Learn More
All rights reserved. No part of this publication covered by copyright may be reproduced in any form or by any means-graphic, electronic or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval system-without prior written permission of the copyright owner. Network Appliance reserves the right to change any products(More)
Performance suffers under NFS Version 2 because the protocol requires servers to write data and file system metadata to stable storage (usually disk) synchronously, before replying successfully to a client WRITE request [Ousterhout90]. The performance problem with synchronous writes was recognized early. NFS Version 2 has an artifact of a proposed interface(More)
Computerized data has become critical to the survival of an enterprise. Companies must have a strategy for recovering their data should a disaster such as a fire destroy the primary data center. Current mechanisms offer data managers a stark choice: rely on affordable tape but risk the loss of a full day of data and face many hours or even days to recover,(More)
As le systems grow i n size, ensuring that data is safely stored becomes more and more diicult. Historically , le system backup strategies have focused on logical backup where les are written in their entirety to the backup media. An alternative i s p h ys-ical backup where the disk blocks that make up the le system are written to the backup media. This(More)
Sharing network data between NT and UNIX systems is becoming increasingly important as NT moves into areas previously serviced entirely by UNIX. One difficulty in sharing data is that the two filesystem security models are quite different. NT file servers use access control lists (ACLs) that allow permissions to be specified for an arbitrary number of users(More)
Sharing network data between UNIX and NT systems is becoming increasingly important as NT moves into areas previously serviced entirely by UNIX. One difficulty in sharing data between UNIX and NT is that their file system security models are quite different. NT file servers use access control lists (ACLs) that allow permissions to be specified for an(More)
iThemba Laboratory for Accelerator Based Science (iThemba LABS) is a multi-disciplinary accelerator facility. One of its main activities is the operation of a separated-sector cyclotron with a K-value of 200, which provides beams of various ion species. These beams are used for fundamental nuclear physics research in the intermediate energy region,(More)
Photoionization of multiply charged ions of the Ba isonuclear sequence up to Ba6+ has been studied in a beam-beam experiment. A very strong increase in the resonance structures was observed when moving from Ba2+ to Ba6+. Absolute values of the photoionization cross sections were measured for Ba2+ and Ba3+ ions. The interpretation of the results is provided(More)