compression in Solid State Storage
    Data Compression in Solid State Storage John Fryar [email protected] Santa Clara, CA August 2013 1 Acknowledgements This presentation would not have been possible without the counsel, hard work and graciousness of the following individuals and/or organizations: Raymond Savarda Sandgate Technologies Santa Clara, CA August 2013 2 Disclaimers The opinions expressed herein are those of the author and do not necessarily represent those of any other organization or individual unless specifically cited. A thorough attempt to acknowledge all sources has been made. That said, we’re all human… Santa Clara, CA August 2013 3 Learning Objectives At the conclusion of this tutorial the audience will have been exposed to: • The different types of Data Compression • Common Data Compression Algorithms • The Deflate/Inflate (GZIP/GUNZIP) algorithms in detail • Implementation Options (Software/Hardware) • Impacts of design parameters in Performance • SSD benefits and challenges • Resources for Further Study Santa Clara, CA August 2013 4 Agenda • Background, Definitions, & Context • Data Compression Overview • Data Compression Algorithm Survey • Deflate/Inflate (GZIP/GUNZIP) in depth • Software Implementations • HW Implementations • Tradeoffs & Advanced Topics • SSD Benefits and Challenges • Conclusions Santa Clara, CA August 2013 5 Definitions Item Description Comments Open A system which will compress Must strictly adhere to standards System data for use by other entities. on compress / decompress I.E. the compressed data will algorithms exit the system Interoperability among vendors mandated for Open Systems Closed A system which utilizes Can support a limited, optimized System compressed data internally but subset of standard. does not expose compressed Also allows custom algorithms data to the outside world No Interoperability req’d.
    [Show full text]
  • Better Adaptive Text Compression Scheme
    Journal of Education and Science Vol. 27, No.2, 2018, pp. 48-57 ISSN 1812-125X http://edusj.mosuljournals.com Better Adaptive Text Compression Scheme Duha Amir Sultan Dept. of Biology/ Education College of Girls/ University of Mosul تاريخ اﻻستﻻم 17/04/2012 تاريخ القبول 2012/11/07 الخﻻصة ظهرت طر ق عدي دي لكبس البيدااداتو حاةدي أش ر ددددددددددددددهر طديق اللرق ر ط اللريقد ال قترة أش قبل العال ي ش Ziv ح Lempel حالت رطلق عليها اسددددددددد LZ77و ث طورت طيق اللريق أش قبددل العددال يش Storer و Szymanski لتظهر طريقدد يدديدددي ط LZSS و حالت رعلددن اتددا رفضدل أقارا ساداسقاتها سعي رط طبقن عل اصدو ثيير حخدة ف طاتيش اللريقتيش حي ي ع اللرق اﻷخرى الت تنضوي تحن تصنيف اللرق اليدناأيك ي لكبس البيااات دت أاح ال لف أش اليادددار ل الي يش اد اط رطول تلابق بيش أةزط البيااا ت )الن ص ال شدددمر أادددبقاص حالن ص اليي سدديشددمر اللريق ال قترة ف طيا البحث تعت ي أبير البح ث سإت اطيشو أش الياددار ل الي يش ث أش الي يش ل اليادددددددددددددارو عل الرر رط طيق اللريق تحتان حقتا رطول اوعا أا و ﻻ راها رعل ن اتي ثبس اكبر للبيااات Abstract A data compression scheme suggested by Ziv and Lempel, LZ77, is applied to text compression. A slightly modified version suggested by Storer and Szymanski ,LZSS, is found to achieve compression ratios as good as most existing schemes for a wide range of texts. In these two methods and all other dynamic methods, a text file is searched from left to right to find the longest match between the lookahead buffer (the previously encoded text) and the characters to be encoded.
    [Show full text]