Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2717491guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
LISA'14: Proceedings of the 28th USENIX conference on Large Installation System Administration
2014 Proceeding
Publisher:
  • USENIX Association
  • 2560 Ninth St. Suite 215 Berkeley, CA
  • United States
Conference:
Seattle WA November 9 - 14, 2014
ISBN:
978-1-931971-17-1
Published:
09 November 2014
Sponsors:
USENIX Assoc
In-Cooperation:
LOPSA

Reflects downloads up to 18 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
HotRestore: a fast restore system for virtual machine cluster
Pages 1–16

A common way for virtual machine cluster (VMC) to tolerate failures is to create distributed snapshot and then restore from the snapshot upon failure. However, restoring the whole VMC suffers from long restore latency due to large snapshot files. ...

Article
Compiling abstract specifications into concrete systems: bringing order to the cloud
Pages 17–33

Currently, there are important limitations in the abstractions that support creating and managing services in a cloud-based IT system. As a result, cloud users must choose between managing the low-level details of their cloud services directly (as in ...

Article
An administrator's guide to internet password research
Pages 35–52

The research literature on passwords is rich but little of it directly aids those charged with securing web-facing services or setting policies. With a view to improving this situation we examine questions of implementation choices, policy and ...

Article
Analyzing log analysis: an empirical study of user log mining
Pages 53–68

We present an in-depth study of over 200K log analysis queries from Splunk, a platform for data analytics. Using these queries, we quantitatively describe log analysis behavior to inform the design of analysis tools. This study includes state machine ...

Article
Realtime high-speed network traffic monitoring using ntopng
Pages 69–79

Monitoring network traffic has become increasingly challenging in terms of number of hosts, protocol proliferation and probe placement topologies. Virtualised environments and cloud services shifted the focus from dedicated hardware monitoring devices ...

Article
Towards detecting target link flooding attack
Pages 81–96

A new class of target link flooding attacks (LFA) can cut off the Internet connections of a target area without being detected because they employ legitimate flows to congest selected links. Although new mechanisms for defending against LFA have been ...

Article
Automatic and dynamic configuration of data compression for web servers
Pages 97–108

HTTP compression is an essential tool for web speed up and network cost reduction. Not surprisingly, it is used by over 95% of top websites, saving about 75% of webpage traffic.

The currently used compression format and tools were designed over 15 years ...

Article
The truth about MapReduce performance on SSDs
Pages 109–117

Solid-state drives (SSDs) are increasingly being considered as a viable alternative to rotational hard-disk drives (HDDs). In this paper, we investigate if SSDs improve the performance of MapReduce workloads and evaluate the economics of using PCIe SSDs ...

Article
ParaSwift: file I/O trace modeling for the future
Pages 119–132

Historically, traces have been used by system designers for designing and testing their systems. However, traces are becoming very large and difficult to store and manage. Thus, the area of creating models based on traces is gaining traction. Prior art ...

Article
Pedagogical framework and network laboratory management tool for practical network administration education
Page 133

System Administration is an emerging academic discipline, yet there remains no commonly accepted approach to teaching the core skill of troubleshooting system problems. Troubleshooting is considered by many in the field to be the single most important ...

Article
An investigation of cultural and organizational impacts on EKR use and EKR use outcomes among system administrators at NASA
Pages 135–136

Organizations develop and implement Electronic Knowledge Repositories (EKRs) to support the codification, storage and reuse of knowledge. EKRs are seeing increased use in expert technical professions, such as system administration. Sysadmin.nasa.gov is ...

Article
Demand-provisioned linux containers for private network access
Page 139

System Administrators often need to have remote access to restricted networks that are separated for security reasons. The most common solution to this problem is to use a virtual private network (VPN) between the system administrator's client host to ...

Article
Virtual interfaces for exploration of heterogeneous & cloud computing architectures
Page 141

In recent years data center operations have evolved into extensive infrastructures that can support of a wide range of computing paradigms, from traditional application hosting and data storage to service oriented architectures (SOAs) and emerging cloud ...

Article
Time-synchronized visualization of arbitrary data streams for real-time monitoring and historical analysis
Page 143

Large installations involve huge numbers of interacting components that are subject to a multitude of hardware failures, transient errors, software bugs, and misconfiguration. Monitoring the health, utilization, security, and/or configuration of such ...

Contributors
  • Microsoft Research

Recommendations