XAM over OSD. Sami Iren Seagate Technology
|
|
- Willis Shepherd
- 5 years ago
- Views:
Transcription
1 XAM over OSD Sami Iren Seagate Technology
2 Abstract XAM and OSD are both object-based technologies that are being standardized by SNIA. XAM provides a standard object-based API for applications. OSD provides a standard interface for managing objects at the storage level hence relieving file systems (and applications) from low-level storage management tasks. Due to its object-based nature it also provides improved scalability and native security. OSD and XAM are complementary technologies. When built on top of an OSD, XAM implementations do not have to worry about how XAM objects and metadata are stored on the physical media; they will be mapped to OSD objects and attributes. This presentation provides an overall feel on how XAM can operate on top of an OSD system. This is an ongoing work; hence open to feedback/suggestions.
3 Agenda XAM Architecture OSD Architecture XAM over OSD: The Ecosystem The Mapping Object Mapping Field Mapping Other Relevant Items Management Query Security Summary
4 XAM Architecture
5 XAM Architecture (1) Vendor A VIM Vendor A Code Vendor A Storage Application XAM Library Vendor B VIM Vendor B Code Vendor B Storage Vendor C VIM Vendor C Code Vendor C Storage A software framework that allows XAM-enabled applications to interface with XAM-compliant vendor devices Goal: Allow applications to use XAM API to store and retrieve reference information in a vendor- and locationindependent manner XAM Library provides a XAM API to be used by applications that want to communicate through standard interfaces to storage XAM Storage Vendors create Vendor Interface Modules (VIMs) that act as bridges between the standard XAM APIs and the vendor s storage systems
6 XAM Architecture (2) Application Load Library() XAM Library Connect() -XSystem instance XSystem 1 XSystem 2 Applications use libxam.dll to connect to a specific XSystem A single application may connect to multiple XSystems simultaneously Multiple applications can connect to a single XSystem simultaneously, creating multiple XSystem Instances An XSystem is not identical to a vendor s storage box, but a logical abstraction which should be viewed as bag of storage The application may be required to authenticate at the time the connection to an XSystem is established The application uses libxam.dll to store/retrieve content objects to/from the Xsystem These content objects are bundles of data and metadata, and are called XSets XAM Storage System X XAM Storage System Y
7 XAM Objects (1) XAM Library XSystem XSet XRI XUID Properties Xstreams 3-levels of primary objects (hierarchy) XSet: object that contains application/user data and metadata that an application can commit to persistent storage Has a globally unique identifier, called XUID (80 bytes) XSystem: object that abstracts the connection between application and storage systems Encapsulates any resource management associated with the connection Contains methods used to authenticate operations Acts as a virtual storage system, partitioning the content XAM Library: top level object for the XAM API library Contains methods to get and set fields describing the configuration of the XAM system Acts as a factory of XSystems Primary objects (XAM Library, XSystem, XSet) contain fields (of type property or Xstream )
8 XAM Objects (2) Primary Object Hierarchy Secondary Object Hierarchy One or more of secondary objects can be attached to any XAM primary object. Two types of secondary objects: XStream: used to store and retrieve data (type of field) XIterator: used to discover the fields that are attached to a primary object
9 XAM Fields XAM Library XSystem XSet XRI XUID Properties Xstreams Field is a data-carrying attribute that can be attached to a primary object Each primary object has two types of Fields: Properties Simple Types (Boolean, Int, Float, String, DateTime, XUID) Type checked/enforced by Storage System Manipulated via Property Get/Set Methods XStreams Used to contain larger, potentially more complex data (e.g, JPEGs, XML files, binary data) Type assumed to be a valid MIME-type, but not checked/enforced by Storage System Manipulated via Posix-style I/O Methods (e.g. open, read, write, close) Each Field Has Four Basic Attributes: Type stype for Properties, any other MIME-type for streams Length The actual size of the field s value Readonly Flag indicating whether field is modifiable by applications Fixed Flag indicating whether field is Fixed/Variable content
10 OSD Architecture
11 OSD Structure CPU Applications System Call Interface File System User Component File System Storage Component Sector/LBA Interface Block I/O Manager Storage Device CPU Applications System Call Interface File System User Component OSD Interface File System Storage File Component System Storage File Component System Block Storage I/O File Manager Component System Block Storage I/O File Manager Component System Block Storage I/O Manager Component Block I/O Manager Block I/O Manager Storage Device Storage Device Storage Device Storage Device Storage Device
12 Interface OSD Client OSD Target READ/WRITE CREATE/REMOVE GET/SET ATTR OSD Interface Opaque attributes (stored only) User Data Object Shared attributes (stored & processed) Attribute pages (can be defined by standards, vendors, users without changing the standard)
13 OSD Objects Also sets of objects partitions security/quota collections grouping user data Collection Object (up to 2^64 of them) User Object (up to 2^64 of them) OSD P0 P1 List of member Objects P1 Up to 2^56 KB in size List of member Objects P1 List of member Objects C1 List of member List of member Objects C2 Objects List ofc1 member C2 Objects C1 C2 User User Data User User Data User User Data Data Data U1 User User Data User U1 U1 User Data Data U1 Data U1 User Data User U1 U1 Data U1 Data U1 U1 U1 Object Id (128 bits total) U1 Root Object (only 1) Partition Object (up to 2^64 of them) Attribute Pages (2^32 per object) & Attributes (2^32 per page, up to 64K in size)
14 OSD Ecosystem Storage/Security Manager Shared Secret Key Client OSD OSD OSD OSD OSD OSD OSD OSD OSD OSD
15 XAM over OSD
16 Where does this Work Fit? Vendor A VIM Application XAM Library Vendor B VIM OSD Reference VIM OSD Reference VIM is defined How XAM objects (XSets) and fields are mapped to OSD objects How XAM methods are mapped to OSD requests Vendor A Code Vendor B Code Interaction between storage managers (XSystems), VIM, and OSD defined Vendor A Storage Vendor B Storage OSD
17 OSD & XAM Ecosystem Application XAM Lib. OSD VIM -XAMLibrary.connect() -Xsystem.authenticate() -Credentials for Xsets -etc. -XSet create/remove -XSet field access Storage Manager plays the role of an XSystem Storage/Security Manager Shared Secret Key Client Applications use XAM library, XAM VIM translates to OSD protocol and attributes, any OSD device can be a back-end; CAS doesn t have to have a file system inside OSD OSD OSD OSD OSD OSD OSD OSD OSD OSD CAS/XAM replaces top of file system, OSD replaces bottom of file system -Xsets -Streams -Properties
18 An Early Prototype: IBM s PDS Architecture Work done in conjunction with CASPER EU Project Preservation Web Services AIP Preservation Engine Layer XAM Layer Object Layer Preservation DataStore RepInfo Mgr PDI Mgr Migration Mgr Placement Mgr Preservation Engine XAM API XAM Library VIM API XAM to FS WAS CE File System posix I/O backend VIM API XAM to OSD sockets HL HL OSD + Object Store web service Preservation WSDL Ingest, Access, Administration, Applications Security Admin
19 The Mapping
20 XAM to OSD: Object Mapping XAM Library XSystem XRI XSETs are mapped to collection objects Properties & XStreams are mapped to user objects XSet ID (XUID) is a property, hence, stored in an OSD user object Field names are stored as OSD attributes LIST COLLECTION command is used to iterate through these fields XSet XUID List of member Objects C1 List of member Objects C2 Properties Xstreams P1 User UserData UserData UserData Data U1 U1 U1 U1
21 Method Mappings <op> is one of create, set, or get Property Methods -create -> CREATE -set -> WRITE -get -> READ -DeleteField -> REMOVE Field Methods -GetFieldxxx -> GET ATTRIBUTES -SetFieldxxx -> SET ATTRIBUTES Field Attribute Methods
22 Other Relevant Items
23 XSet Management XSet management methods are used to specify how an XSet is to be managed by the XSystem during its lifetime and when it is deleted. Four classes: Retention: longevity by which an XSystem provides XSet data access by prohibiting XSet deletion Time-based vs. event-based retention Deletion: when should this XSet be deleted? Storage: e.g., performance, resiliency, virtualization Hold: longevity by which an XSystem enforces read-only access and prohibits deletion Mapping to OSD: There are two options; Opaque: management is completely handled at the XAM level; OSD simply stores the relevant fields/attributes and does NOT interpret them No further work is required Shared: XAM delegates some of the responsibility to OSD E.g., Deletion can be performed by OSD if the XAM fields/attributes can be interpreted by OSD XAM and OSD standards should agree on what those fields/attributes are Alternatively, vendors can define their own attributes to handle this
24 XAM Query & Jobs A XAM job is a way to submit work to the XSystem. To date the only job defined is a query job. A XAM query is a way for an application to search content stored on the XSystem. Search is mainly metadata (level 1), but in some cases, content of XStreams may be searched too (level 2). XAM Query Language (XAM QL) is used as the search language and is an SQL variant (simpler). OSD Mapping: OSD-2 has a QUERY command that searches attributes (i.e., metadata) Can be used for level 1 XAM queries, but the language is pretty basic (cannot fully support XAM QL) Future versions of OSD might support advanced versions of QUERY (metadata search) and FIND (data search) commands
25 XAM Security XAM defines three security disciplines: XAM Application Authentication: The XAM application must authenticate against the XSystem using SASL (RFC4422). SASL is a framework, not a specific authentication mechanism. The specific mechanism is left to the vendor to implement (eg. LDAP, AD, ) XSystem Authorization: What methods can be invoked on a XAM session with an XSystem. XSet Access Control: Determines what methods are allowed on a per XSet basis. OSD provides per request authorization Authentication and access control is handled by the security manager (this could be archive catalog or some other part of the system) Most of XAM security defines the role of the security manager in the OSD world
26 Summary Both XAM and OSD are object-based complementary technologies XAM is the API for applications OSD is the interface to the storage Metadata is key in both technologies XAM over OSD provides significant advantages One-to-one object mapping; systems do not have to worry about lowlevel storage management (eliminates the need for FS functionality) Inherits default OSD benefits: scalability, sharing, security Certain management tasks can be offloaded to OSD (i.e., shared management approach) Effort has the blessings of OSD and XAM SDK technical working groups Ongoing work; we need Volunteers Feedback
27 Q&A / Feedback Please send any questions or comments on this presentation to snia-osd@snia.org Standards work Many thanks to the following individuals for their contributions to this work Ananth Devulapalli, OSC Pete Wyckoff, OSC Colin Ngam, Sun
OSD-2 & XAM. Erik Riedel Seagate Technology May 2007
OSD-2 & XAM Erik Riedel Seagate Technology May 2007 OSD-1 Commands OSD-1 r10, as ratified in September 2004 Basic Protocol READ WRITE CREATE REMOVE GET ATTR SET ATTR very basic space mgmt attributes timestamps
More informationextensible Access Method (XAM) - a new fixed content API Mark A Carlson, SNIA Technical Council, Sun Microsystems, Inc.
extensible Access Method (XAM) - a new fixed content API Mark A Carlson, SNIA Technical Council, Sun Microsystems, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.
More informationObject-based Storage (OSD) Architecture and Systems
Object-based Storage (OSD) Architecture and Systems Erik Riedel, Seagate Technology April 2007 Abstract Object-based Storage (OSD) Architecture and Systems The Object-based Storage Device interface standard
More informationInformation Management Extensible Access Method (XAM) Part 3: Java API
Information Management Extensible Access Method (XAM) Part 3: Java API Version 1.0 Publication of this Working Draft for review and comment has been approved by the FCAS TWG. This draft represents a best
More informationThe Storage Networking Industry Association (SNIA) Data Preservation and Metadata Projects. Bob Rogers, Application Matrix
The Storage Networking Industry Association (SNIA) Data Preservation and Metadata Projects Bob Rogers, Application Matrix Overview The Self Contained Information Retention Format Rationale & Objectives
More informationStorage Industry Resource Domain Model
Storage Industry Resource Domain Model A Technical Proposal from the SNIA Technical Council Topics Abstract Data Storage Interfaces Storage Resource Domain Data Resource Domain Information Resource Domain
More informationErrata in Information Management Extensible Access Method (XAM) Part 3: Java API v1.0. SNIA FCAS TWG, June 16, 2009 Approved Version
Errata in Information Management Extensible Access Method (XAM) Part 3: Java API v1.0 SNIA FCAS TWG, June 16, 2009 Approved Version Summary of errata: 4.4.3 Correct descriptions of VIM initialization in
More informationPreservation DataStores: Architecture for Preservation Aware Storage
Preservation DataStores: Architecture for Preservation Aware Storage Michael Factor, Dalit Naor, Simona Rabinovici-Cohen, Leeat Ramati, Petra Reshef, Julian Satran IBM Haifa Research Lab {factor, dalit,
More informationPreservation DataStores: An architecture for Preservation Aware Storage
Preservation DataStores: An architecture for Preservation Aware Storage Dalit Naor, IBM research, Haifa Simona Cohen, Michael Factor, Dalit Naor, Leeat Ramati, Petra Reshef, Shahar Ronen, Julian Satran
More informationObject-based Storage Devices (OSD) T10 Standard
Object-based Storage Devices (OSD) T10 Standard Erik Riedel Seagate Research Motivation for OSD Improved device and data sharing Platform-dependent metadata moved to device Systems need only agree on naming
More informationGWD-I (draft-ggf-dais -dataservices-01) Data Access and Integration Services (DAIS) -wg J.
GWD-I (draft-ggf-dais -dataservices-01) Access and Integration Services (DAIS) http://forge.ggf.org/projects/dais -wg Editors: I. Foster, ANL S. Tuecke, ANL J. Unger, IBM August 14, 2003 OGSA Services
More informationChapter 6 Object Persistence, Relationships and Queries
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 6 Object Persistence, Relationships and Queries Object Persistence
More informationLTR TWG & the Cloud PRESENTATION TITLE GOES HERE
LTR TWG & the Cloud PRESENTATION TITLE GOES HERE Roger Cummings Co-Chair, LTR TWG LTR TWG Introduction! TWG full chartered in mid 2008! Mission! The TWG will lead storage industry collaboration with groups
More informationBest Practices in Designing Cloud Storage based Archival solution Sreenidhi Iyangar & Jim Rice EMC Corporation
Best Practices in Designing Cloud Storage based Archival solution Sreenidhi Iyangar & Jim Rice EMC Corporation Abstract Cloud storage facilitates the use case of digital archiving for long periods of time
More informationIBM Informix DataBlade Module Development Overview
Informix Product Family Informix DataBlade Developers Kit Version 4.20 IBM Informix DataBlade Module Development Overview GC27-5555-00 Informix Product Family Informix DataBlade Developers Kit Version
More informationDriving Interoperability with CMIS
A guide to understanding the impact of the draft Content Management Interoperability Specification (CMIS) on content management repositories This white paper also includes developer resources for creating
More informationCA IdentityMinder. Programming Guide for Java. r12.6.1
CA IdentityMinder Programming Guide for Java r12.6.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationSecurity and Performance advances with Oracle Big Data SQL
Security and Performance advances with Oracle Big Data SQL Jean-Pierre Dijcks Oracle Redwood Shores, CA, USA Key Words SQL, Oracle, Database, Analytics, Object Store, Files, Big Data, Big Data SQL, Hadoop,
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationUnderstanding StoRM: from introduction to internals
Understanding StoRM: from introduction to internals 13 November 2007 Outline Storage Resource Manager The StoRM service StoRM components and internals Deployment configuration Authorization and ACLs Conclusions.
More informationSession Two: OAIS Model & Digital Curation Lifecycle Model
From the SelectedWorks of Group 4 SundbergVernonDhaliwal Winter January 19, 2016 Session Two: OAIS Model & Digital Curation Lifecycle Model Dr. Eun G Park Available at: https://works.bepress.com/group4-sundbergvernondhaliwal/10/
More informationUnderstanding ACS 5.4 Configuration
CHAPTER 2 ACS 5.4 Configuration : This chapter explains the differences in configuration between ACS 3.x and 4.x and ACS 5.4 when you convert the existing 3.x and 4.x configurations to 5.4. This chapter
More informationMOC 6232A: Implementing a Microsoft SQL Server 2008 Database
MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft
More information/ / SAP BODS TRAINING
SAP BODS TRAINING Data Services Training Content Data services Fundamentals History of BODS and Origin EIM relation to BODS Different Versions of BODS (3.0, 4.0, 4.1, 4.2) & Major differences Architecture
More informationExtending the Reach of LSA++ Using New SAP BW 7.40 Artifacts Pravin Gupta, TekLink International Inc. Bhanu Gupta, Molex SESSION CODE: BI2241
Extending the Reach of LSA++ Using New SAP BW 7.40 Artifacts Pravin Gupta, TekLink International Inc. Bhanu Gupta, Molex SESSION CODE: BI2241 Agenda What is Enterprise Data Warehousing (EDW)? Introduction
More informationPage 1. Oracle9i OLAP. Agenda. Mary Rehus Sales Consultant Patrick Larkin Vice President, Oracle Consulting. Oracle Corporation. Business Intelligence
Oracle9i OLAP A Scalable Web-Base Business Intelligence Platform Mary Rehus Sales Consultant Patrick Larkin Vice President, Oracle Consulting Agenda Business Intelligence Market Oracle9i OLAP Business
More informationA Close-up Look at Potential Future Enhancements in Tivoli Storage Manager
A Close-up Look at Potential Future Enhancements in Tivoli Storage Manager Dave Cannon Tivoli Storage Manager Architect Oxford University TSM Symposium September 2005 Disclaimer This presentation describes
More informationMultimedia Database Architecture!
Multimedia Database Architecture! n Multimedia Architecture Requirements! n ACID test! n Multimedia Server Requirements! n Distributed Multimedia System! n Super server concept! n Client-Server Systems!
More informationCombining SNIA Cloud, Tape and Container Format Technologies for the Long Term Retention of Big Data
Combining SNIA Cloud, Tape and Container Format Technologies for the Long Term Retention of Big Data Sam Fineberg, HP Simona Rabinovici-Cohen, IBM Research Haifa Outline Introduction SNIA Long Term Retention
More informationCSE 444: Database Internals. Lectures 26 NoSQL: Extensible Record Stores
CSE 444: Database Internals Lectures 26 NoSQL: Extensible Record Stores CSE 444 - Spring 2014 1 References Scalable SQL and NoSQL Data Stores, Rick Cattell, SIGMOD Record, December 2010 (Vol. 39, No. 4)
More informationTalend Component tgoogledrive
Talend Component tgoogledrive Purpose and procedure This component manages files on a Google Drive. The component provides these capabilities: 1. Providing only the client for other tgoogledrive components
More informationXDR External Data Representation. XDR as a case study XDR
XDR External Data Representation Process A XDR Encode/Decode Transport Process A XDR Encode/Decode Transport Netprog: XDR 1 XDR as a case study Sun RPC uses XDR. A good example of a layer. Interesting
More informationReferences. What is Bigtable? Bigtable Data Model. Outline. Key Features. CSE 444: Database Internals
References CSE 444: Database Internals Scalable SQL and NoSQL Data Stores, Rick Cattell, SIGMOD Record, December 2010 (Vol 39, No 4) Lectures 26 NoSQL: Extensible Record Stores Bigtable: A Distributed
More informationCS 417 9/18/17. Paul Krzyzanowski 1. Socket-based communication. Distributed Systems 03. Remote Procedure Calls. Sample SMTP Interaction
Socket-based communication Distributed Systems 03. Remote Procedure Calls Socket API: all we get from the to access the network Socket = distinct end-to-end communication channels Read/write model Line-oriented,
More informationCMIS An Industry Effort to Define a Service-Based Interoperability Standard for Content Management
CMIS An Industry Effort to Define a Service-Based Interoperability Standard for Content Management Dr. David Choy Content Management & Archiving CTO Office Chair, OASIS CMIS Technical Committee Patricia
More informationAn Introduction to CDMI
An Introduction to CDMI DAVID SLIK David Slik is the Technical Director for Object Storage at NetApp and is a co-chair of the SNIA Cloud Storage Technical Working Group. He participated in the creation
More informationObjectStore and Objectivity/DB. Application Development Model of Persistence Advanced Features
Object-Oriented Oi t ddatabases ObjectStore and Objectivity/DB Application Development Model of Persistence Advanced Features Persistence Strategies Persistence by inheritance persistence capabilities
More informationDistributed Systems. 03. Remote Procedure Calls. Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems 03. Remote Procedure Calls Paul Krzyzanowski Rutgers University Fall 2017 1 Socket-based communication Socket API: all we get from the OS to access the network Socket = distinct end-to-end
More informationJava J Course Outline
JAVA EE - J2SE - CORE JAVA After all having a lot number of programming languages. Why JAVA; yet another language!!! AND NOW WHY ONLY JAVA??? CHAPTER 1: INTRODUCTION What is Java? History Versioning The
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationNGSCB The Next-Generation Secure Computing Base. Ellen Cram Lead Program Manager Windows Security Microsoft Corporation
NGSCB The Next-Generation Secure Computing Base Ellen Cram Lead Program Manager Windows Security Microsoft Corporation ellencr@microsoft.com Agenda NGSCB Features Writing NGSCB Agents NGSCB development
More informationDeveloping Solutions for Google Cloud Platform (CPD200) Course Agenda
Developing Solutions for Google Cloud Platform (CPD200) Course Agenda Module 1: Developing Solutions for Google Cloud Platform Identify the advantages of Google Cloud Platform for solution development
More informationJAVA COURSES. Empowering Innovation. DN InfoTech Pvt. Ltd. H-151, Sector 63, Noida, UP
2013 Empowering Innovation DN InfoTech Pvt. Ltd. H-151, Sector 63, Noida, UP contact@dninfotech.com www.dninfotech.com 1 JAVA 500: Core JAVA Java Programming Overview Applications Compiler Class Libraries
More informationProxy Providers versus Embedded Providers (SMI-S)
Proxy Providers versus Embedded Providers (SMI-S) Srinivasa Reddy Gandlaparthi NetApp Overview Embedded Providers Proxy Providers Differences between Embedded and Proxy providers Design Considerations
More informationJDBC. Oracle ODBC SP API SP API. SQL server C function calls. SQL server ODBC SP API. Oracle DSN Oracle ODBC Oracle
How to Interact with DataBase? THETOPPERSWAY.COM Generally every DB vendor provides a User Interface through which we can easily execute SQL query s and get the result (For example Oracle Query Manager
More informationChapter 6 Enterprise Java Beans
Chapter 6 Enterprise Java Beans Overview of the EJB Architecture and J2EE platform The new specification of Java EJB 2.1 was released by Sun Microsystems Inc. in 2002. The EJB technology is widely used
More informationEGEE and Interoperation
EGEE and Interoperation Laurence Field CERN-IT-GD ISGC 2008 www.eu-egee.org EGEE and glite are registered trademarks Overview The grid problem definition GLite and EGEE The interoperability problem The
More informationOverview. Database Application Development. SQL in Application Code. SQL in Application Code (cont.)
Overview Database Application Development Chapter 6 Concepts covered in this lecture: SQL in application code Embedded SQL Cursors Dynamic SQL JDBC SQLJ Stored procedures Database Management Systems 3ed
More informationDatabase Application Development
Database Application Development Chapter 6 Database Management Systems 3ed 1 Overview Concepts covered in this lecture: SQL in application code Embedded SQL Cursors Dynamic SQL JDBC SQLJ Stored procedures
More informationDatabase Application Development
Database Application Development Chapter 6 Database Management Systems 3ed 1 Overview Concepts covered in this lecture: SQL in application code Embedded SQL Cursors Dynamic SQL JDBC SQLJ Stored procedures
More informationScalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments *
Scalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments * Joesph JaJa joseph@ Mike Smorul toaster@ Fritz McCall fmccall@ Yang Wang wpwy@ Institute
More informationQuick Start Guide for Data Buyers
Quick Start Guide for Data Buyers November 2015 Quick start guide Welcome to DataStreamX! Our marketplace allows you to easily source for data from across the world. We focus on simplifying the data procurement
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationInteroperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG
Interoperable Cloud Storage with the CDMI Standard Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.
More informationNew Features Summary. SAP Sybase Event Stream Processor 5.1 SP02
Summary SAP Sybase Event Stream Processor 5.1 SP02 DOCUMENT ID: DC01616-01-0512-01 LAST REVISED: April 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software
More informationPreliminary. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.
[MS-WSSCADM3]: Windows SharePoint Services Content Database Administrative Communications Version 3 Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical
More informationThe OAIS Reference Model: current implementations
The OAIS Reference Model: current implementations Michael Day, UKOLN, University of Bath m.day@ukoln.ac.uk Chinese-European Workshop on Digital Preservation, Beijing, China, 14-16 July 2004 Presentation
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationChapter 2 Introduction
Chapter 2 Introduction PegaRULES Process Commander applications are designed to complement other systems and technologies that you already have in place for doing work. The Process Commander integration
More informationFlex2SQL. Contents. Mertech s ISAM to SQL Database Connectivity (ISDBC) Drivers For DataFlex
MERTECH DATA SYSTEMS, INC. 18503 Pines Boulevard, Suite 312 Pembroke Pines, Florida 33029 USA Tel: (954)585-9016 Fax: (866)228-1213 www.mertechdata.com Contents Overview Product Fact Sheet Interaction
More informationJim Mains Director of Business Strategy and Media Services Media Solutions Group, EMC Corporation
Media Asset Management Databases The Heart of the System and Critical Decisions and Steps for Success Jim Mains Director of Business Strategy and Media Services Media Solutions Group, EMC Corporation Agenda
More informationOutline. INF3190:Distributed Systems - Examples. Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles
INF3190:Distributed Systems - Examples Thomas Plagemann & Roman Vitenberg Outline Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles Today: Examples Googel File System (Thomas)
More informationAdvanced iscsi Management April, 2008
April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and
More informationPart2: Let s pick one cloud IaaS middleware: OpenStack. Sergio Maffioletti
S3IT: Service and Support for Science IT Cloud middleware Part2: Let s pick one cloud IaaS middleware: OpenStack Sergio Maffioletti S3IT: Service and Support for Science IT, University of Zurich http://www.s3it.uzh.ch/
More informationThe State of Samba (June 2011) Jeremy Allison Samba Team/Google Open Source Programs Office
The State of Samba (June 2011) Jeremy Allison Samba Team/Google Open Source Programs Office jra@samba.org jra@google.com What is Samba? Provides File/Print/Authentication services to Windows clients from
More informationCloud Archive and Long Term Preservation Challenges and Best Practices
Cloud Archive and Long Term Preservation Challenges and Best Practices Chad Thibodeau, Cleversafe Inc. Sebastian Zangaro, HP Author: Chad Thibodeau, Cleversafe Inc. SNIA Legal Notice The material contained
More informationThe Need for a Terminology Bridge. May 2009
May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the
More information1Z Java SE 5 and 6, Certified Associate Exam Summary Syllabus Questions
1Z0-850 Java SE 5 and 6, Certified Associate Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-850 Exam on Java SE 5 and 6, Certified Associate... 2 Oracle 1Z0-850 Certification Details:...
More informationChapter 14 Operating Systems
Chapter 14 Operating Systems Ref Page Slide 1/54 Learning Objectives In this chapter you will learn about: Definition and need for operating system Main functions of an operating system Commonly used mechanisms
More informationBigtable: A Distributed Storage System for Structured Data By Fay Chang, et al. OSDI Presented by Xiang Gao
Bigtable: A Distributed Storage System for Structured Data By Fay Chang, et al. OSDI 2006 Presented by Xiang Gao 2014-11-05 Outline Motivation Data Model APIs Building Blocks Implementation Refinement
More informationChapter 14 Operating Systems
Chapter 14 Systems Ref Page Slide 1/54 Learning Objectives In this chapter you will learn about: Definition and need for operating Main functions of an operating Commonly used mechanisms for: Process management
More informationIntroduction. CS3026 Operating Systems Lecture 01
Introduction CS3026 Operating Systems Lecture 01 One or more CPUs Device controllers (I/O modules) Memory Bus Operating system? Computer System What is an Operating System An Operating System is a program
More informationGrid Programming: Concepts and Challenges. Michael Rokitka CSE510B 10/2007
Grid Programming: Concepts and Challenges Michael Rokitka SUNY@Buffalo CSE510B 10/2007 Issues Due to Heterogeneous Hardware level Environment Different architectures, chipsets, execution speeds Software
More informationA Simple Mass Storage System for the SRB Data Grid
A Simple Mass Storage System for the SRB Data Grid Michael Wan, Arcot Rajasekar, Reagan Moore, Phil Andrews San Diego Supercomputer Center SDSC/UCSD/NPACI Outline Motivations for implementing a Mass Storage
More informationMULTI-CLIENT SOLUTION GUIDE
c MULTI-CLIENT SOLUTION GUIDE Front Office 8.1 A solution guide to support Multi-Client implementations Contents 1.0 Introduction... 3 2.0 Solution Principles... 3 3.0 Licensing... 4 4.0 Integration &
More informationIn-memory data pipeline and warehouse at scale using Spark, Spark SQL, Tachyon and Parquet
In-memory data pipeline and warehouse at scale using Spark, Spark SQL, Tachyon and Parquet Ema Iancuta iorhian@gmail.com Radu Chilom radu.chilom@gmail.com Big data analytics / machine learning 6+ years
More informationWhat's new in IBM Rational Build Forge Version 7.1
What's new in IBM Rational Build Forge Version 7.1 Features and support that help you automate or streamline software development tasks Skill Level: Intermediate Rational Staff, IBM Corporation 13 Jan
More informationTechnical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract
Technical Note Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell/EMC storage solutions, based on the Microsoft SQL Server
More informationAPI and Usage of libhio on XC-40 Systems
API and Usage of libhio on XC-40 Systems May 24, 2018 Nathan Hjelm Cray Users Group May 24, 2018 Los Alamos National Laboratory LA-UR-18-24513 5/24/2018 1 Outline Background HIO Design HIO API HIO Configuration
More informationEMC Centera CentraStar/SDK Compatibility with Centera ISV Applications
EMC Centera CentraStar/SDK Compatibility with Centera ISV Applications A Detailed Review Abstract This white paper provides an overview on the compatibility between EMC Centera CentraStar and SDK releases,
More informationGNU Radio Technical Update
GNU Radio Technical Update Johnathan Corgan GRCON17 GRCON17 GNU GNU Radio Radio Technical Technical Update Update September September 2017 2017 Topics Release 3.8 Features and capabilities Milestones and
More informationDistributed Systems 16. Distributed File Systems II
Distributed Systems 16. Distributed File Systems II Paul Krzyzanowski pxk@cs.rutgers.edu 1 Review NFS RPC-based access AFS Long-term caching CODA Read/write replication & disconnected operation DFS AFS
More informationBlended Learning Outline: Developer Training for Apache Spark and Hadoop (180404a)
Blended Learning Outline: Developer Training for Apache Spark and Hadoop (180404a) Cloudera s Developer Training for Apache Spark and Hadoop delivers the key concepts and expertise need to develop high-performance
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationGlobus GTK and Grid Services
Globus GTK and Grid Services Michael Rokitka SUNY@Buffalo CSE510B 9/2007 OGSA The Open Grid Services Architecture What are some key requirements of Grid computing? Interoperability: Critical due to nature
More informationJava Concepts: Compatible With Java 5, 6 And 7 By Cay S. Horstmann
Java Concepts: Compatible With Java 5, 6 And 7 By Cay S. Horstmann Java Concepts: Compatible with Java 5, 6 and 7 by Horstmann, Cay S. and a great selection of similar Used, New and Collectible Books available
More informationVendor: IBM. Exam Code: A Exam Name: Assessment: IBM WebSphere Appl Server ND V8.0, Core Admin. Version: Demo
Vendor: IBM Exam Code: A2180-317 Exam Name: Assessment: IBM WebSphere Appl Server ND V8.0, Core Admin Version: Demo QUESTION: 1 A system administrator has successfully installed the WebSphere Application
More informationLessons from the implementation
Bibliothèque nationale de France (BnF) Distributed Archiving & Preservation System Système de Préservation et d Archivage Réparti (SPAR) Lessons from the implementation Sun-PASIG Malta 24/06/2009 Distributed
More informationA SEMANTIC MATCHMAKER SERVICE ON THE GRID
DERI DIGITAL ENTERPRISE RESEARCH INSTITUTE A SEMANTIC MATCHMAKER SERVICE ON THE GRID Andreas Harth Yu He Hongsuda Tangmunarunkit Stefan Decker Carl Kesselman DERI TECHNICAL REPORT 2004-05-18 MAY 2004 DERI
More informationC exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.
C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION
More informationThe File Systems Evolution. Christian Bandulet, Sun Microsystems
The s Evolution Christian Bandulet, Sun Microsystems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations
More informationRelational Database Service. User Guide. Issue 05 Date
Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Concepts... 2 1.1.1 RDS... 2 1.1.2 DB Cluster... 2 1.1.3 DB Instance... 2 1.1.4 DB Backup... 3 1.1.5 DB Snapshot... 3 1.2 RDS DB Instances...
More informationXML information Packaging Standards for Archives
XML information Packaging Standards for Archives Lou Reich/CSC Long Term Knowledge Retention Workshop March15,2006 15 March 2006 1 XML Packaging Standards Growing interest in XML-based representation of
More informationIts All About The Metadata
Best Practices Exchange 2013 Its All About The Metadata Mark Evans - Digital Archiving Practice Manager 11/13/2013 Agenda Why Metadata is important Metadata landscape A flexible approach Case study - KDLA
More informationGrid Authentication and Authorisation Issues. Ákos Frohner at CERN
Grid Authentication and Authorisation Issues Ákos Frohner at CERN Overview Setting the scene: requirements Old style authorisation: DN based gridmap-files Overview of the EDG components VO user management:
More informationSharePoint 2010 Enterprise Content Management for IT Pros. Mirjam van Olst Macaw
SharePoint 2010 Enterprise Content Management for IT Pros Mirjam van Olst Macaw About Mirjam Blog: http://sharepointchick.com Email: mirjam@macaw.nl Twitter: @mirjamvanolst Agenda Managed Metadata Service
More informationA New Key-value Data Store For Heterogeneous Storage Architecture Intel APAC R&D Ltd.
A New Key-value Data Store For Heterogeneous Storage Architecture Intel APAC R&D Ltd. 1 Agenda Introduction Background and Motivation Hybrid Key-Value Data Store Architecture Overview Design details Performance
More informationIntroduction to Hadoop. High Availability Scaling Advantages and Challenges. Introduction to Big Data
Introduction to Hadoop High Availability Scaling Advantages and Challenges Introduction to Big Data What is Big data Big Data opportunities Big Data Challenges Characteristics of Big data Introduction
More informationStorageGRID Webscale 10.0
StorageGRID Webscale 10.0 Cloud Data Management Interface Implementation Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
More information