Open Elliswilson Dissertation.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Open Elliswilson Dissertation.Pdf The Pennsylvania State University The Graduate School College of Engineering A PROTEAN ATTACK ON THE COMPUTE-STORAGE GAP IN HIGH-PERFORMANCE COMPUTING A Dissertation in Computer Science and Engineering by Ellis H. Wilson III © 2014 Ellis H. Wilson III Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2014 The dissertation of Ellis H. Wilson III was reviewed and approved∗ by the following: Mahmut T. Kandemir Professor of Computer Science and Engineering Dissertation Advisor, Chair of Committee Padma Raghavan Professor of Computer Science and Engineering Wang-Chien Lee Professor of Computer Science and Engineering Christopher Duffy Professor of Civil Engineering Lee Coraor Associate Professor of Computer Science and Engineering Director of Academic Affairs of Computer Science and Engineering ∗Signatures are on file in the Graduate School. ii Abstract Distributed computing, in particular supercomputers, have facilitated a significant acceleration in scientific progress over the last three-quarters of a century by enabling scientists to ask questions that previously held intractable answers. Looking at historical data over the last 20 years for the top supercomputers in the world, we note that they have demonstrated an amazing doubling in performance every 13.5 months, well in excess of Moore’s law. Moreover, as these machines grow in computational power, the magnetic hard disk drives (HDDs) they rely upon to store data to and retrieve data from double in capacity roughly every 18 months. These facts considered in concert provide a foundation for the recent data-driven revolution in the way both scientists and businesses extract useful knowledge from their increasing datasets. However, while computation and capacity potential for these machines is growing at a breathless rate, a disturbing but oft-ignored reality is that the ability to access the data on a given HDDs is shrinking by comparison, doubling only once every decade. In short, this means although the capability to process and store the data scientists and businesses are so excited about is here, the ability to access that data (a prerequisite for processing it) falls behind year in and year out. Therefore, the focus in this thesis is to find ways to limit or close the annually widening compute-to-bandwidth gap, specifically for systems at scale such as supercomputers and the cloud. Recognizing that this problem requires improvement at numerous levels in the storage stack, we take a protean approach to seeking and implementing solutions. Specifically, we attack this problem by researching ways to 1) consolidate our storage devices to maximize aggregate bandwidth while enabling best-of-breed analytic approaches, 2) determine optimal data-reduction techniques such as deduplication and compression in the face of a sea of data and a lack of existing analysis tools, and 3) designing novel algorithms to overcome longevity shortcomings in state-of-the-art alternatives to magnetic storage such as flash-based solid-state disks (SSDs). iii Table of Contents List of Figures vii List of Tables viii Acknowledgments ix Gopher Guts . xiv Chapter 1 Introduction 1 1.1 Problem Statement . 1 1.2 Thesis Statement . 5 1.2.1 Data Consolidation . 6 1.2.2 Data Reduction . 6 1.2.3 Storage Device Improvement . 8 Chapter 2 Data Consolidation: Enabling Big Data Computation atop Tra- ditional HPC NAS Storage 9 2.1 Introduction . 9 2.1.1 The NAS and HPC Narrative . 10 2.1.2 Contributions . 12 2.2 Background . 13 2.2.1 Overview of HDFS . 13 2.2.1.1 Replication in HDFS . 14 2.3 Architectures Explored . 14 2.4 Reliability Analysis . 17 2.4.1 Failure in NAS . 17 2.4.2 Failure in Hadoop . 17 2.4.3 Combining the Architectures . 18 2.4.4 Why Not Just NAS? . 19 iv 2.5 Data Locality and Transport . 20 2.5.1 Write Transport . 20 2.5.2 Read Transport . 21 2.6 RainFS . 22 2.6.1 Design Desirata . 22 2.6.2 Implementation Overview . 23 2.6.3 File Operations . 23 2.6.3.1 Create . 24 2.6.3.2 Delete . 25 2.6.3.3 Move . 26 2.6.4 Failure Handling . 27 2.7 Evaluation . 28 2.7.1 Experimental Setup . 28 2.7.2 Benchmarks . 29 2.7.3 Results . 30 2.8 Related Works . 33 2.9 Conclusion . 34 Chapter 3 Data Reduction: Scalable Deduplication and Compression Eval- uation 35 3.1 Introduction . 35 3.2 Background . 38 3.3 Compression . 38 3.4 Deduplication . 40 3.5 Design of TreeChunks . 43 3.6 Exemplary Evaluation . 46 3.7 Conclusion . 58 Chapter 4 Data Storage Improvement: Extending SSD Longevity 59 4.1 Introduction . 59 4.2 Background . 63 4.2.1 SSD Architecture . 64 4.2.2 NAND Flash Overview . 64 4.2.3 The Physics of Cell Wear-Out . 65 4.3 Wear-Unleveling for Lifetime . 66 4.3.1 The Basics of Wear-Leveling . 66 4.3.2 The Early Switching Pool . 67 4.4 Evaluation . 69 v 4.4.1 Simulation Framework . 69 4.4.2 Experimental Setup . 71 4.4.3 Synthetic Results . 72 4.4.4 Trace-Driven Results . 76 4.5 Related Work . 82 4.6 Conclusion . 84 Chapter 5 Conclusion 85 Bibliography 86 vi List of Figures 1.1 Performance results on HPLinpack for the Top500 supercomputers . 2 1.2 HDD capacity and bandwidth growth over the years . 4 2.1 Flow of write I/Os in traditional HDFS . 13 2.2 Write I/O flows in explored architectures . 15 2.3 Errant pass-through I/O flows . 20 2.4 TeraSort Suite benchmark results for 1 and 2 replicas . 29 2.5 Throughput impact on write-intensive workloads when going from replication level of 1 to 2. 32 3.1 Impact of chunking on data compressability . 40 3.2 Compression efficacy filesystem map . 56 3.3 Deduplication efficacy filesystem map . 57 4.1 ZombieNAND proof-of-concept on raw flash chips . 60 4.2 Typical SSD Architecture . 63 4.3 Lifetime and latency synthetic evaluation for TLC SSDs . 73 4.4 Lifetime and latency synthetic evaluation for MLC SSDs . 74 4.5 Trace address reuse CDF . 78 4.6 Impact of ZombieNAND on lifetime for trace-driven evaluation . 79 4.7 Impact of ZombieNAND on latency for trace-driven workloads . 80 vii List of Tables 2.1 Disk and rack failure tolerance by architecture . 16 2.2 Hardware and VM resources . 28 4.1 Access latency based on operation type and bit-level . 72 4.2 Experimental configurations . 72 4.3 Trace access composition . 77 viii Acknowledgments I proceed with great caution in writing the acknowledgments for my Ph.D. below. On the one hand, it would be utterly callous to not pen down some form of thanks to the many people who have contributed in one way or another towards the successful completion of this milestone in my life. However, on the other, and perhaps what I fear more, it seems almost impossible to enumerate and thank each and every influence that has brought me to this moment in time. Therefore, to whomever I errantly exclude, please forgive the flighty memory of an academic. This dissertation and my Ph.D. on the whole are in no small part attributable to the interactions with and inspiration from three distinct groups in my life: fellow academics, key figures in my distance running career, and my friends and family, which I address in order below. Please note that persons addressed within categories generally follow first chronological impact–no assignment of greater or lesser import should be derived from their ordering. While my love for computing in general stretches as far back as my very early teens, my interest in high-performance distributed computing was born during my undergraduate sophomore year when I read “Engineering a Beowulf-Style Compute Cluster,” a free online book by Robert G. Brown (rgb). Although I cannot recall how I first stumbled upon it, my thanks must be given to rgb for writing (and freely providing) the text and those on the Beowulf mailing list for their helpful support and advice as my curiosity for distributed computing first blossomed. This curiosity first struggled to find appropriate soil (i.e., free machines for me to build a cluster with) until I was introduced to Michael Prushan, a professor of chemistry at my undergraduate institution, La Salle University. During my junior and senior years as I learned by trial-and-error how to build a cluster, he was an unparalleled advisor of my research with a lust for problem-solving and teaching I will never forget. In working with him I was offered my first exposure to interdisciplinary research, an experience every computer scientist must have to fully appreciate and understand the scope of his own field. Equally critically, he introduced me to Robert Levis, another chemistry professor and director of Temple ix University’s Center for Advanced Photonics Research (CAPR). It was during my undergraduate internships with Robert at CAPR that I managed my first sizable cluster, learned (again, mostly by trial-and-error) to write applications that would scale, was exposed to the basics of machine learning, and came to grips with the raw difficulty of problems academics face (and fall in love with) on a day-to-day basis. This problem difficulty and corresponding progress by tiny, deliberate steps was addictive, and a key instigator in my application to Ph.D. programs. My sincere thanks to you both for your advisement and education in what I consider my first years as a scientist. To this day it is not entirely clear to me why my doctoral advisor, Mahmut Kandemir, called me with an acceptance to a top-thirty computer science Ph.D.
Recommended publications
  • Encryption Introduction to Using 7-Zip
    IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: [email protected] www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff Version: 5.3 Training Guide Introduction to Using 7-Zip Page 2 IT Services Training Introduction to Using 7-Zip Table of Contents Contents Introduction ......................................................................................................................... 4 Compress/encrypt individual files ....................................................................................... 5 Email compressed/encrypted files ....................................................................................... 8 Decrypt an encrypted file ..................................................................................................... 9 Create a self-extracting encrypted file .............................................................................. 10 Decrypt/un-zip a file .......................................................................................................... 14 APPENDIX A Downloading and installing 7-Zip ................................................................. 15 Help and Further Reference ............................................................................................... 18 Page 3 Training Guide Introduction to Using 7-Zip Introduction 7-Zip is an application that allows you to: Compress a file – for example a file that is 5MB can be compressed to 3MB Secure the
    [Show full text]
  • Pack, Encrypt, Authenticate Document Revision: 2021 05 02
    PEA Pack, Encrypt, Authenticate Document revision: 2021 05 02 Author: Giorgio Tani Translation: Giorgio Tani This document refers to: PEA file format specification version 1 revision 3 (1.3); PEA file format specification version 2.0; PEA 1.01 executable implementation; Present documentation is released under GNU GFDL License. PEA executable implementation is released under GNU LGPL License; please note that all units provided by the Author are released under LGPL, while Wolfgang Ehrhardt’s crypto library units used in PEA are released under zlib/libpng License. PEA file format and PCOMPRESS specifications are hereby released under PUBLIC DOMAIN: the Author neither has, nor is aware of, any patents or pending patents relevant to this technology and do not intend to apply for any patents covering it. As far as the Author knows, PEA file format in all of it’s parts is free and unencumbered for all uses. Pea is on PeaZip project official site: https://peazip.github.io , https://peazip.org , and https://peazip.sourceforge.io For more information about the licenses: GNU GFDL License, see http://www.gnu.org/licenses/fdl.txt GNU LGPL License, see http://www.gnu.org/licenses/lgpl.txt 1 Content: Section 1: PEA file format ..3 Description ..3 PEA 1.3 file format details ..5 Differences between 1.3 and older revisions ..5 PEA 2.0 file format details ..7 PEA file format’s and implementation’s limitations ..8 PCOMPRESS compression scheme ..9 Algorithms used in PEA format ..9 PEA security model .10 Cryptanalysis of PEA format .12 Data recovery from
    [Show full text]
  • Installing Your Cinesamples Product - Cinebells
    Installing Your Cinesamples Product - CineBells Step 1. In your Downloads folder, or in the location you have told your browser to send your downloads, you will find a file called“CineBells.zip”along with the five .rar files shown to the left. First Unzip the zip file to create your main CineBells folder. Then you will need a utility that can extract the .rar files, like RarMarchine or UnRarX for Mac, or WinRar for Windows. No matter which you use, you will only need to select and unarchive the first file (part1). The utility will automatically create a Step 2. CineBells_Samples folder, and decompress all five .rar files into it in one step. Please DO NOT use Stuffit for this - it will not work correctly. Make sure to check that all five rars downloaded completely - notice the sizes to the left. After the rars are extracted, go into the CineBells_Samples folder, and drag the Samples Step 3. folder inside it into the main CineBells folder that was created from the zip file. Next drag your final CineBells folder to your sample hard drive. It should look like the picture below afterwards. If this is your first Cinesamples product, you may want to create a Cinesamples folder beforehand. The “CineBells_Samples”folder should now be empty and can be deleted. Step 4. Next, open the full version of Kontakt 4 (at least 4.2.3) or Kontakt 5, select the Files tab, and navigate to your CineBells folder. Double click or drag nki files into the main window to load the different instruments.
    [Show full text]
  • Licensing Information User Manual Release 8.5 F11004-03 August 2020
    Oracle® Outside In Licensing Information User Manual Release 8.5 F11004-03 August 2020 Introduction This Licensing Information document is a part of the product or program documentation under the terms of your Oracle license agreement and is intended to help you understand the program editions, entitlements, restrictions, prerequisites, special license rights, and/or separately licensed third party technology terms associated with the Oracle software program(s) covered by this document (the "Program(s)"). Entitled or restricted use products or components identified in this document that are not provided with the particular Program may be obtained from the Oracle Software Delivery Cloud website (https://edelivery.oracle.com) or from media Oracle may provide. If you have a question about your license rights and obligations, please contact your Oracle sales representative, review the information provided in Oracle’s Software Investment Guide (http://www.oracle.com/us/corporate/pricing/ software-investment-guide/index.html), and/or contact the applicable Oracle License Management Services representative listed on http://www.oracle.com/us/corporate/ license-management-services/index.html. Licensing Information Product Subproduct Licensing Information Outside In Outside In Product Editions and Permitted Features Software ActiveX Viewer Oracle Outside In Viewer is an embeddable SDK that Developer Kits and Outside In renders high-fidelity views of files and allows printing, Viewer copy/paste and annotations. Prerequisite Products None Entitled Products and Restricted Use Licenses None 1 Product Subproduct Licensing Information Outside In Outside In Web Product Editions and Permitted Features Software View Export Oracle Outside In Web View Export is an embeddable Developer Kits SDK that converts files into high-fidelity HTML5 renditions.
    [Show full text]
  • Sys-Manage Copyright2 User Manual
    Sys-Manage User Manual CopyRight2 CopyRight2 User Manual (C) 2001-2021 by Sys-Manage Copyright © 2012 by Sys-Manage. All rights reserved. This publication is protected by Copyright and written permission should be obtained from the publisher prior any prohibited reproduction, storage in retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. Sys-Manage Informatica SL Phone: +1 (408) 345-5199 Phone: +1 (360) 227-5673 Phone: +44 (0) 8455273028 Phone: +49-(0)69-99999-3099 Phone : +34-810 10 15 34 Mail: [email protected] Web: http://www.Sys-Manage.com YouTube: www.YouTube.com/SysManage Twitter: www.twitter.com/SysManage Facebook: www.facebook.com/pages/Sys-Manage/153504204665791 Use of trademarks: Microsoft, Windows, Windows NT, XP, Windows Vista, Windows7, Windows8 and the Windows logo are ® trademarks of Microsoft Corporation in the United States, other countries, or both. All other company, product, or service names may be trademarks of others and are the property of their respective owners. Page 2 / 212 Document Version 1.52 02-15-2021 CopyRight2 User Manual (C) 2001-2021 by Sys-Manage ABSTRACT ............................................................................................................................................................ 8 REQUIREMENTS ................................................................................................................................................. 9 USAGE SCENARIOS .........................................................................................................................................
    [Show full text]
  • Software Requirements Specification
    Software Requirements Specification for PeaZip Requirements for version 2.7.1 Prepared by Liles Athanasios-Alexandros Software Engineering , AUTH 12/19/2009 Software Requirements Specification for PeaZip Page ii Table of Contents Table of Contents.......................................................................................................... ii 1. Introduction.............................................................................................................. 1 1.1 Purpose ........................................................................................................................1 1.2 Document Conventions.................................................................................................1 1.3 Intended Audience and Reading Suggestions...............................................................1 1.4 Project Scope ...............................................................................................................1 1.5 References ...................................................................................................................2 2. Overall Description .................................................................................................. 3 2.1 Product Perspective......................................................................................................3 2.2 Product Features ..........................................................................................................4 2.3 User Classes and Characteristics .................................................................................5
    [Show full text]
  • Tutorial - Winrar Introduction: Winrar Has Become One of the Most Popular Archiving Programs for Windows Today
    Tutorial - WinRAR Introduction: WinRAR has become one of the most popular archiving programs for Windows today. It enables users to put multiple files into one archive, which also reduces the over-all file size using “compression” schemes. Once files have been “zipped,” they can be stored (as the one file) on disk, sent across the internet, and more. WinRAR’s strength lies within its ability to handle multiple file types, as well as its advanced compression options. Opening WinRAR: WinRAR is pre-installed on all Rutgers University computers. To open the program, go through the “Start” menu in the bottom left of the screen. Start >> Programs >> Utilities >> WinRAR Note that very rarely will you have to actually open WinRAR like this. Once installed, it integrates seamlessly into Windows, allowing you to perform functions with WinRAR by simply right-clicking files and making selections within, for example, the Windows Explorer environment. Creating a RAR-ed Archive: Let’s assume that you have a few text files that you would like to e-mail to someone, but you do not want to send them all as separate files or attachments. By compressing them all into a single RAR archive, you can e-mail one single file that the receiver can then “un-zip” or “un-rar” back into all of the original files you compressed. Locate the files you wish to compress, and select them all (click and drag, or hold “Ctrl” on the keyboard as you click them individually). Now, right-click the files and select “Add to archive…” A new window will appear asking you to give a name to the archive; you can give the file any name you wish in the “Archive name” text area.
    [Show full text]
  • Open Rar Free
    Open rar free click here to download 7-Zip is free software with open source. The most of the code is under the GNU LGPL license. Some parts of the code are under the BSD 3- clause License. WinRAR, free and safe download. WinRAR latest WinRAR is a file compression program that can be used to open, create and decompress RAR, ZIP and. Open any RAR file in seconds, for free! New update: Now in addition to RAR, it handles dozens of popular archives, like 7Z, Zip, TAR, LZH, etc. RAR Opener is a . Free RAR files opener, extractor utility. How to open, extract RAR format free, unzip. Work with WinRar archives extraction. Windows, Linux unrar software. Zip, unzip, rar files online. Extract files from archive online, no installation, safe and free. Unzip, unrar decompression in cloud. Uncompress, unzipping tool. Archive Extractor is a small and easy online tool that can extract over 70 types of compressed files, such as 7z, zipx, rar, tar, exe, dmg and much more. WinZip opens RAR files. Use WinZip, the world's most popular zip file utility, to open and extract content from RAR files and other compressed file formats. You cannot put RAR File Open Knife on a portable or flash drive and have it function correctly. However, there is an alternative tool called “RarZille Free Unrar. If you want to create RAR files, WinRAR is your best bet. However, if you just need to extract a RAR file, the free and open source 7-Zip app is a. UnRarX is a free WinRAR- style tool for Mac which allows you to unzip RAR files.
    [Show full text]
  • Lumada Data Catalog Product Manager Lumada Data Catalog V 6
    HITACHI Inspire the Next 2535 Augustine Drive Santa Clara, CA 95054 USA Contact Information : Lumada Data Catalog Product Manager Lumada Data Catalog v 6 . 0 . 0 ( D r a f t ) Hitachi Vantara LLC 2535 Augustine Dr. Santa Clara CA 95054 Component Version License Modified "Java Concurrency in Practice" book 1 Creative Commons Attribution 2.5 annotations BSD 3-clause "New" or "Revised" abego TreeLayout Core 1.0.1 License ActiveMQ Artemis JMS Client All 2.9.0 Apache License 2.0 Aliyun Message and Notification 1.1.8.8 Apache License 2.0 Service SDK for Java An open source Java toolkit for 0.9.0 Apache License 2.0 Amazon S3 Annotations for Metrics 3.1.0 Apache License 2.0 ANTLR 2.7.2 ANTLR Software Rights Notice ANTLR 2.7.7 ANTLR Software Rights Notice BSD 3-clause "New" or "Revised" ANTLR 4.5.3 License BSD 3-clause "New" or "Revised" ANTLR 4.7.1 License ANTLR 4.7.1 MIT License BSD 3-clause "New" or "Revised" ANTLR 4 Tool 4.5.3 License AOP Alliance (Java/J2EE AOP 1 Public Domain standard) Aopalliance Version 1.0 Repackaged 2.5.0 Eclipse Public License 2.0 As A Module Aopalliance Version 1.0 Repackaged Common Development and 2.5.0-b05 As A Module Distribution License 1.1 Aopalliance Version 1.0 Repackaged 2.6.0 Eclipse Public License 2.0 As A Module Apache Atlas Common 1.1.0 Apache License 2.0 Apache Atlas Integration 1.1.0 Apache License 2.0 Apache Atlas Typesystem 0.8.4 Apache License 2.0 Apache Avro 1.7.4 Apache License 2.0 Apache Avro 1.7.6 Apache License 2.0 Apache Avro 1.7.6-cdh5.3.3 Apache License 2.0 Apache Avro 1.7.7 Apache License
    [Show full text]
  • Keyview OS&3P
    KeyView Software Version 12.4 Open Source and Third-Party Software License Agreements Document Release Date: October 2019 Software Release Date: October 2019 Open Source and Third-Party Software License Agreements Legal notices Copyright notice © Copyright 1995-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in.
    [Show full text]
  • Winrar Product Information
    Product Information Partner Dear Partner, We have prepared this WinRAR product information package for you in order to bring to your attention some essential features of WinRAR, its technical ad- vantages over competitor products and the benefits we provide for our custom- ers. In particular, you can learn through this brochure how WinRAR could be useful for corporate and private cus- tomers, why WinRAR is right for them and what additional benefits the cus- tomer will get. We hope this brochure will help you to better promote WinRAR, to introduce the software more effectively to your customers, or to just make yourself more familiar with the product. If you have any questions, comments or sug- gestions about this brochure or its con- tent, please feel free to contact us at: [email protected] Your WinRAR Team 2 Partner Product Information The content of this product information consists of... 1. What is WinRAR? — WinRAR is a powerful compression tool — WinRAR is Trialware — Two types of WinRAR licensing 2. What can WinRAR — Compress and archive files be used for? — Compress email attachments — Password-protect files and attachments — Lock files — Split files — Create self-extracting files — Backup files — Protect files from damage 3. Why is WinRAR — Safe and stable the right choice? — Best compression-to-speed ratio — Easy to use and user friendly — Right-mouse-click context menu — Convenient network installation — Large file support — WinRAR offers a mobile solution: RAR for Android — More than 45 language versions — Available for all major Operating Systems — Multi-format support — Professional and customizable interface — Integrated virus scan and search options — Unicode support 4.
    [Show full text]
  • File Compression Explained
    FileFile CompressionCompression What is File Comression? If you download many programs and files off the Internet, you’ve probably encountered ZIP files before. This compression system is a very handy invention, especially for Web users, because it lets you reduce the overall number of bits and bytes in a file so it can be transmitted faster over slower Internet connections, or take up less space on a disk. Once the file is downloaded, your computer uses either it’s built in compression utility or a third party program to expand the file back to its original size. If everything works correctly, the expanded file is identical to the original file before it was compressed. Only then can the file actually be used for it’s intended purpose. How do I know if files are compressed? The most common types of compressed files are.zip or .sit. In the past .zip was primarily used for PC and .sit were mostly used for Macs. With the arrival of newer Mac Operating Systems, the common format is leaning towards .zip which is built in. How do I compress and decompress files? There are actually many different ways to do this. We’re only going to cover the basics to get you started. Depending on which operating system you are on, this process can vary. Windows ME/XP/Vista COMPRESSING (AKA ZIPPING OR ARCHIVING) These versions of Windows have built-in zip capability so that you can compress files by using the Compressed (zipped) Folder feature. Folders compressed by using this feature are identified by a zippered folder icon.
    [Show full text]