Learn More
All rights reserved. No part of this publication covered by copyright may be reproduced in any form or by any means-graphic, electronic or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval system-without prior written permission of the copyright owner. Network Appliance reserves the right to change any products(More)
Performance suffers under NFS Version 2 because the protocol requires servers to write data and file system metadata to stable storage (usually disk) synchronously, before replying successfully to a client WRITE request [Ousterhout90]. The performance problem with synchronous writes was recognized early. NFS Version 2 has an artifact of a proposed interface(More)
Computerized data has become critical to the survival of an enterprise. Companies must have a strategy for recovering their data should a disaster such as a fire destroy the primary data center. Current mechanisms offer data managers a stark choice: rely on affordable tape but risk the loss of a full day of data and face many hours or even days to recover,(More)
As le systems grow i n size, ensuring that data is safely stored becomes more and more diicult. Historically , le system backup strategies have focused on logical backup where les are written in their entirety to the backup media. An alternative i s p h ys-ical backup where the disk blocks that make up the le system are written to the backup media. This(More)
Sharing network data between NT and UNIX systems is becoming increasingly important as NT moves into areas previously serviced entirely by UNIX. One difficulty in sharing data is that the two filesystem security models are quite different. NT file servers use access control lists (ACLs) that allow permissions to be specified for an arbitrary number of users(More)
Sharing network data between UNIX and NT systems is becoming increasingly important as NT moves into areas previously serviced entirely by UNIX. One difficulty in sharing data between UNIX and NT is that their file system security models are quite different. NT file servers use access control lists (ACLs) that allow permissions to be specified for an(More)
All rights reserved. No part of this publication covered by copyright may be reproduced in any form or by any means-graphic, electronic or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval system-without prior written permission of the copyright owner. Network Appliance reserves the right to change any products(More)
  • 1