Changeman ZMF Messages
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Huawei Announces EROFS Linux File-System, Might Eventually Be Used
ARTICLES & REVIEWS NEWS ARCHIVE FORUMS PREMIUM CATEGORIES Custom Search Search Latest Linux News Huawei Announces EROFS Linux File-System, Might Huawei Announces EROFS Linux File- Eventually Be Used By Android Devices System, Might Eventually Be Used By Android Devices Written by Michael Larabel in Linux Storage on 31 May 2018 at 09:00 AM EDT. 3 Comments Mesa 18.0.5 Is The Last Planned Release In Huawei's Gao Xiang has announced the EROFS open-source Linux file-system The Series intended for Android devices, but still at its very early stages of AMD K8 Support Stripped Out Of Coreboot development. NVIDIA’s Next Generation Mainstream GPU Will At Least Be Detailed In August EROFS is the company's new approach for a read-only file-system that would work well for Android devices. EROFS is short for the Extendable Read-Only GNOME 3 Might Be Too Resource Hungry To File-System and they began developing it with being unsatisfied with other read-only file- Ever Run Nicely On The Raspberry Pi system alternatives. XWayland Gets Patch To Automatically Use EGLStreams For NVIDIA Support When EROFS is designed to offer better performance than other read-only alternatives while still Needed focusing upon saving storage space. As part of EROFS is also a compression mode pursuing BPFILTER Landing For Linux 4.18 For a different design approach than other file-systems: the compression numbers shared in Eventually Better Firewall / Packet Filtering today's announcement on both server hardware and a Kirin 970 are compelling for being in AMDGPU Patches Prepping JPEG Support For the early stages of development. -
Z/OS Distributed File Service Zseries File System Implementation Z/OS V1R13
Front cover z/OS Distributed File Service zSeries File System Implementation z/OS V1R13 Defining and installing a zSeries file system Performing backup and recovery, sysplex sharing Migrating from HFS to zFS Paul Rogers Robert Hering ibm.com/redbooks International Technical Support Organization z/OS Distributed File Service zSeries File System Implementation z/OS V1R13 October 2012 SG24-6580-05 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Sixth Edition (October 2012) This edition applies to version 1 release 13 modification 0 of IBM z/OS (product number 5694-A01) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2010, 2012. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . .xv The team who wrote this book . .xv Now you can become a published author, too! . xvi Comments welcome. xvi Stay connected to IBM Redbooks . xvi Chapter 1. zFS file systems . 1 1.1 zSeries File System introduction. 2 1.2 Application programming interfaces . 2 1.3 zFS physical file system . 3 1.4 zFS colony address space . 4 1.5 zFS supports z/OS UNIX ACLs. 4 1.6 zFS file system aggregates. 5 1.6.1 Compatibility mode aggregates. 5 1.6.2 Multifile system aggregates. 6 1.7 Metadata cache. 7 1.8 zFS file system clones . 7 1.8.1 Backup file system . 8 1.9 zFS log files. -
A Study of Failure Recovery and Logging of High-Performance Parallel File Systems
1 A Study of Failure Recovery and Logging of High-Performance Parallel File Systems RUNZHOU HAN, OM RAMESHWAR GATLA, MAI ZHENG, Iowa State University JINRUI CAO, State University of New York at Plattsburgh DI ZHANG, DONG DAI, North Carolina University at Charlotte YONG CHEN, Texas Tech University JONATHAN COOK, New Mexico State University Large-scale parallel file systems (PFSes) play an essential role in high performance computing (HPC). However, despite the importance, their reliability is much less studied or understood compared with that of local storage systems or cloud storage systems. Recent failure incidents at real HPC centers have exposed the latent defects in PFS clusters as well as the urgent need for a systematic analysis. To address the challenge, we perform a study of the failure recovery and logging mechanisms of PFSes in this paper. First, to trigger the failure recovery and logging operations of the target PFS, we introduce a black- box fault injection tool called PFault, which is transparent to PFSes and easy to deploy in practice. PFault emulates the failure state of individual storage nodes in the PFS based on a set of pre-defined fault models, and enables examining the PFS behavior under fault systematically. Next, we apply PFault to study two widely used PFSes: Lustre and BeeGFS. Our analysis reveals the unique failure recovery and logging patterns of the target PFSes, and identifies multiple cases where the PFSes are imperfect in terms of failure handling. For example, Lustre includes a recovery component called LFSCK to detect and fix PFS-level inconsistencies, but we find that LFSCK itself may hang or trigger kernel panicswhen scanning a corrupted Lustre. -
Think Journey Business and AI Campus
Think Journey Business and AI Campus March 19–March 22 Mandalay Bay Convention Center Las Vegas Think is the flagship IBM® conference built to help enhance or jumpstart your journey to AI and the cloud. Forty-thousand of the world’s most inspiring innovators, leaders and thinkers will be in attendance; gathering to learn how AI can solve business challenges, and to discuss the current state of the art and the future possibilities of AI. Think is IBM’s only conference in 2018, and it will be your last chance until Think 2019 to learn how to make the most of AI for your business. 1 Table of Contents Top seven things to know about AI, Watson™ and Think 2018 03 Access to Watson expertise and leadership 03 Think week at-a-glance 04 Watson clients and partners 04 Entertainment at Think 04 Watson Primer 05 Watson at Work Activations 06 Future of the Call Center in Augmented Reality 07 With Watson Studio 08 The eight sessions everyone should attend 09 Watson tech talks for beginners to experts 11 Client sessions not to be missed 13 Think Campus Map 20 Watson Campus Map 20 IBM Events mobile app 21 Transportation 21 Think Journey | Business and AI Campus 2 Top seven things to know about AI, Watson and Think 2018 1. Be the first to hear about the newest Watson AI products and solutions to be unveiled at Think 2. Attend one of 50+ client-led sessions to learn about projects with Watson 3. Develop or evolve your AI strategy and business case in hands-on sessions with IBM AI experts 4. -
Lustre* Software Release 2.X Operations Manual Lustre* Software Release 2.X: Operations Manual Copyright © 2010, 2011 Oracle And/Or Its Affiliates
Lustre* Software Release 2.x Operations Manual Lustre* Software Release 2.x: Operations Manual Copyright © 2010, 2011 Oracle and/or its affiliates. (The original version of this Operations Manual without the Intel modifications.) Copyright © 2011, 2012, 2013 Intel Corporation. (Intel modifications to the original version of this Operations Man- ual.) Notwithstanding Intel’s ownership of the copyright in the modifications to the original version of this Operations Manual, as between Intel and Oracle, Oracle and/or its affiliates retain sole ownership of the copyright in the unmodified portions of this Operations Manual. Important Notice from Intel INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IM- PLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSO- EVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR IN- FRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL IN- DEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE AT- TORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCON- TRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. -
Building the Cognitive Enterprise: Nine Action Areas Deep Dive
Research Insights Building the Cognitive Enterprise: Nine Action Areas Deep Dive This Deep Dive document is the in- depth version. For an abridged version, please read, “Building the Cognitive Enterprise: Nine Action Areas, Core Concepts.” Building the Cognitive Enterprise | 1 Mark Foster Senior Vice President IBM Services and Global Business Services Introduction A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social, and regulatory forces. As artificial intelligence, blockchain, automation, Internet of Things, 5G, and edge computing become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise™. 2 | Building the Cognitive Enterprise Table of contents Executive summary 3 Introduction to the Cognitive Enterprise 4 Chapter 1 Market-making Business Platforms 11 – Double down on “Big Bets” 15 – Create a new business blueprint 19 – Orchestrate compelling change 22 – Action guide 25 Chapter 2 Intelligent Workflows 26 – Embed exponential technologies 31 – Drive value from data 37 – Deploy through hybrid multicloud 39 – Action guide 42 Chapter 3 Enterprise Experience and Humanity 43 – Elevate human-technology partnerships 47 – Cultivate smart leadership, skills, and culture 51 – Perform with purposeful agility 55 – Action guide 58 Chapter 4 New way of building: Garage 59 Conclusion A new way to grow, a new way to compete 64 Related IBM Institute for Business Value studies 65 Notes and sources 66 Executive summary | 3 Executive summary The impact of the convergence of multiple exponential ever-clearer strategic bets that they are placing. -
Changeman ZMF Administrator's Guide
ChangeManZMF Administrator’s Guide © Copyright 2001-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contains Confidential Information. Except as specifically indicated otherwise, a valid license is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Product version: 8.2 Patch 2 Publication date: September 2019 Table of Contents Welcome to ChangeMan® ZMF. 9 Guide to ChangeMan ZMF Documentation. 9 ChangeMan ZMF Documentation Suite . 9 Using the Manuals . 11 Searching the ChangeMan ZMF Documentation Suite. 11 Using the ISPF Interface . 13 Description of the ISPF Interface. 13 Using Online Help . 13 Typographical Conventions . 14 Notes . 14 Chapter 1 Introduction . 15 Global Administrator . 16 Application Administrator . 16 Security Administrator . 16 ChangeMan ZMF Monitor . 17 General Administrator . 17 Chapter 2 What is ChangeMan ZMF? . 19 Change Package . 20 Impact Analysis . 20 Checkout . 20 Staging. 21 Audit . 21 Recompile and Relink . 22 Freeze . 22 Promotion . 23 Approval . 23 Production Installation . 23 Baseline Libraries and Delta Decks. 24 Backout Management Facilities . 24 Emergency Changes. 24 ChangeMan ZMF Life Cycle . 24 Chapter 3 Pre-Implementation Decisions . -
Error Propagation Analysis for File Systems!
Error Propagation Analysis for File Systems! Cindy Rubio-González, Haryadi S. Gunawi, Ben Liblit, Remzi H. Arpaci-Dusseau, and Andrea C. Arpaci-Dusseau! University of Wisconsin-Madison PLDI’09 ECS 289C Seminar on Program Analysis February 17th, 2015 Motivation! • Systems software plays an important role! o Designed to operate the computer hardware! o Provides platform for running application software! • Particular focus on file systems! o Store massive amounts of data! o Used everywhere!! § Home use: photos, movies, tax returns! § Servers: network file servers, search engines! • Incorrect error handling → serious consequences! o Silent data corruption, data loss, system crashes, etc.! • Broken systems software → Broken user applications!! ! 2 Error Handling! Error Propagation + Error Recovery! USER-LEVEL APPLICATION SYSTEMS SOFTWARE Error Recovery:! ERROR ERROR • Logging! • Notifying! • Re-trying! Run-time ERROR ERROR Errors! HARDWARE Incorrect error handling → longstanding problem! 3 Return-Code Idiom! • Widely used in systems software written in C! • Also used in large C++ applications! • Run-time errors represented as integer values! • Propagated through variable assignments and function return values! 4 Error Codes in Linux! 5 Example of Error-Propagation Bug! 1 int txCommit(...) { 2 ... 3 if (isReadOnly(...)) { 4 rc = -EROFS; read-only file-system error! 5 ... 6 goto TheEnd; 7 } ... 8 if (rc = diWrite(...)) diWrite may return EIO error! 9 txAbort(...); 10 TheEnd: return rc; function returns variable rc 11 } 13 int diFree(...) { 14 .. -
PART I: People & Strategy
By Ken Luskin [email protected] October 28, 2014 PART I: People & Strategy The Brilliance of Steve Jobs was in building a team of geniuses Virtually everyone in the world knows that Steve Jobs was the driving force behind the success of Apple. Unfortunately, few of them understand that without the team of technical gurus Jobs assembled, his visions would not have become reality. Without a Microprocessor Brain, the iPhone would not exist Inside every “smart” computing device is a microprocessor, considered the brains of the device. When Jobs was creating what is now known as the iPhone, he needed a special microprocessor, which could make it through the day without draining the battery. Jobs first approached Intel, the company that was supplying the microprocessors for the entire MAC line. Intel was not interested in supplying a relatively low cost mobile chip, because the bean counters and FAB guys had no vision. So, Jobs built a team of top mobile microproprocessor engineers, licensed the ARM architecture, and created a chip that became the brains of the iPhone and iPad. Apple buys P.A. Semiconductor in 2008 to keep Apple’s microprocessors on the cutting edge With this acquisition Apple received a group of highly innovative engineers, including ex AMD employee Jim Keller. From a VentureBeat article: “Keller spearheaded the development of Apple’s custom mobile processors — including the A4 in the iPhone 4, the A5 in the iPhone 4S and iPad 2, and the A5X in the new iPad — all of which have managed to keep Apple’s mobile devices on the cutting edge. -
Authenticated and Encypted Storage on Embedded Linux
Authenticated and Encrypted Storage on Embedded Linux ELC Europe 2019 Jan Lübbe – [email protected] https://www.pengutronix.de Linux Storage Stack 2/21 Transparent Authentication and Encryption 3/21 Crypto‽ https://www.pengutronix.de https://www.instructables.com/id/Laser-Cut-Cryptex/ Quick Crypto Refresher Hash: one-way function, fixed output size (SHA*) HMAC: data authentication using hash and shared secret Signature: data authentication using public key cryptography (keys & certificates, RSA & ECDSA) Unauthenticated encryption: attacker can‘t read private data, but could modify it (AES-CBC, AES-XTS, …) Authenticated encryption: attacker can‘t read private data and modification is detected (AEAD: AES GCM, AEGIS) 5/21 Overview Building Blocks authentication encryption authenticated encryption General Considerations 6/21 dm-verity (since 2012, v3.4) filesystem authentication via hash tree: read-only dm-verity hash used by Chrome OS & Android for rootfs tree root hash provided via out-of-band (kernel cmdline) or via signature in super block (since 5.4) can be created and configured via veritysetup (LUKS2) combine with ext4, SquashFS or EROFS hash-tree image ⇒ best choice for RO data 7/21 fsverity (since 2019, v5.4) “dm-verity for files”: efficient authentication of (large) read- only files via a hash tree root hash provided out-of-band integrated into ext4 could be integrated with IMA/EVM to improve performance ⇒ Android will likely be the main user (for .apk authentication) 8/21 dm-integrity (since 2017, v4.12) emulates -
Man Pages Section 7 Device and Network Interfaces
man pages section 7: Device and Network Interfaces Beta Part No: 819–2254–33 February 2010 Copyright ©2010 Sun Microsystems, Inc. All Rights Reserved 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more U.S. patents or pending patent applications in the U.S. and in other countries. U.S. Government Rights – Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. This distribution may include materials developed by third parties. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, the Solaris logo, the Java Coffee Cup logo, docs.sun.com, Java, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. -
Understanding the Motivations for Business to Create Shared Value 18 Case Studies 3
3 Understanding the Motivations for Business to Create Shared Value 18 Case Studies 3 Understanding the Motivations for Business to Create Shared Value 18 Case Studies Introduction - a Mix of Motivations for All but Organised in the Primary In this section, there are 18 case studies listing companies from Hong Kong and around the world who are embracing business for good. This is a snapshot of different types of activities, not a comprehensive analysis. The write-ups are based on interviews that the Consulting Team conducted mainly in the third and fourth quarter of 2019. Since this study is interested in what motivates businesses to do good, this section has been organised around three broad categories, based on our research and the interviews. The three categories are 1) New business opportunities 2) Leadership and 3) External influence. In reality,there are a variety of drivers that are driving these companies to behave differently, not just one. We have clustered the cases around the primary driver to do good. This categorisation should not be viewed in a strict sense - rather the motivations are interlinked and not mutually exclusive. New Business Opportunities Whilst Transforming Society This section lists companies who are primarily motivated by finding a new business opportunity, at the same time as tackling a societal challenge. 53 Hong Kong Broadband Network Purposeful Profits HKSAR “Under the goal of Making Hong Kong a Better Place to Live, HKBNers share a strong collective alignment of interest, and are extra passionate to deliver products, services and outcomes that are always great for our stakeholders and Hong Kong’s communities.