نتایج جستجو برای: storage and backup

تعداد نتایج: 16851429  

Journal: :Joule 2021

Expanded deployment of renewable energy technologies can help society mitigate climate change. However, solar and wind resources are inherently variable. In this issue Joule, Hunter colleagues quantitatively compare a diverse set storage backup power that variable meet demand. They estimate current technology costs, consider improvement potential, approximate the uncertainties. Solar panels tur...

2004
Yoshiko Yasuda Shinichi Kawamoto Atsushi Ebata Jun Okitsu Tatsuo Higuchi

An on-line backup function for X-NAS, a clustered NAS system designed for entry-level NAS, has been developed. The on-line backup function can replicate file objects on XNAS to a remote NAS in real-time. It makes use of the virtualized global file system of X-NAS, and sends NFS write operations to both X-NAS and the remote backup NAS at the same time. The performance of the on-line backup funct...

2016
Neville Carvalho Hyojun Kim Maohua Lu Prasenjit Sarkar Rohit Shekhar Tarun Thakur Pin Zhou Remzi H. Arpaci-Dusseau

We present a new problem in data storage: how to build efficient backup and restore tools for increasingly popular Next-generation Eventually Consistent STorage systems (NECST). We show that the lack of a concise, consistent, logical view of data at a point-in-time is the key underlying problem; we suggest a deep semantic understanding of the data stored within the system of interest as a solut...

2001
Sean Quinlan Sean Dorward

This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block’s contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage a...

2001
Sean Quinlan Sean Dorward

This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block’s contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage a...

2002
Sean Quinlan Sean Dorward

This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block’s contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage a...

2007
Malathi Veeraraghavan Steven R. Thorpe John H. Moore

We identified three storage applications, disaster-recovery (DR) for critical data, backup-storage for ordinary users’ data, and server-replication of web servers and email servers for a quick recovery from failures, as potential candidates for dynamically shared circuit-switched networks. We experimented with a popular, open-sourced backup-storage application, called amanda, and found no techn...

2003
Sapna Bafna Shruti Dalvi Aditya Kulkarni

The Lustre File System architecture supports Object Based Storage. It separates data and metadata path of file system operations. An outage of the Metadata Server could considerably degrade the system performance. Providing a backup Metadata Server will increase the availability of Lustre File System to 99.9%. The backup server monitors the primary server over the network and shared storage to ...

2015
Dhinaharan Nagamalai Khaled Aldossari

This paper addresses the major challenges that large organizations face in protecting their valuable data. Some of these challenges include recovery objectives, data explosion, cost and the nature of data. The paper explores multiple methods of data protection at different storage levels. RAID disk arrays, snapshot technology, storage mirroring, and backup and archive strategies all are methods...

2007
Willem de Bruijn

We present CyberStash, a blueprint for a wide-area storage network that is both more reliable and more scalable than traditional storage methods. Our principal goal is to make advanced backup technology accessible to regular consumers. The chosen architecture is therefore simple to use and maintain. Because of its global span CyberStash can serve not only as a backup tool, but as a cornerstone ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید