Result page:
1
2
3
4
5
6
1
Chordet: an efficient and transparent replication for improving availability of peer-to-peer networked systems
Geunyoung Park,
Seokhyun Kim,
Yookun Cho,
Joongjin Kook,
Jiman Hong
March 2010
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2, Downloads (12 Months): 15, Downloads (Overall): 149
Full text available:
PDF
In Peer-to-Peer (P2P) networked systems, participating nodes can be frequently disconnected from the networks because of several reasons such as users' intentions, nodes' failures, and network problems. This may increase the loss-ratio of the data and some other routing information; it may spoil the reliability of the whole P2P networks. ...
Keywords:
Chord, replication, DHT, peer-to-peer (P2P)
CCS:
Backup procedures
Full Text:
... Communications Management ? Network communication. D.4.5 [Operating Systems]: Reliability ? Backup procedures. . General Terms Algorithms, Performance, Design, Reliability Keywords Peer-to-Peer (P2P), ...
2
CompSC: live migration with pass-through devices
Zhenhao Pan,
Yaozu Dong,
Yu Chen,
Lei Zhang,
Zhijiao Zhang
March 2012
VEE '12: Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 4, Downloads (12 Months): 19, Downloads (Overall): 388
Full text available:
PDF
Live migration is one of the most important features of virtualization technology. With regard to recent virtualization techniques, performance of network I/O is critical. Current network I/O virtualization (e.g. Para-virtualized I/O, VMDq) has a significant performance gap with native network I/O. Pass-through network devices have near native performance, however, they ...
Keywords:
live migration, SR-IOV, pass-through device, virtualization
Also published in:
September 2012
ACM SIGPLAN Notices - VEE '12: Volume 47 Issue 7, July 2012
CCS:
Backup procedures
3
Guard against data loss with mondo rescue
Hugo Rabson
December 2001
Linux Journal: Volume 2001 Issue 92, December 2001
Publisher: Belltown Media
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 1, Downloads (Overall): 152
Full text available:
Html
Looking for an easy open-source backup method?
CCS:
Backup procedures
Primary CCS:
Backup procedures
4
Unity: secure and durable personal cloud storage
October 2012
CCSW '12: Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 9, Downloads (12 Months): 60, Downloads (Overall): 522
Full text available:
PDF
Unity provides secure and durable storage for personal data that does not depend on the security or availability of a central service. Instead, Unity exploits the trend towards users having more personal computing devices and the increasing amounts of storage available on those devices. This motivates the design of Unity, ...
Keywords:
unity, cloud, replication, storage
CCS:
Backup procedures
5
No one needs it, (until they need it) implementing a new desktop backup solution
Melissa E. Rycroft
November 2006
SIGUCCS '06: Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 8, Downloads (Overall): 385
Full text available:
PDF
Faced with upgrading a set of Veritas Netbackup servers that backed up 1000 Windows desktop computers and a Retrospect server that backed up 200 Macintosh desktop computers, Bucknell University embarked on a project to identify and implement a new desktop backup solution. Working together, Technology Support and Systems Integration selected, ...
Keywords:
automation, commvault galaxy, data security, desktop backup
CCS:
Backup procedures
Primary CCS:
Backup procedures
Full Text:
... workstations. Categories and Subject Descriptors D.4.5 [Operating Systems]: Reliability ? Backup Procedures K.4.3 [Computers and Society]: Organizational Impacts - Automation General Terms ...
6
Steeleye lifekeeper for Linux
Sean Tierney
April 2005
Linux Journal: Volume 2005 Issue 132, April 2005
Publisher: Belltown Media
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0, Downloads (12 Months): 1, Downloads (Overall): 131
Full text available:
Html
CCS:
Backup procedures
Primary CCS:
Backup procedures
7
On-line consistent backup in transactional file systems
Lipika Deka,
Gautam Barua
August 2010
APSys '10: Proceedings of the first ACM asia-pacific workshop on Workshop on systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 24, Downloads (Overall): 366
Full text available:
PDF
A consistent backup, preserving data integrity across files in a file system, is of utmost importance for the purpose of correctness and minimizing system downtime during the process of data recovery. With the present day demand for continuous access to data, backup has to be taken of an active file ...
Keywords:
consistency, transactions, file systems, online backup
CCS:
Backup procedures
Primary CCS:
Backup procedures
8
Docovery: toward generic automatic document recovery
September 2014
ASE '14: Proceedings of the 29th ACM/IEEE international conference on Automated software engineering
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 3, Downloads (12 Months): 37, Downloads (Overall): 102
Full text available:
PDF
Application crashes and errors that occur while loading a document are one of the most visible defects of consumer software. While documents become corrupted in various ways---from storage media failures to incompatibility across applications to malicious modifications---the underlying reason they fail to load in a certain application is that their ...
Keywords:
program analysis, symbolic execution, data recovery
CCS:
Backup procedures
9
Automated disaster plan auditing using knowledge base technology
Jonathan Simon,
Aaron Konstam
September 1988
ACM SIGUCCS Newsletter: Volume 18 Issue 3, September 1, 1988
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 8, Downloads (Overall): 245
Full text available:
Pdf
Management Information System (MIS) disaster and contingency planning are the principal ingredients for the success of a computer center's reorganization pending a system loss but there is is very little information published addressing the details of how to be assured of a proper backup and recovery strategy. Disaster planning is ...
CCS:
Backup procedures
Abstract:
... describe the act of preparing for a disaster, such as backup procedures, , insurance acquisition, fire protection and maintenance of a contingency ...
Primary CCS:
Backup procedures
10
Pogoplug
Mike Diehl
June 2010
Linux Journal: Volume 2010 Issue 194, June 2010
Publisher: Belltown Media
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0, Downloads (12 Months): 0, Downloads (Overall): 21
Full text available:
Html
CCS:
Backup procedures
Primary CCS:
Backup procedures
11
An automated reliable backup solution
Andrew De Ponte
January 2007
Linux Journal: Volume 2007 Issue 153, January 2007
Publisher: Belltown Media
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 2, Downloads (Overall): 494
Full text available:
Html
A super backup solution on the cheap.
CCS:
Backup procedures
Primary CCS:
Backup procedures
12
Easy database backups with Zmanda recovery manager for MySQL
Daniel Bartholomew
September 2010
Linux Journal: Volume 2010 Issue 197, September 2010
Publisher: Belltown Media
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 7, Downloads (Overall): 87
Full text available:
Html
CCS:
Backup procedures
13
SecondSite: disaster tolerance as a service
March 2012
VEE '12: Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 9, Downloads (12 Months): 69, Downloads (Overall): 532
Full text available:
PDF
This paper describes the design and implementation of SecondSite, a cloud-based service for disaster tolerance. SecondSite extends the Remus virtualization-based high availability system by allowing groups of virtual machines to be replicated across data centers over wide-area Internet links. The goal of the system is to commodify the property of ...
Keywords:
disaster recovery, wide area replication
Also published in:
September 2012
ACM SIGPLAN Notices - VEE '12: Volume 47 Issue 7, July 2012
CCS:
Backup procedures
Full Text:
... without compromisingon transparency and consistency.Categories and Subject Descriptors D.4.5 [Operating Systems]:Reliability?Backup procedures, , Checkpoint/restart, Fault-toleranceKeywords Wide Area Replication, Disaster Recovery1. IntroductionFailures in ...
14
Automating remote backups
Michael J. Hammel
June 2010
Linux Journal: Volume 2010 Issue 194, June 2010
Publisher: Belltown Media
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 1, Downloads (Overall): 56
Full text available:
Html
Save or lose it!
CCS:
Backup procedures
Primary CCS:
Backup procedures
15
A Linux-Based Automatic Backup System
Michael O'Brien
November 2000
Linux Journal: Volume 2000 Issue 80es, Nov. 2000
Publisher: Belltown Media
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0, Downloads (12 Months): 5, Downloads (Overall): 304
Full text available:
Html
A step-by-step procedure for establishing a backup system that will save time and money.
CCS:
Backup procedures
16
Reducing fragmentation impact with forward knowledge in backup systems with deduplication
May 2015
SYSTOR '15: Proceedings of the 8th ACM International Systems and Storage Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7, Downloads (12 Months): 69, Downloads (Overall): 242
Full text available:
PDF
Deduplication of backups is very effective in saving storage, but may also cause significant restore slowdown. This problem is caused by data fragmentation , where logically continuous but duplicate data is not placed sequentially on the disk. Two types of fragmentation introduce high restore penalty: inter-version fragmentation, caused by duplicates ...
Keywords:
backup, deduplication, fragmentation, restore
CCS:
Backup procedures
Primary CCS:
Backup procedures
17
Self-Healing in Modern Operating Systems
Michael W. Shapiro
December 2004
Queue - Programming Languages: Volume 2 Issue 9, December/January 2004-2005
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 388, Downloads (12 Months): 2,062, Downloads (Overall): 33,933
Full text available:
Html PDF
A few early steps show there's a long (and bumpy) road ahead.
CCS:
Backup procedures
18
Logical vs. physical file system backup
Norman C. Hutchinson,
Stephen Manley,
Mike Federwisch,
Guy Harris,
Dave Hitz,
Steven Kleiman,
Sean O'Malley
February 1999
OSDI '99: Proceedings of the third symposium on Operating systems design and implementation
Publisher: USENIX Association
CCS:
Backup procedures
19
A novel file-level continuous data protection mechanism oriented service application
Jiangjiang Wu,
Jiangchun Ren,
Yong Cheng,
Songzhu Mei,
Zhiying Wang
August 2011
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 8, Downloads (Overall): 101
Full text available:
PDF
Continuous Data Protection (CDP) technology is a good schema for ensuring the continuity and survival capability of the service applications. However, the existing continuous data protection technology is difficult to meet the requirements, which means more fine-grained, closely associated with the upper applications and efficient failure recovery capabilities. We have ...
Keywords:
reconstruct the sectors, file-level, continuous data protection, no-copy data recovery, sub-fragment
CCS:
Backup procedures
Primary CCS:
Backup procedures
Full Text:
... of service application data. Categories and Subject Descriptors D.4.5 [Reliability]: Backup procedures; ; E.5 [Files]: Backup/ recovery General Terms Design, experiment Keywords ...
20
Using free web storage for data backup
Avishay Traeger,
Nikolai Joukov,
Josef Sipek,
Erez Zadok
October 2006
StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 6, Downloads (12 Months): 41, Downloads (Overall): 1,059
Full text available:
PDF
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to equipment. Users and businesses have important information that is difficult to replace, such as financial records and contacts. Reliable backups are crucial ...
Keywords:
backup, web services
CCS:
Backup procedures
Primary CCS:
Backup procedures
Result page:
1
2
3
4
5
6