نتایج جستجو برای: storage and backup
تعداد نتایج: 16851429 فیلتر نتایج به سال:
Expanded deployment of renewable energy technologies can help society mitigate climate change. However, solar and wind resources are inherently variable. In this issue Joule, Hunter colleagues quantitatively compare a diverse set storage backup power that variable meet demand. They estimate current technology costs, consider improvement potential, approximate the uncertainties. Solar panels tur...
An on-line backup function for X-NAS, a clustered NAS system designed for entry-level NAS, has been developed. The on-line backup function can replicate file objects on XNAS to a remote NAS in real-time. It makes use of the virtualized global file system of X-NAS, and sends NFS write operations to both X-NAS and the remote backup NAS at the same time. The performance of the on-line backup funct...
We present a new problem in data storage: how to build efficient backup and restore tools for increasingly popular Next-generation Eventually Consistent STorage systems (NECST). We show that the lack of a concise, consistent, logical view of data at a point-in-time is the key underlying problem; we suggest a deep semantic understanding of the data stored within the system of interest as a solut...
USENIX Association Proceedings of the FAST 2002 Conference on File and Storage Technologies Monterey
This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block’s contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage a...
This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block’s contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage a...
This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block’s contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage a...
We identified three storage applications, disaster-recovery (DR) for critical data, backup-storage for ordinary users’ data, and server-replication of web servers and email servers for a quick recovery from failures, as potential candidates for dynamically shared circuit-switched networks. We experimented with a popular, open-sourced backup-storage application, called amanda, and found no techn...
The Lustre File System architecture supports Object Based Storage. It separates data and metadata path of file system operations. An outage of the Metadata Server could considerably degrade the system performance. Providing a backup Metadata Server will increase the availability of Lustre File System to 99.9%. The backup server monitors the primary server over the network and shared storage to ...
This paper addresses the major challenges that large organizations face in protecting their valuable data. Some of these challenges include recovery objectives, data explosion, cost and the nature of data. The paper explores multiple methods of data protection at different storage levels. RAID disk arrays, snapshot technology, storage mirroring, and backup and archive strategies all are methods...
We present CyberStash, a blueprint for a wide-area storage network that is both more reliable and more scalable than traditional storage methods. Our principal goal is to make advanced backup technology accessible to regular consumers. The chosen architecture is therefore simple to use and maintain. Because of its global span CyberStash can serve not only as a backup tool, but as a cornerstone ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید