The CNBS server is a backup solution that can perform both selective online backups of workstations and servers, as well as bare metal restores of offline systems based on various operating systems like Linux, Windows, MacOS, and BSD. It supports backing up multiple filesystems, only saving used blocks to increase efficiency. Almost all steps can be done via commands and options, and it supports features like multicast, mass cloning, and automatic changing of hostnames and SIDs for Windows clients. However, it has some limitations like not supporting differential or incremental backups for offline backups, requiring equal or larger disks for restores, and potential network issues corrupting backups.
Persistent memory holds a lot of promise: what's not to like about vast amounts of directly-attached memory that remembers its contents over a power cycle? For some years we have been told that large persistent-memory arrays are coming; now it seems that they are about to arrive. In this lecture we will be covering the following:
What is Persistent Memory , The upcoming storage class memory (SCM)devices.
Difference between NVMe and SCM
How to use it and emulate it
Challenge : Durability / Consistency
Remote access
Implication for Next Generation Architecture
Introduction to Btrfs - FLOSS UK Spring Conference York 2015Richard Melville
With the availability of relatively cheap, large capacity hard disks, the likelihood of running out of disk space is relatively low. However, we may be in the process of re-organising our data storage by increasing the number, or capacity, of our disk array. Or, we may wish to substitute SSDs for our conventional HDDs.
Anybody who has run out of disk capacity will know just how frustrating it is. Equally, the re-organisation of our data is also time consuming and can be fraught with difficulty. If we have a RAID we can, of course, remove and replace drives on the fly as they become full, or even fail. With LVM we can extend, or shrink, file systems on the fly by changing the capacity of the data pool.
Wouldn't it be great, though, if we could combine all these functions, and more besides, into one set of tools? Furthermore, what if we could have these tools working at the file system level, rather than on a virtual layer above the file system?
Well, Sun Microsystems thought so too and developed the ZFS file system for use in its Solaris OS. Sun is now owned by Oracle but ZFS is still very much alive. Unfortunately, for GNU/Linux users, the CDDL licence that came with ZFS was not compatible with the GPL, so inclusion in the Linux kernel was just not possible. ZFS can be built as a module, but this is not very convenient for a file system, hence, the birth of Btrfs.
Btrfs could be seen as a ZFS for GNU/Linux. It is younger, and therefore not as complete as ZFS, but it is getting there. Linus Torvalds claims that it will be the default GNU/Linux file system when it is ready for production use, so it is worth becoming familiar with it now. The Btrfs file system is built into recent kernels, and additional userland tools, btrfs-progs, are provided for manipulating the file system.
This talk will be a basic introduction for those not yet familiar with the Btrfs file system.
Persistent memory holds a lot of promise: what's not to like about vast amounts of directly-attached memory that remembers its contents over a power cycle? For some years we have been told that large persistent-memory arrays are coming; now it seems that they are about to arrive. In this lecture we will be covering the following:
What is Persistent Memory , The upcoming storage class memory (SCM)devices.
Difference between NVMe and SCM
How to use it and emulate it
Challenge : Durability / Consistency
Remote access
Implication for Next Generation Architecture
Introduction to Btrfs - FLOSS UK Spring Conference York 2015Richard Melville
With the availability of relatively cheap, large capacity hard disks, the likelihood of running out of disk space is relatively low. However, we may be in the process of re-organising our data storage by increasing the number, or capacity, of our disk array. Or, we may wish to substitute SSDs for our conventional HDDs.
Anybody who has run out of disk capacity will know just how frustrating it is. Equally, the re-organisation of our data is also time consuming and can be fraught with difficulty. If we have a RAID we can, of course, remove and replace drives on the fly as they become full, or even fail. With LVM we can extend, or shrink, file systems on the fly by changing the capacity of the data pool.
Wouldn't it be great, though, if we could combine all these functions, and more besides, into one set of tools? Furthermore, what if we could have these tools working at the file system level, rather than on a virtual layer above the file system?
Well, Sun Microsystems thought so too and developed the ZFS file system for use in its Solaris OS. Sun is now owned by Oracle but ZFS is still very much alive. Unfortunately, for GNU/Linux users, the CDDL licence that came with ZFS was not compatible with the GPL, so inclusion in the Linux kernel was just not possible. ZFS can be built as a module, but this is not very convenient for a file system, hence, the birth of Btrfs.
Btrfs could be seen as a ZFS for GNU/Linux. It is younger, and therefore not as complete as ZFS, but it is getting there. Linus Torvalds claims that it will be the default GNU/Linux file system when it is ready for production use, so it is worth becoming familiar with it now. The Btrfs file system is built into recent kernels, and additional userland tools, btrfs-progs, are provided for manipulating the file system.
This talk will be a basic introduction for those not yet familiar with the Btrfs file system.
Case study of BtrFS: A fault tolerant File systemKumar Amit Mehta
A case study of Fault Tolerance features of BTRFS. These slides were prepared for the coursework for a Masters level program at Tallinn University of Technology, Estonia. A lot of materials in the slides are taken from the materials in the public domain. Many thanks to the people on BTRFS IRC Channel.
Describe the following information.
- Background (Why Fujitsu has contributed to Btrfs)
- Introduction to core features
- Development statistics
- Future prospects
This slide is almost the same as my presentation at LinuxCon Europe 2014. The difference is just minor fixes.
In this presentation, Yasunori Goto and Qi fuli will talk about basis of NVDIMM, the issues of RAS of Non Volatile DIMM(NVDIMM), and what feature is made and is developing for it.
NVDIMM is expected as new age device recently. Though a cpu can read/write the NVDIMM directly like RAM, the data of NVDIMM remains after power down or reboot. So, on memory database will be one of the good example of usecase of NVDIMM.
Since many people have made great effort for Linux, NVDIMM drivers, filesystems,management command, and many libraries has been well developed for a few years,
However, Yasunori Goto found some issues about RAS(Reliabivity, Availability, and Serviceability) feature of NVDIMM, because characteristic of the NVDIMM is likely mixture of Storage and RAM. For example, NVDIMM does not have hotplug feature because it is inserted at DIMM slot like RAM, but its data must be back-upped/restored like storage.
HKG15-The Machine: A new kind of computer- Keynote by Dejan MilojicicLinaro
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
---------------------------------------------------
Speaker: Dejan Milojicic
Date: February 10, 2015
---------------------------------------------------
★ Session Summary ★
The Machine is a new system from HP, based on Memristor Non-Volatile Memory (NVM) and photonic interconnects, enabling new innovative solutions and applications. This talk will discuss the changes we are introducing to the system software stack to leverage The Machine.
--------------------------------------------------
★ Resources ★
Pathable: https://hkg15.pathable.com/meetings/250777
Video:
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2015 - #HKG15
February 9-13th, 2015
Regal Airport Hotel Hong Kong Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
The Forefront of the Development for NVDIMM on Linux KernelYasunori Goto
This is talk for Open Source Summit Japan 2020
--------------------------
NVDIMM (Non Volatile DIMM) is the most interesting device, because it has not only characteristic of memory but also storage. To support NVDIMM, Linux kernel provides three access methods for users. - Storage (Sector) mode - Filesystem DAX(=Direct Access) mode - Device DAX mode. In the above three methods, Filesystem DAX is the most expected access method, because applications can write data to the NVDIMM area directory, and it is easier to use than Device DAX mode. So, some software already uses it with official support. However, Filesystem-DAX is still "experimental status" in the upstream community due to some difficult issues . In this session, Yasunori Goto will talk to the forefront of the development of NVDIMM, and Ruan Shiyang will talk about his challenge with the latest status from CLK2019.
Case study of BtrFS: A fault tolerant File systemKumar Amit Mehta
A case study of Fault Tolerance features of BTRFS. These slides were prepared for the coursework for a Masters level program at Tallinn University of Technology, Estonia. A lot of materials in the slides are taken from the materials in the public domain. Many thanks to the people on BTRFS IRC Channel.
Describe the following information.
- Background (Why Fujitsu has contributed to Btrfs)
- Introduction to core features
- Development statistics
- Future prospects
This slide is almost the same as my presentation at LinuxCon Europe 2014. The difference is just minor fixes.
In this presentation, Yasunori Goto and Qi fuli will talk about basis of NVDIMM, the issues of RAS of Non Volatile DIMM(NVDIMM), and what feature is made and is developing for it.
NVDIMM is expected as new age device recently. Though a cpu can read/write the NVDIMM directly like RAM, the data of NVDIMM remains after power down or reboot. So, on memory database will be one of the good example of usecase of NVDIMM.
Since many people have made great effort for Linux, NVDIMM drivers, filesystems,management command, and many libraries has been well developed for a few years,
However, Yasunori Goto found some issues about RAS(Reliabivity, Availability, and Serviceability) feature of NVDIMM, because characteristic of the NVDIMM is likely mixture of Storage and RAM. For example, NVDIMM does not have hotplug feature because it is inserted at DIMM slot like RAM, but its data must be back-upped/restored like storage.
HKG15-The Machine: A new kind of computer- Keynote by Dejan MilojicicLinaro
HKG15-The Machine: A new kind of computer- Keynote by Dejan Milojicic
---------------------------------------------------
Speaker: Dejan Milojicic
Date: February 10, 2015
---------------------------------------------------
★ Session Summary ★
The Machine is a new system from HP, based on Memristor Non-Volatile Memory (NVM) and photonic interconnects, enabling new innovative solutions and applications. This talk will discuss the changes we are introducing to the system software stack to leverage The Machine.
--------------------------------------------------
★ Resources ★
Pathable: https://hkg15.pathable.com/meetings/250777
Video:
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2015 - #HKG15
February 9-13th, 2015
Regal Airport Hotel Hong Kong Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
The Forefront of the Development for NVDIMM on Linux KernelYasunori Goto
This is talk for Open Source Summit Japan 2020
--------------------------
NVDIMM (Non Volatile DIMM) is the most interesting device, because it has not only characteristic of memory but also storage. To support NVDIMM, Linux kernel provides three access methods for users. - Storage (Sector) mode - Filesystem DAX(=Direct Access) mode - Device DAX mode. In the above three methods, Filesystem DAX is the most expected access method, because applications can write data to the NVDIMM area directory, and it is easier to use than Device DAX mode. So, some software already uses it with official support. However, Filesystem-DAX is still "experimental status" in the upstream community due to some difficult issues . In this session, Yasunori Goto will talk to the forefront of the development of NVDIMM, and Ruan Shiyang will talk about his challenge with the latest status from CLK2019.
A closer quick understanding of different backup technologies and pros and cons backup & recovery,ntbackup,types of backups, windows backup path so far, differential backup, incremental backup, full backup, mirror backup. If you have have anyqueries please contact me at jabvtl@gmail.com
White Paper: EMC VNXe File Deduplication and Compression EMC
This White Paper describes EMC VNXe file deduplication and compression, a VNXe system feature that increases the efficiency with which network-attached storage (NAS) data is stored.
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
This Backup Exec Blueprint presentation includes example diagrams that contain objects that represent applications and platforms from other companies such as Microsoft and VMware. These diagrams may or may not match or resemble actual implementations found in end user environments. Any likeness or similarity to actual end user environments is completely by coincidence.
The goal of the diagrams included in this blueprint presentation is not to recommend specific ways in which to implement applications and platforms from other companies such as Microsoft and VMware but rather to illustrate Backup Exec best practices only.
For guidelines and best practices on installing and configuring applications and platforms from other companies, please refer to best practice documentation and other resources provided by those companies.
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18Casey Bisson
As presented at LinuxCon/CloudOpen 2015: http://sched.co/3Y3v
We tell our code lies from development to deploy. The most common of these lies start with the simple act of launching a virtual machine. These lies are critical to our applications. Some of them protect applications from themselves and each other, some even improve performance. Some, however, decrease performance, and others create barriers to simply getting things done.
We lie about the systems, networks, storage, RAM, CPU and other resources our applications use, but how we tell those lies is critical to how the applications that depend on them perform. Joyent's Casey Bisson will explore the lies we tell our code and demonstrate examples of how they sometimes help and hurt us.
Dijalog o Kosovu: trendovi stavova javnosti u periodu od jula 2017. do aprila...BlogOpen
Rezime:
=> Stavove i mišljenje građana na društvenim mrežama inicira i formira uticaj medija, vladajuća retorika i uticaj neposrednih političkih događaja. Ekstremni događaji podižu udeo narativa i retorike koji imaju negativno značenje (govor mržnje, agitacija - poziv na rat, nepoverenje prema vlasti).
=> Prosečno, više od polovine građana (59%) kroz ceo istraživački ciklus pokazalo je otpor prema rešenju kosovskog pitanja davanjem celog ili dela teritorije Kosova.
=> Tokom vremena, građani su sve manje nagađali šta se dešava ili će se desiti i sve ređe agumentovano tumačili događaje, a sve više pretili i agresivno sukobili mišljenja i stavove.
=> 14% građana je saglasno da se pitanje Kosova reši na bilo koji način, pa i priznavanjem, 27% bi potencijalno, uz dobru argumentaciju, pružilo podršku vladi za svako njeno rešenje, samo da do rešenja dođe.
=> Stabilnih 5% građana je spremno da oružjem brani Kosovo.
Vođa istraživanja i analitike: Tatjana Vehovec
Vanredni izveštaj: šta su građani na mrežama rekli nakon hapšenja Marka ĐurićaBlogOpen
Istraživanje javnog mnjenja građana na društvenoj mreži Facebook, i tumačenje narativa, emocija, poruka koje građani iskazuju kroz komentare i diskusiju, a tiču se dijaloga o Kosovu ili kosovskog pitanja, generalno.
Ovo je dodatno istraživanjem redovnom mesečnom ciklusu, u kojem je obuhvaćeno prvih 24 sata od kada je u javnost dospela vest da je direktor Kancelarije za KIM, Marko Đurić, uhapšen na Kosovu (26-27. mart).
Istraživanje je deo projekta "Otvoreni, inkluzivni i participativni dijalog o Kosovu" a predstavlja dodatak četvrtom, od planirah pet istraživanja javnog mnjenja na Internetu.
Istraživanje sprovodi Centar za nove medije Liber, a projekat podržava Fond za otvoreno društvo, Srbija.
Autori: Tatjana Vehovec, Svetlana Slijepčević, Aleksej Kišjuhas, Roman Vehovec
Građani u Dijalogu o Kosovu (istraživanje, Vol 3)BlogOpen
Istraživanje javnog mnjenja građana na društvenoj mreži Facebook, i tumačenje narativa, emocija, poruka koje građani iskazuju kroz komentare i diskusiju, a tiču se dijaloga o Kosovu ili kosovskog pitanja, generalno..
Istraživanje je deo projekta "Otvoreni, inkluzivni i participativni dijalog o Kosovu" a predstavlja treći, od planirah pet istraživanja javnog mnjenja na Internetu. U ovom ciklusu se odnosi na period od 16. januara do 15. februara 2018. godine.
Istraživanje sprovodi Centar za nove medije Liber, a projekat podržava Fond za otvoreno društvo, Srbija.
Autori: Tatjana Vehovec, Svetlana Slijepčević, Aleksej Kišjuhas, Roman Vehovec
Građani u dijalogu o Kosovu (istraživanje, Vol. 2)BlogOpen
Istraživanje javnog mnjenja građana na društvenoj mreži Facebook, i tumačenje narativa, emocija, poruka koje građani iskazuju kroz komentare i diskusiju, a tiču se dijaloga o Kosovu ili kosovskog pitanja, generalno..
Istraživanje je deo projekta "Otvoreni, inkluzivni i participativni dijalog o Kosovu" a predstavlja drugi, od planirah pet istraživanja javnog mnjenja na Internetu. U ovom ciklusu se odnosi na period od 1. novembra 2017. do 15. januara 2018. godine.
Istraživanje sprovodi Centar za nove medije Liber, a projekat podržava Fond za otvoreno društvo, Srbija.
Autori: Tatjana Vehovec, Svetlana Slijepčević, Aleksej Kišjuhas, Roman Vehovec
Građani u dijalogu o Kosovu [istraživanje, Vol1.]BlogOpen
Istraživanje javnog mnjenja građana na društvenoj mreži Facebook, i tumačenje narativa, emocija, poruka koje građani iskazuju kroz komentare i diskusiju, a tiču se dijaloga o Kosovu ili kosovskog pitanja, generalno..
Istraživanje je deo projekta "Otvoreni, inkluzivni i participativni dijalog o Kosovu" a predstavlja prvi, od planirah pet istraživanja javnog mnjenja na Internetu. U ovom ciklusu se odnosi na period od 24. jula do 31. oktobra 2017. godine.
Istraživanje sprovodi Centar za nove medije Liber, a projekat podržava Fond za otvoreno društvo, Srbija.
Autori: Tatjana Vehovec, Svetlana Slijepčević, Aleksej Kišjuhas, Roman Vehovec
Političko biće tviteraša u predizbornoj kampanji u Srbiji 2016.
Istraživanje odnosa tviteraša prema političkim strankama (deo istraživanja političke volje Tviteraša).
Istraživanje je rađeno od 16. februara do 6. aprila 2016. godine, kvalitativnom, kvantitativnom i kontekstualnom analizom tvitova upućenih političkim strankama kroz tag, reply i mentions.
Da li ima hejta na Internetu? [istraživanje]BlogOpen
Istraživanje sprovedeno na mrežama, tokom januara i februara 2016. godine, daje zanimljiv i pomalo zastrašujući prizor ogromnog prisustva govora mržnje i verbalnog nasilja na Internetu.
#H8index - Mapiranje govora mrznje na tviteru BlogOpen
Kako se javne ličnosti obraćaju javnosti, kako se javnost obraća javnim ličnostima.
Rezultati istraživanja o različitim vrstama verbalne agresije i govora mržnje na Tviteru.
Autor istraživanja: Tatjana Vehovec
Politicki astroturfing - rezultati istrazivanja, SrbijaBlogOpen
Politički astroturfing, pojava koju u Srbiji nazivamo "botovi", istraživana je tokom četiri meseca, kao fenomen koji utiče na komunikaciju na Tviteru, povećava govor mržnje i uvreda, i može da utiče na javno mnjenje, ili, tačnije, atmosferu na mreži. U prilogu je deo najbitnijih zaključaka naučne socio-psihološke, kao i kvanitatitativno/kvalitativne analize. Istraživanje sproveo Centar za nove medije Liber, kao partner Fondacije za otvoreno društvo, Srbija. Autori i saradnici na projektu: Tatjana Vehovec, Roman Vehovec, Nikola Jovanović, Nikolina Ljepava, Marko Škorić i Aleksej KišjuhasAstroturfing
Aleksandar Vučić, politička polarizacija i diskurs na Tviteru [istraživanje]BlogOpen
Istraživanje pominjanja ključne reči Vučić, Vucic i Вучић, kao i hashtagova #Vučić i #Vucic, u periodu od 6. februara do 6. marta 2015. godine.
Istraživanje pokazuje da je odnos prema Aleksandru Vučiću na Tviteru pretežno negativan, u 92% slučaja, a da u isto vreme, mediji o Vučiću izveštavaju u istom tom procentu pozitivno.
Analizom je utvrđeno da je preovlađujući govor podrške Aleksandru Vučiću uglavnom govorni čin tvrdnje, a da se podrška svaki četvrti put izražava obračunom sa neistomišljenicima, pri čemu se najčešće koristi logička pseudoargumentacija.
Istraživanje pokazuje da je preovlađujući govor oponiranja Aleksandru Vučiću je takođe tvrdnja i to u više od polovine tvitova, a po načinu iskazivanja preovladava ironija i sarkazam.
Duboljom analizom diskursa, utvrđena je direktna kauzalnost vrste javnog govora premijera i vrste govora tviteraške javnosti. Posebno uočljiva je zapaljivost govora segregacije, razdvajanja, tipa "ja versus oni", "mi versus vi", koja poziva obe grupe na ponavljanje logičke matrice na Tviteru.
Istraživanje je pokazalo da na Tviteru postoji visok nivo političkog nezadovoljstva obe grupe. "Negativna" grupa ga iskazuje u 100% svojih tvitova, a "pozitivna" grupa svoju podršku premijeru iskazuje političkim nezadovoljstvom prema oponentima u čak polovini slučajeva.
Istraživanje je rađeno na uzorku od 4.758 jedinstvenih profila koji su objavili 9553 tvitova koji sadrže ključnu reč Vučić. Narativno objašnjenje nalaza možete pogledati ovde http://www.blogopen.rs/2015/03/27/aleksandar-vucic-i-politicka-polarizacija-i-diskurs-na-tviteru/
Politička polarizacija na Tviteru i strateško delovanje političkih formacija ("botova") u Srbiji, studija slučaja na primeru online događaja #KZN [februar 2015.]
Celu studiju možete pogledati i preuzeti ovde: http://www.blogopen.rs/2015/03/11/politicka-polarizacija-na-tviteru-studija-slucaja-kzn/
2. M2techCNBS server CNBS or CyberNet Backup Server is a backup solution designed to create selective backups (online workstations and servers) and, if necessary, bare metal restore (offline workstations and servers) based on Linux, MS Windows, OS X and BSD. M2tech arrow server
3. For the bare metal backup (hereinafter offline backup) the specifications are as follows: Supports multiple filesystems and can therefore be used to backup Linux, MS Windows, Intel based Mac OS and FreeBSD, NetBSD and OpenBSD, no matter it is 32-bit (x86) or 64-bit (x86-64) OS. For these file systems, only used blocks are saved and restored which increases the efficiency. For any unsupported file system, sector-to-sector copy is done. LVM2 and GRUB boot loader are supported. M2tech arrow server
4. What makes bare metal backup special? M2tech arrow server Almost all steps can be done via commands and options. Multicast and massively clone are supported if PXE boot and WOL are enabled in your clients. The hostname, group, and SID of cloned MS windows clients can be automatically changed. The image file of the disc can be recorded on local disk, SSH, Samba or NFS server.
5. Limitations of the CNBS offline backup procedure: M2tech CNBS server The disc on which the deploy is done must be equal or larger than the source image. Differential/incremental backup is not implemented yet by the CNBS. The partition to be cloned has to be unmounted at the moment of cloning. It is not possible to recover a single file from the image file, nor is it possible to search it due to the way of compression. To recover a single file from the backup, the image can be mounted on the virtual machine using tools like virtual box or vmware player. Network outages could corrupt the backup in progress.
6. For selective backup (hereinafter online backup) the specifications are as follows: M2tech CNBS server Backup of the files in use (locked) at the moment of backup. Selective choice of directories to be backed up. Restoring single files from the backup archive without performing the deploy of the whole backup. Automation and scheduling of back up operations for each workstation independently, as well as, keeping records and reviews of all previous backup operations including the time of the operation amount of data that is / will be backed up and the next scheduled operation. Domain environment is not required for the implementation of the CNBS functioning, meaning it can operate in a workgroup.
7. Limitations of the CNBS online backup procedure: M2tech CNBS server Administrator access privileges to each workstation on which the backup will be performed are required either via domain admin user or a local admin user. Standard locations (like Desktop, My Documents etc.) must be on default locations if their backup is planned, or we must be notified to make the necessary changes.
8. Limitations of the current CNBS online backup procedure: M2tech CNBS server The slightest change of any file that has previously been backed up will require a new backup of the whole file, which decreases the efficiency of the incremental backup… As with the offline backup, a functional, reliable and protected network infrastructure is needed.
9. What does the client receive M2tech CNBS server M2tech CNBS server, aunique solution for creating workstation backups. The implementation of M2tech CNBS server done by Cybernet Technology d.o.o. One year M2tech CNBS server maintenance.