Learn More
Multilevel caching, common in many storage configurations , introduces new challenges to traditional cache management: data must be kept in the appropriate cache and replication avoided across the various cache levels. Some existing solutions focus on avoiding replication across the levels of the hierarchy, working well without information about temporal(More)
In classical machine virtualization, a hypervisor runs multiple operating systems simultaneously, each on its own virtual machine. In nested virtualization, a hypervi-sor can run multiple other hypervisors with their associated virtual machines. As operating systems gain hyper-visor functionality—Microsoft Windows 7 already runs Windows XP in a virtual(More)
Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve virtual machine availability, to enable forensics on past VM states, and to recover from operator errors. We present an approach to virtual machine time travel which combines Continuous(More)
9 10 This document presents the requirements, motivation and a proposal for the security protocol 11 for object store. This protocol is based upon the original Network Attached Storage Device 12 (NASD) work [8] as well as other work on secure object stores 9. 13 14 Related Documents 15 • The OSD White Paper offers an introduction to OSD and its(More)
cJVM is a Java Virtual Machine (JVM) which provides a single system image of a traditional JVM while executing in a distributed fashion on the nodes of a cluster, cJVM virtualizes the cluster, transparently distributing the objects and threads of any pure Java application. The aim of cJVM is to obtain improved scalability for Java Server Applications by(More)
Continuous Data Protection (CDP) is a recent storage technology which enables reverting the state of the storage to previous points in time. We propose four alternative architectures for supporting CDP in a storage controller , and compare them analytically with respect to both write performance and space usage overheads. We describe exactly how factors(More)