Route 66 maps + Navigation by TomTom on Android App - "Follow me"

Route 66 maps + Navigation by TomTom on Android App - "Follow me" - Route 66 joined forces with TomTom at the end of last year in order to create a few new products.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, January 28, 2005

Why Caching Works

Why Caching Works



Cache is in some ways a really amazing technology. A 512 KB level 2 cache, caching 64 MB of system memory, can supply the information that the processor requests 90-95% of the time. Think about the ratios here: the level 2 cache is less than 1% of the size of the memory it is caching, but it is able to register a "hit" on over 90% of requests. That's pretty efficient, and is the reason why caching is so important.



The reason that this happens is due to a computer science principle called locality of reference. It states basically that even within very large programs with several megabytes of instructions, only small portions of this code generally get used at once. Programs tend to spend large periods of time working in one small area of the code, often performing the same work many times over and over with slightly different data, and then move to another area. This occurs because of "loops", which are what programs use to do work many times in rapid succession.



Just as one example (there are many), let's suppose you start up your word processor and open your favorite document. The word processor program at some point must read the file and then print on the screen the text it finds. This is done (in very simplified terms) using code similar to this:

Open document file.

Open screen window.

For each character in the document:

Read the character.

Store the character into working memory.

Write the character to the window if the character is part of the first page.

Close the document file.



The loop is of course the three instructions that are done "for each character in the document". These instructions will be repeated many thousands of times, and there are hundreds or thousands of loops like these in the software you use. Every time you hit "page down" on your keyboard, the word processor must clear the screen, figure out which characters to display next, and then run a similar loop to copy them from memory to the screen. Several loops are used when you tell it to save the file to the hard disk.



This example shows how caching improves performance when dealing with program code, but what about your data? Not surprisingly, access to data (your work files, etc.) is similarly repetitive. When you are using your word processor, how many times do you scroll up and down looking at the same text over and over, as you edit it? The system cache holds much of this information so that it can be loaded more quickly the second, third, and next times that it is needed.

Function and Operation of the System Cache

Function and Operation of the System Cache



This section discusses the principles behind the design of cache memory, and explains how the secondary (level 2) cache works in detail. This will give you a much better understanding of how the cache works and what the issues are in its design--at least I hope it will, because that was my primary goal in writing this. I was frustrated as I put the site together with my inability to find anything on the 'net that really explained how the cache worked.



This section is focused on the secondary cache, but in fact, the function of the primary (level 1) cache built into modern processors is in many ways identical: in terms of how associativity works, how the cache is organized, how the system checks for hits, etc. However, many of the implementation details are different.



Note: This is an advanced section with some potentially confusing concepts. I make use of examples in order to hopefully make sure the explanations make sense. You will find this section most helpful if you read all the subsections it contains in order. You may also find reading the section explaining system memory operation and timing instructive. This page also makes extensive reference to memory addresses and locations, and binary numbers. If you are not familiar with binary mathematics, you may want to read this introductory page on the subject.

Function and Operation of the System Cache

Function and Operation of the System Cache



This section discusses the principles behind the design of cache memory, and explains how the secondary (level 2) cache works in detail. This will give you a much better understanding of how the cache works and what the issues are in its design--at least I hope it will, because that was my primary goal in writing this. I was frustrated as I put the site together with my inability to find anything on the 'net that really explained how the cache worked.



This section is focused on the secondary cache, but in fact, the function of the primary (level 1) cache built into modern processors is in many ways identical: in terms of how associativity works, how the cache is organized, how the system checks for hits, etc. However, many of the implementation details are different.



Note: This is an advanced section with some potentially confusing concepts. I make use of examples in order to hopefully make sure the explanations make sense. You will find this section most helpful if you read all the subsections it contains in order. You may also find reading the section explaining system memory operation and timing instructive. This page also makes extensive reference to memory addresses and locations, and binary numbers. If you are not familiar with binary mathematics, you may want to read this introductory page on the subject.

What Is 64-bit Computing?

What Is 64-bit Computing?



When reading about PCs and servers, you'll often see the CPU described by the number of bits (e.g., 32-bit or 64-bit), here's a little info about what that means.



32-bit refers to the number of bits (the smallest unit of information on a machine) that can be processed or transmitted in parallel, or the number of bits used for single element in a data format. The term when used in conjunction with a microprocessor indicates the width of the registers; a special high-speed storage area within the CPU. A 32-bit microprocessor can process data and memory addresses that are represented by 32 bits.



64-bit therefore refers to a processor with registers that store 64-bit numbers. A generalization would be to suggest that 64-bit architecture would double the amount of data a CPU can process per clock cycle. Users would note a performance increase because a 64-bit CPU can handle more memory and larger files. One of the most attractive features of 64-bit processors is the amount of memory the system can support. 64-bit architecture will allow systems to address up to 1 terabyte (1000GB) of memory. In today's 32-bit desktop systems, you can have up to 4GB of RAM (provided your motherboard that can handle that much RAM) which is split between the applications and the operating system (OS).



The majority of desktop computers today don't even have 4GB of memory installed, and most small business and home desktop computer software do not require that much memory either. As more complex software and 3D games become available however, we could actually see this become a limitation, but for the average home user that is very far down the road indeed.



Unfortunately, most benefits of a 64-bit CPU will go unnoticed without the key components of a 64-bit operating system and 64-bit software and drivers which are able to take advantage of 64-bit processor features. Additionally for the average home computer user, 32-bits is more than adequate computing power.



When making the transition from 32-bit to 64-bit desktop PCs, users won't actually see Web browsers and word processing programs run faster. Benefits of 64-bit processors would be seen with more demanding applications such as video encoding, scientific research, searching massive databases; tasks where being able to load massive amounts of data into the system's memory is required.



While talk of 64-bit architecture may make one think this is a new technology, 64-bit computing has been used over the past ten years in supercomputing and database management systems. Many companies and organizations with the need to access huge amounts of data have already made the transition to using 64-bit servers, since a 64-bit server can support a greater number of larger files and could effectively load large enterprise databases to into memory allowing for faster searches and data retrieval. Additionally, using a 64-bit server means organizations can support more simultaneous users on each server potentially removing the need for extra hardware as one 64-bit server could replace the use of several 32-bit servers on a network.



It is in scientific and data management industries where the limitations of the 4GB memory of a 32-bit system have been reached and the need for 64-bit processing becomes apparent. Some of the major software developers in the database management systems business, such as Oracle and SQL Server, to name just two, offer 64-bit versions of their database management systems.



While 64-bit servers were once used only by those organizations with massive amounts of data and big budgets, we do see in the near future 64-bit enabled systems hitting the mainstream market. It is only a matter of time until 64-bit software and retail OS packages become available thereby making 64-bit computing an attractive solution for business and home computing needs.











Hardware Today: SGI's Altix Takes Off at NASA

A few years back, a discussion of supercomputing architectures would have turned to talk of Cray or IBM eServer systems. You probably wouldn't have heard much about running Linux on Intel processors. However, with the maturation of open-source technology and the development of Intel's 64-bit technology, the supercomputing dialogue is different these days.



Critical considerations in 64-bit microprocessor design

When people talk about 64-bit computing, it's not always clear what they mean. Most often, they mean some combination of register width, bus width, or address space. For the purposes of this article, it means a processor with 64-bit registers and 64-bit addressing.



Apple Power Mac G5

The new Power Mac G5 line extends as far as you require. Up to two 64-bit G5 processors reaching top speeds of 2.5GHz, room for up to 8GB of main memory.



Windows XP 64-Bit Edition

While compatible with 32-bit applications and existing deployment and management tools, Windows XP 64-Bit Edition provides more efficient processing of extremely large amounts of data, supporting up to 16 terabytes of virtual memory.



The RS/6000 64-bit Solution

This paper describes 64-bit technology and its value ... implementation for the RS/6000 64-bit solution. The essence of the RS/6000 64-bit computing strategy is elaborated.







Vangie 'Aurora' Beal

Writer, www.Webopedia.com

Last updated: December 08, 2004

Livecam: Overview Of The AMD And Intel Systems

Livecam: Overview Of The AMD And Intel Systems



Camera: Both Systems



Here you can see the setup of both systems from AMD and Intel.



The AMD system is on the left and the Intel system is on the right. While the AMD platform is available only with an AGP interface for the graphics card, the Intel platform comes exclusively with a PCIe x16 slot.



Camera: Outside the Lab



The view of media mecca Munich from the THG lab.



Stress Test: Both Systems



Livecam: AMD System In Operation



Camera: AMD System



The AMD system in action: at its core is an MSI K8N Neo2 Platinum board based on the Nvidia NForce3 250 GB chipset



Daily chart for AMD System



A daily overview of live data for the AMD Athlon 64 3500+ (90 nm), which comes equipped with a boxed cooler.



Weekly chart for AMD System



Weekly overview of live stats for the AMD Athlon 64 3500+ system (90 nm). A key to the color codes is provided below



Key to live data color codes

The red line tracks the temperature of the processor - AMD Athlon 64 3500+.

The pink line represents the system temperature of the MSI MSI K8N Neo2 Platinum (MS-7025).

The three blue lines indicate the CPU and system voltages of the 3.3, 5 and 12 Volt phases

The light blue curve represents the CPU fan speed.

The green chart shows the available RAM.

The network load is indicated by the black lines.



Stress Test: AMD System

AMD Vs INTEL

Both the AMD and Intel systems will run non-stop at maximum load for at least five consecutive days. All data will be permanently displayed throughout the duration of the test, including time and temperature readings for the motherboards and CPUs, processor load, storage utilization and network load.



A lot of time and debate went into deciding which software to use in the stress test. We wanted to pick a program that was up to date and useful, with an attractive visual display. In the end we opted for Benchmark 3D Mark05, which will be run in nonstop mode. To get all we could out of the graphics chips, we set all quality parameters to maximum. At the same time, the individual benchmark runs will be counted. There is also a display that will register any system crash and record the time it occurs.

Components Under Stress: Athlon 64 3500+ And P4 3.6 GHz

Components Under Stress: Athlon 64 3500+ And P4 3.6 GHz



Buying all of the components for the test wasn't quite as easy as we had imagined it would be. It was fairly straight-forward to acquire the motherboards from Asus and MSI and the AMD and Intel processors. But it was downright difficult to get hold of the graphics cards (ATI Radeon X800 XT PCIe/AGP and Nvidia 6800 Ultra/6600 GT PCIe/AGP), which we eventually bought from a small dealer in Löhnberg, Germany - CP4U Computer Parts. Not a single dealer in Munich's computer district had all the graphics cards we wanted in stock when we went on our hardware spree. Granted, they were all high-end items, but such pricey cards can generate huge margins during the Christmas season, so we had hoped they would be available.



Buying all of the components for the test wasn't quite as easy as we had imagined it would be. It was fairly straight-forward to acquire the motherboards from Asus and MSI and the AMD and Intel processors. But it was downright difficult to get hold of the graphics cards (ATI Radeon X800 XT PCIe/AGP and Nvidia 6800 Ultra/6600 GT PCIe/AGP), which we eventually bought from a small dealer in Löhnberg, Germany - CP4U Computer Parts. Not a single dealer in Munich's computer district had all the graphics cards we wanted in stock when we went on our hardware spree. Granted, they were all high-end items, but such pricey cards can generate huge margins during the Christmas season, so we had hoped they would be available.

Full Load All The Way: AMD Vs. Intel

Full Load All The Way: AMD Vs. Intel



Around this same time last holiday season, we started a project that ended up setting a world record for processor speeds. Originally, we had planned to content ourselves with the ambitious enough 5 GHz Project: CPU Cooling With Liquid Nitrogen. In the end, we achieved a maximum speed of 5.25 GHz at -190°C. Chipmakers aren't likely to start offering production models capable of such speeds until 2006 at the earliest!



So what about this year? No new speed record? After discussing the issue ad nauseam, we finally decided to shelve record-breaking in favor of revisiting the systems currently in use in real life - where stability and product quality are the primary factors in making a buying decision. This is especially true of the business environment. Here the critical decisive factor for any investment is the TCO (total cost of ownership) over a period of time. So we thought the obvious thing to do would be to subject the latest PC system components to a demanding stress test under real-life conditions.



Unlike most Tom's articles about hardware testing - where we perform a test and then report the results - this test is just starting, and you get to participate! We will be running the test over the next several days, and streaming data and pictures live to the web so you can watch the action and see the results in real time. Let's take a look at the hardware we'll be using, and how the test will be conducted.



server

server [a Webopedia definition]

(ser4ver) (n.) A computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files. Any user on the network can store files on the server. A print server is a computer that manages one or more printers, and a network server is a computer that manages network traffic. A database server is a computer system that processes database queries.



Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer.



If you're not familiar with the functions of a server, but have heard the term in passing, you may think of a server as some mystical computer beast that performs amazing tasks and generally is a hands-off system. Before we delve into the inner-workings of a server, let's start by dispelling that "mystical" thing. From a hardware perspective, a server is simply a computer on your network that is configured to share its resources or run applications for the other computers on the network. You may have a server in place to handle file or database sharing between all users on your network, or have a server configured to allow all users to share a printer, rather than having a printer hooked up to each individual computer in your organization.



What makes the term server doubly confusing is that it can refer to both hardware and software. That is, it can be used to describe a specific software package running on a computer or the computer on which that software is running. The type of server and the software you would use depends on the type of network. LANs and WANs for example are going to use file and print servers while the Internet would use Web servers. In this article we provide an overview on some of the more common types of servers such as application servers, database servers, mail servers, and Web servers.



Application Server [a Webopedia definition]

Also called an appserver. A program that handles all application operations between users and an organization's backend business applications or databases. Application servers are typically used for complex transaction-based applications. To support high-end needs, an application server has to have built-in redundancy, monitors for high-availability, high-performance distributed application services and support for complex database access.



Print Server

Print servers are set up on a network to route print requests from other computer workstations on the network. The server handles the print file request and sends the file to the requested printer where it is spooled. A print server allows multiple users on a network to share the printer.



Database Server

A database server is an application that is based on the client/server architecture model. The application is divided into two parts: a front-end running on a workstation (where users collect and display the database information) and the back-end running on a server where the tasks such as data analysis and storage are performed.



Mail Server [a Webopedia definition]

Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate networks (via LANs and WANs) and across the Internet. Today, most people think of mail servers in terms of the Internet. Mail servers, however, were originally developed for corporate networks (LANs and WANs).



Web Server [a Webopedia definition]

At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP. Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.



FTP Server

An FTP server is a software application running the File Transfer Protocol (FTP), the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer. FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).



Proxy Server [a Webopedia definition]

A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. Proxy servers have two main purposes. Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. proxy servers also Filter Requests to block or disallow specific types of outgoing or incoming requests to the server.



Different Servers for Different Jobs

The type of system you would choose for a server depends mainly on its application within your organization; how much data it will be responsible for storing and retrieving, the number of user requests that you expect will be sent to the server, and how many clients will be accessing the server are all things you will need to consider before choosing a server architecture and software package.



A server is not just one piece of equipment that has the capability to perform a specific task. From a basic file/print server, you could be looking at something as common as a Dell PC with 512MB of memory running Windows or Linux and configured to queue network printing. An example of midrange server, used for more intensive database storage and retrieval functions is HP's 900 midrange server with 32 PCI slots and 256GB of memory to handle the extra workload.



As you can see from this introduction to the many types and configurations of servers, the term is probably one of the most ambiguous tech terms you'll ever come across.s

server

server [a Webopedia definition]

(ser4ver) (n.) A computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files. Any user on the network can store files on the server. A print server is a computer that manages one or more printers, and a network server is a computer that manages network traffic. A database server is a computer system that processes database queries.



Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer.



If you're not familiar with the functions of a server, but have heard the term in passing, you may think of a server as some mystical computer beast that performs amazing tasks and generally is a hands-off system. Before we delve into the inner-workings of a server, let's start by dispelling that "mystical" thing. From a hardware perspective, a server is simply a computer on your network that is configured to share its resources or run applications for the other computers on the network. You may have a server in place to handle file or database sharing between all users on your network, or have a server configured to allow all users to share a printer, rather than having a printer hooked up to each individual computer in your organization.



What makes the term server doubly confusing is that it can refer to both hardware and software. That is, it can be used to describe a specific software package running on a computer or the computer on which that software is running. The type of server and the software you would use depends on the type of network. LANs and WANs for example are going to use file and print servers while the Internet would use Web servers. In this article we provide an overview on some of the more common types of servers such as application servers, database servers, mail servers, and Web servers.



Application Server [a Webopedia definition]

Also called an appserver. A program that handles all application operations between users and an organization's backend business applications or databases. Application servers are typically used for complex transaction-based applications. To support high-end needs, an application server has to have built-in redundancy, monitors for high-availability, high-performance distributed application services and support for complex database access.



Print Server

Print servers are set up on a network to route print requests from other computer workstations on the network. The server handles the print file request and sends the file to the requested printer where it is spooled. A print server allows multiple users on a network to share the printer.



Database Server

A database server is an application that is based on the client/server architecture model. The application is divided into two parts: a front-end running on a workstation (where users collect and display the database information) and the back-end running on a server where the tasks such as data analysis and storage are performed.



Mail Server [a Webopedia definition]

Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate networks (via LANs and WANs) and across the Internet. Today, most people think of mail servers in terms of the Internet. Mail servers, however, were originally developed for corporate networks (LANs and WANs).



Web Server [a Webopedia definition]

At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP. Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.



FTP Server

An FTP server is a software application running the File Transfer Protocol (FTP), the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer. FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).



Proxy Server [a Webopedia definition]

A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. Proxy servers have two main purposes. Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. proxy servers also Filter Requests to block or disallow specific types of outgoing or incoming requests to the server.



Different Servers for Different Jobs

The type of system you would choose for a server depends mainly on its application within your organization; how much data it will be responsible for storing and retrieving, the number of user requests that you expect will be sent to the server, and how many clients will be accessing the server are all things you will need to consider before choosing a server architecture and software package.



A server is not just one piece of equipment that has the capability to perform a specific task. From a basic file/print server, you could be looking at something as common as a Dell PC with 512MB of memory running Windows or Linux and configured to queue network printing. An example of midrange server, used for more intensive database storage and retrieval functions is HP's 900 midrange server with 32 PCI slots and 256GB of memory to handle the extra workload.



As you can see from this introduction to the many types and configurations of servers, the term is probably one of the most ambiguous tech terms you'll ever come across.s

File Scavenger ™Disk Data Recovery Program

bout File Scavenger™





File Scavenger ™ is the most comprehensive, award-winning file undelete and data recovery utility for NTFS volumes on Windows XP®, Windows 2000® or Windows NT®. File Scavenger™ can recover files accidentally deleted, including files removed from the Recycle Bin, in a DOS window, from a network drive (the program must be run on the computer where the drive physically resides), from Windows Explorer with the SHIFT key held down, provided that recovery is attempted before the files are permanently overwritten by new data. File Scavenger™ supports both basic and dynamic disks, NTFS compression, alternate data streams, sparse files, Unicode filenames, etc. Except in severe cases, both the file and the folder path leading to the file can be recovered. English and German versions are available. (However, sales and technical support are available only in English.)





Price:$39.95



Demo copy







With File Scavenger™, files can be recovered from reformatted or corrupted volumes. This is even possible when a volume has been deleted and its original position and size are unknown. Using the unique "Defunct Volume Search" mode, File Scavenger™ can scan an entire physical hard drive to look for traces of defunct volumes. Also in this mode, files can be recovered from broken striped volumes (i.e. RAID 0 or RAID 5) or spanned volumes (volume sets) provided that the component physical drives are still accessible individually. (For striped sets with parity or RAID 5, one drive can be missing.)



File Scavenger™ has advanced algorithms to transparently handle disks with many bad sectors and badly corrupted partitions. The software can be installed on a hard drive or run from a floppy disk. To run File Scavenger™, you must log on as a system administrator to the computer where data recovery is intended.



Disclaimer:



Files can only be restored if the disk areas allocated to the files have not been overwritten by new data. When a file is restored, it is not guaranteed that the content of the recovered file is the same as the original. It is your responsibility to validate the integrity of the data prior to using them.



Important Notice:



The determining factor of successful data recovery is that the volume (i.e. a drive letter such as C:, D:, E:, etc., also referred to as a "drive" or "partition") where the deleted data resided has not been modified. When modifications are made to the volume, the deleted data may be permanently overwritten because the disk clusters they occupied may be reallocated. Common scenarios when this may occur are:

New files are created on the volume.

Existing files are expanded.

New software (including File Scavenger) is installed on the volume.

If the volume contains a network share, network users may unknowingly modify the volume when accessing shared files.

Applications running on the computer may update the volume.

If the volume is the system volume, Windows may modify the volume for internal housekeeping tasks.

If the volume contains the Internet Explorer cache, it may be modified when IE is started

If the volume contains the "TEMP" directory, it may be modified by installation software.



The safest way we recommend to recover files is as follows:

First, stop any activities that may write to the volume to be recovered. Watch out for:

Network users accessing shares on the volume.

Applications on the local computer.

The Windows operating system if the volume contains the system folder or the page file. In this case you may have to shutdown the computer, remove the drive and install it on another computer for recovery.

Download the floppy version of File Scavenger onto a second computer and save it onto the hard drive (of the second computer).

Extract and copy the executables onto a blank floppy disk.

Insert the floppy disk to the computer with the volume to be recovered. Run File Scavenger from the floppy drive. (Click Start, Run and type "a:\filescav.exe".)

Once any files have been found by File Scavenger, restore them to a different volume. (Recovering files to the same volume may cause deleted data to be overwritten and unrecoverable.)

Monday, January 24, 2005

Google Alert for: linux

Google Alert for: linux



IBM to release low-end Linux server

ZDNet.co.uk - UK

IBM is expected to announce the release of a lower-end Linux-based server later this month. OpenPower 710, which can be powered ...

See all stories on this topic



Hardware Today: For Linux, Maturity Leads to Inroads

Server Watch - Darien,CT,USA

In the world of Linux servers, 2004 was not so much about revolutionary breakthroughs as it was about consolidation, growing maturity, and "corporatization ...

See all stories on this topic



Many SMEs keen on Linux

IT AsiaOne - Singapore,Singapore

APART from large businesses and government agencies which are looking at Linux as an alternative to the various flavours of Unix, many SMEs (small and medium ...

See all stories on this topic



Open source business conference includes embedded Linux

Linux News - USA

... OSBC), April 5-6 in San Francisco, will include a panel discussion on mobile devices, analysis of Wind River's historic embrace of Linux, and exploration of ...

See all stories on this topic



Forrester Research Surveys Linux Usage and IBM Increases Open ...

Financial News USA (press release) - La Puente,CA,USA

... (NASDAQ: FORR), 52% said they are now replacing Windows servers with Linux. ... IBM (NYSE: IBM) alone has 600 programmers dedicated to Linux, up from two in 1999. ...

See all stories on this topic



Zultys Technologies Announces VoIP Software Interface for ...

ArriveNet (press release) - Castle Rock,CO,USA

SUNNYVALE, CA -- (Market Wire - Jan 24, 2005) -- Zultys Technologies today announced the availability of MXIE to run on Macintosh and Linux. ...

See all stories on this topic



Linux in Government: OSS in the US Navy?

Linux Journal - USA

... The Open Source Software Institute has become adept at helping government enterprises understand the benefits of open-source software, especially Linux. ...

See all stories on this topic



Brief Look: MEPIS Linux Live CD

Cool Tech Zone - USA

After last week's introduction to Linux, we shall take our first steps into the world of Linux. Many of us have thought of installing ...





Vendor extends patch tools to Linux, Unix

LinuxWorld.au - St Leonards,Australia

Prism Patch Manger 6.3 features support for Red Hat Linux and Solaris, as well as Windows versions, from NT to the latest XP desktop, and Windows Server 2003. ...





Wienux, a Linux for Vienna

Heise Online - Germany

... desks of Vienna's Municipal Authority, the department heads included, from this year on will be given the choice of using a special Linux distribution named ...

Friday, January 21, 2005

JIDHU JOSE

Thursday, January 20, 2005

LINUX-ALERTS

Google Alert for: linux



SCO Wins Legal Round Against IBM Over Linux Code

Reuters - USA

... on Thursday after the small software company won a legal victory in its multibillion dollar lawsuit against IBM over computer software code used in Linux. ...

See all stories on this topic



Study: Linux server attacks declining

ComputerWorld - USA

JANUARY 20, 2005 (TECHWORLD.COM) - Attackers are no longer bothering to attack average Linux systems, apparently because there's so much more money to be made ...

See all stories on this topic



Red Hat to refresh Linux desktop

Cnet Asia - Asia

In line with its server product upgrade, Linux seller Red Hat will release a new operating system for desktop computers, a senior company official has confirmed ...

See all stories on this topic



Intel lets Linux into Centrino camp

Cnet Asia - Asia

SAN FRANCISCO--Improvements to Linux have led Intel to permit Linux laptops to sport the Centrino brand for the first time. Centrino ...

See all stories on this topic



Unpatched Linux still better than Windows

The Inquirer - England,UK

AN UNPATCHED Linux server was able to sit on the Internet for months before being successfully compromised while one running Windows was turned over in a few ...

See all stories on this topic



TimeSys Embedded Linux Development and Testing Tools Among EDN ...

Business Wire (press release) - San Francisco,CA,USA

20, 2005--TimeSys(R) Corporation, a leader in embedded Linux(R) technologies and development tools, today announced that its Eclipse 3.0-based TimeStorm(R ...





CELF technical confab boasts embedded Linux luminaries

Linux News - USA

The Consumer Electronics Linux Forum (CELF) will host a technical conference in late January for its members and their invitees only. ...

See all stories on this topic



Red Hat Linux v4 to Support 5 Indian Languages

ChannelTimes.com - India

Red Hat has announced that Red Hat Enterprise Linux version 4, scheduled for release in February 2005, will support five Indian languages namely, Hindi, Bengali ...

See all stories on this topic



Free for Novell SUSE LINUX Users: "Runtime Revolution Express 2.2

I-Newswire.com (press release) - USA

Runtime Revolution announced today that all users of SUSE LINUX will be able to receive Revolution Express 2.2 free via the Novell Cool Solutions website. ...

See all stories on this topic



Intel lets Linux into Centrino camp

ZDNet.com - USA

... PT. SAN FRANCISCO--Improvements to Linux have led Intel to permit Linux laptops to sport the Centrino brand for the first time. Centrino ...

See all stories on this topic

PHOTOSHOP

The newest addition to the HCS's Seminar program, our Photoshop seminar covers the basics of using this incredibly powerful graphics program. We'll show you how to use Photoshop to create professional-looking graphics for your web pages and elsewhere.



Topics covered include:

Getting Started with Photoshop

Working with Colors

Essential Tools

Manipulating Layers

Working with Imported Images

Selections and Masks

Text and Text Effects

Publishing Your Work



We'll even give you a reference packet (also available here.) so everything you've learned is right at your fingertips. So join the cutting edge. Make your own home page with the Harvard Computer Society.

Basic Web Design

Basic Web Design





Have you ever thought, "Gee, I really ought to make a home page, but it's too confusing"?



Do you have friends who have made their own home pages?



Now you can too!



Even if you've never surfed the web before, or have no idea what the difference is between HTTP and HTML, you can still create and publish your own work on the Internet! You'll come away from this seminar with all the knowledge you'll need to make your own home page. We'll teach you the basics of setting up a web page from start to finish. You'll need to have a fas account to put your page in, or a similar UNIX account on another machine, but beyond that, we'll teach you all you need to know.



Topics covered include:

Creating your public_html directory and setting file permissions

Editing files with pico

HTML syntax and tags

Basic layout tags and document formatting

Making Hyperlinks

Changing colors

Adding images to your page



We'll even give you a reference packet (also available here.) so everything you've learned is right at your fingertips. So join the cutting edge. Make your own home page with the Harvard Computer Society.

Using Unix

Using Unix





An Operating System is the main program that tells your computer how to operate, and provides support to all your other programs. Windows and MacOS are two common Operating Systems today.



Unix is another such operating system. It was designed in the 1970s for large multi-user computer systems, and is extensively used today in the high-end academic and business computing world. Harvard has dozens of very powerful Unix systems available for student use, both for general purposes such as email and news, and also for academic computing needs.



Unix is very powerful, and has had for decades features like multitasking and security that are just recently filtering down to Windows and MacOS. One Unix system can often be used by hundreds of users simultaneously!



However, Unix is controlled from a command-line interface, similar to that of DOS, but vastly more powerful and more capable. As such, it takes a bit of learning to be comfortable with Unix and able to make use of its power. The HCS Using Unix seminar is intended to give you a good general introduction to Unix and some of the things you can do with it.



Topics covered include:

Logging in and out of the Unix systems

Changing your password

Security Issues

Pine: a Program for Internet News and Email.

Unix File Management Commands

Ph: The Phone Directory program

Tracking down your friends with finger and rwho

Communicating with ytalk and write

Additional Harvard Unix Utilities



We'll even give you a reference packet (available here) so everything you've learned is right at your fingertips. So join the cutting edge, and learn to use Unix with the Harvard Computer Society.



Tsunami Clouds Future of Marine Animals

Tsunami Clouds Future of Marine Animals

James Owen in London

for National Geographic News



January 17, 2005



The depth of human tragedy resulting from the Indian Ocean tsunami disaster is incalculable, even though the scale of visible devastation to coastal towns is now shockingly clear.



But what of marine life? When the tsunami struck, land and ocean merged in a most terrifying way. People and uprooted trees were carried out to sea, while stingrays and sharks were left stranded in fields and parking lots.



The impacts are difficult to gauge. Scientists and conservationists say the future of coastal towns will be closely intertwined with that of fragile marine ecosystems. If coral reefs and mangroves aren't nursed and protected, they say, many human livelihoods will be hard to revive.



The most obvious marine casualties of the tsunami waves were washed up in their wake. In Thailand, for instance, dolphins were swept 500 yards (500 meters) inland. Many dead and injured sea turtles were left high and dry, and a three-foot (one-meter) shark ended up in a hotel swimming pool. Beaches were littered with dead fish as well as human bodies.



And while there are fears for some marine species—such as threatened dugongs and saltwater crocodiles in the Andaman Islands—scientists are most concerned about the habitats these animals depend on.



While it says the overwhelming priority remains the human relief effort, the United Nations Environment Programme (UNEP) has begun to assess environmental damage caused by the tsunami triggered by the massive earthquake off northern Sumatra on December 26.



Early reports indicate that many coral reefs have been extensively damaged, according to Stefan Hain, head of the Coral Reef Unit at UNEP's World Conservation Monitoring Centre in Cambridge, England.



Researchers are particularly worried about the backwash of mud and other debris as the tsunami waves receded. "We have satellite images of regions such as the Andaman and Nicobar Islands which show that a huge amount of sediment and debris has been washed from the land and back into the sea," Hain said.



Turbidity Clouds



Hain said experts are working to determine whether these "turbidity clouds" could smother affected coral reefs.



Coral reefs are highly diverse, complex communities. Reefs are built by coral polyps and symbiotic algae, which need pristine waters to thrive.



"The algae depend on sunlight and, via the algae, so do the corals," Hain added. "If you deprive them of sunlight, it is very difficult for corals to survive. To a certain extent, corals have self-cleaning mechanisms, but we will just have to see whether they will cope with this amount of debris."



Hain said that fish and many other coral reef organisms would have been dislocated and washed ashore by the tsunami, but it is difficult to say how long they will take to recover.



Because corals reefs are among the world's most productive ecosystems, Hain said it's vital that their socio-economic role is taken into account as shattered human communities are rebuilt: "There are millions of people who depend directly on these reefs for food—without them they have no livelihood. As we rebuild coastal zones we have to ensure this is done in a way that will ensure the reefs can still provide these services."



And without coral reefs, the wave of destruction could have been far greater. "Where coral-reef and mangrove ecosystems were intact, we have reports from areas like the Maldives, saying they took the brunt of the wave impact, taking the initial energy away," Hain said. "Lives have been saved."



WWF (World Wide Fund for Nature or World Wildlife Fund) said it has had similar reports from Andhra Pradesh, in southeastern India, where mangroves are credited with saving people who took refuge in them.



"Coral reefs act as a natural breakwater, and mangroves are a natural shock absorber, and this applies to floods and cyclones as well as tsunamis," said Simon Cripps, director of WWF's Endangered Seas Programme.



Turtle Nesting Beaches Vanish



Sarang Kulkarni, a marine biologist with Reef Watch Marine Conservation, based in Mumbai (Bombay), India, is currently in the Andaman and Nicobar Islands. He says the latest generation of leatherback, green sea, hawksbill, and olive ridley turtles has been washed away.



"The nesting beaches in South Andaman, Little Andaman, and the Nicobar group of islands have almost vanished as all these islands have gone down by one to three meters [three to ten feet] due to tectonic activity," Kulkarni said. The turtle nesting season runs from November to January.



Kulkarni said early reports suggest coral reefs were not too badly hit in the Andamans, but he fears widespread damage in the Nicobar Islands, which took the full force of the tsunami strike.



Kulkarni is also concerned for the region's dugongs as these threatened marine mammals are not equipped to cope with violent currents.



"Dugongs are not great swimmers, unlike dolphins, and that is a worry," he added. "The same goes for saltwater crocodiles, as the creeks [where these crocodiles live] also experienced severe impacts."



Given the scale of devastation in the region, Kulkarni said it will take some time before a full environmental assessment can be carried out. Kulkarni said coral reefs and mangroves shield the islands during the seven-month monsoon period.



"Seas are very turbulent at that time," he said. "The reefs and mangroves play a crucial role as a barrier, minimizing the impact of waves on the shore."



Marine Nurseries



Mangroves are tropical, intertidal forests composed of salt-tolerant trees and plants. They support a huge variety of marine organisms and are considered vital nursery areas for many species of fish and crustaceans.



Researchers at the U.S. National Oceanic and Atmospheric Administration (NOAA) in Washington, D.C. said nearshore mangroves, estuaries, and sea turtle nesting areas are likely to have been inundated by the tsunami. They said the impact on organisms that inhabit shallow, inshore environments—particularly those that burrow in seabed sediments—could ripple through the marine food chain for decades.



By contrast, NOAA researchers have found that tsunamis usually do little damage to life in deep ocean waters.



But for coral reefs, the tsunami strike represents the latest of many threats to their survival.



Abnormally high sea temperatures in 1998 affected 75 percent of coral reefs around the world, leading to a condition known as bleaching—the corals eject their life-sustaining algae, causing the corals to turn white.



"If water temperatures remain high for long periods, the corals die," Stefan Hain added.



Hain listed other problems afflicting the coral reefs of the Indian Ocean: overfishing, unsustainable fishing methods involving explosives, soil erosion and sedimentation, coastal development, and reef mining for building materials.



"This is not the first tsunami, and it will not be the last," he added. "What we have to ensure is that the additional pressures on those reefs are reduced, so they can recover and function properly."

Students Log On as Scientists Explore Deep Ocean

Students Log On as Scientists Explore Deep Ocean

John Roach

for National Geographic News



December 6, 2004



Deep in the ocean where the sun never shines, stinky clams, slippery tubeworms, ghost-white crabs, eel-like fish, and a gaggle of funky microscopic bacteria huddle around cracks in the Earth that spew scalding hot, toxic brews.



The spewing cracks are known as hydrothermal vents and the life that thrives around them fascinates the scientific community.



This month, thousands of school children are logging on to the Internet to join scientists exploring a series of hydrothermal vents on the East Pacific Rise about 1,200 miles (2,000 kilometers) west of Costa Rica. The rise is part of an underwater mountain range known as the Mid-Ocean Ridge system that snakes the globe like the stitching on a baseball.



"We call the program a virtual field trip, we want [the students] to feel like they are out here with us," said Craig Cary, a marine biologist at the University of Delaware in Lewes, who is leading the Extreme 2004: Exploring the Deep Frontier expedition.



Cary and his team embarked November 30 from Manzanillo, Mexico, on their 21-day voyage aboard the 274-foot (84-meter) research vessel Atlantis. On most days, they'll dive 1 mile (0.6 kilometer) down to the vents in the submersible Alvin.



This is the sixth year in a row Cary has led an expedition to the East Pacific Rise, the fourth involving interaction with middle and high school students who follow along via the Internet and can ask the research team questions and propose experiments.



"It provides a fantastic real-life connection to science for my students," Lana Crumrine, a science teacher at Klamath High School in Klamath Falls, Oregon, said. Crumrine's students are part of the estimated 52,000 from more than 750 participating schools.



"So often students sit in science class and hear about science as something someone did or discovered a long time ago and this program allows students to realize science is dynamic, it's current, and there are still things about our world we don't know," she added.



Biocomplexity



Of great interest to the scientists this year is the complex life of the microorganisms living at the hydrothermal vent sites. The environment is unlike anything else on the planet. Within the length of the human arm, temperatures range from near freezing to boiling.



"We really do not understand how a community of bacteria is mediated by its local environment, especially one that is changing so rapidly as we see in these diffuse flow vent sites," Cary said. "The chemistry is very complicated and very difficult to measure."



Working together, chemists and biologists hope to tease out the details that make life in such an environment possible—knowledge that could lead to new medicines, materials such as crystals, and clues about where to look for life on another planet.



The scientific collaboration is a major component to the "biocomplexity" theme of the 2004 expedition. Biocomplexity is the complex interplay between living organisms and their environment, which requires scientists from different disciplines to work together to understand.



Historically, Cary said, scientists never worked with scientists outside their own discipline, so a marine biologist would never work with a geochemist.



"It has been extremely challenging in that we all had to learn new languages but in the end the results are very exciting because we all are now able to look at the complex environmental problems with a new set of eyes and it is amazing what you see," Cary said.



Student Participation



Cary's interest in opening his annual expeditions up to students via the Internet evolved from the feeling that teachers were losing their creative freedom in the classroom as they were forced to comply with national standards.



The program started with just eight schools in 1999, which proved so successful it was opened to schools across the U.S. in 2000. This year students in almost every U.S. state, Washington D.C., Guam, Puerto Rico as well as in Canada, Mexico, Iran, New Zealand, the United Kingdom, and Uzbekistan are participating.



"It has just taken off beyond my wildest dreams," Cary said. "Kids all over the world get a chance to experience real field science as it is happening. They see us succeed and fail. They see the new discoveries right as we do."



Julie Steen is a science teacher at Mickelson Middle School in Brookings, South Dakota. She is participating in the program for the opportunity it provides her students to interact with the ocean.



"We are landlocked in South Dakota," she said. "The vast majority of my students have only seen an ocean via TV, educational programs, or movies."



Steen has used the program to teach her students about scientific tools and the limits of those tools in an environment such as the deep ocean. On Friday, her students will participate in a live phone conversation with the scientists in the ocean.



Crumrine, the Klamath Falls science teacher, spent much of the fall teaching her students about plate tectonics and the formation of ocean basins. "Seeing footage of scientists visiting areas of active tectonics is a real affirmation for the students," she said.

Thursday, January 13, 2005

Promoting Linux Requires Advertising. It Matters to Me. TM

GnuCash!target="_top">

What is RAID?

So what exactly is RAID? Nope, it's not the bug spray I'm talking about here. It is a technique that was developed to provide speed, reliability, and increased storage capacity using multiple disks, rather than single disk solutions. RAID basically takes multiple hard drives and allows them to be used as one large hard drive with benefits depending on the scheme or level of RAID being used. Depending on your needs, there are many different RAID variations and implementations available with prices ranging from less than $100 to over $25,000. Of course, the better the RAID implementation, the more expensive it's probably going to be. There is really no one best RAID implementation. Some implementations are better than others depending on the actual application.

It used to be that RAID was only available in expensive server systems. However, with the advent of inexpensive RAID controllers, it seems it has pretty much reached the mainstream market. Performance nuts, such as myself, are always looking for the latest technology to give us that edge we need. Of course, the mainstream implementation has it's limitations, and RAID isn't really for everyone. There are many levels of RAID being used today. Before I go into the different levels, I'd like to discuss the basic concepts behind these levels in a little more detail.

RAID and Data Protection Solutions for Linux When a system administrator is first asked to provide a reliable, redundant means of protecting critical data on a server, RAID is usually the first term that comes to mind. In fact, RAID is just one part of an overall data availability architecture. RAID, and some of the complimentary storage technologies, are reviewed below.

RAID, short for Redundant Array of Inexpensive Disks, is a method whereby information is spread across several disks, using techniques such as disk striping (RAID Level 0) and disk mirroring (RAID level 1) to achieve redundancy, lower latency and/or higher bandwidth for reading and/or writing, and recoverability from hard-disk crashes. Over six different types of RAID configurations have been defined. A brief introduction can be found in Mike Neuffer's What Is RAID? page.

If you are a sysadmin contemplating the use of RAID, I strongly encourage you to use EVMS instead. Its a more flexible tool that uses RAID under-the-covers, and provides a better and more comprehensive storage solution than stand-alone RAID.

Related References

EVMS HOWTO

Software RAID HOWTO (for the current linux-2.2 and 2.4 kernels)

Software-RAID-0.4x HOWTO (for the older version-0.4x software raid for linux-2.0 and older linux-2.2 kernels)

Software RAID Installation Overview (for the older version-0.4x software raid)

Logical Volume Manager for Linux

LVM HOWTO

The sg3_utils page provides an excellent cross-reference many disk drive diagnostic and monitoring tools, including links to smartmontools, scsirastools and scu. -->

Linux High Performance SCSI & RAID

Linux RAID FAQ answers some simple questions frequently seen on RAID mailing lists.

Linux-iSCSI Project

DPT Hardware RAID HOWTO

Root RAID HOWTO cookbook

Bootable-RAID on SuSE 7.3 Step by Step

Software-RAID Boot/Root HOWTO




Linux High-Availability HOWTO


-->

Multiple Disk System Tuning (or see this newer version)

SCSI HOWTO

SCSI Programming HOWTO

Disk I/O benchmarking Software

RAID und Linux, Martin Schulze, December 1996 (German) (old/out of date)

RAID Reviews contains some product reviews and performance benchmarks, circa 1998, that were originally a part of this web page. Obsolete/unmaintained.

Types of Data LossMany users come to RAID with the expectation that using it will prevent data loss. This is expecting too much: RAID can help avoid data loss, but it can't prevent it. To understand why, and to be able to plan a better data protection strategy, it is useful to understand the different types of failures, and the way they can cause data loss.

Accidental or Intentional Erasure

One of the leading causes of data loss is the accidental or intentional erasure of files by you or another (human) user. This includes files that were erased by hackers who broke into your system, files that were erased by disgruntled employees, and files erased by you, thinking that they weren't needed any more, or due to a sense of discovery, to find out what old-timers mean when they say they fixed it for good by using the wizardly command su - root; cd /; rm -r *. RAID will not help you recover data lost in this way; to mitigate these kinds of losses, you need to perform regular backups (to archive media that aren't easily lost in a fire, stolen, or accidentally erased).

Total Disk Drive Failure

One possible disk drive failure mode is "complete and total disk failure". This can happen when a computer is dropped or kicked, although it can also happen due to old age (of the drive). Typically, the read head crashes into the disk platter, thereby trashing the head, and keeping any/everything on that platter from being readable. If the disk drive has only one platter, this means everything. Failure of the drive electronics (due to e.g. electrostatic discharge) can result in the same symptoms. This is the pre-eminent failure mode that RAID protects against. By splattering data in a redundant way across many disks, the total failure of any one disk will not cause any actual data loss. A far more common disk failure mode, however, is a slow accumulation of bad blocks: disk sectors which have become bad/unreadable. RAID does not protect against data corruption. This case is discussed in detail below.

Power Loss and Ensuing Data Corruption

Many beginners think that they can test RAID by starting a disk-access intensive job, and then unplugging the power while it is running. This is usually guaranteed to cause some kind of data corruption, and RAID does nothing to prevent it or to recover the resulting lost data. This kind of data corruption/loss can be avoided by using a journaling file system, and/or a journaling database server (to avoid data loss in a running SQL server when the system goes down). In discussions of journaling, there are typically two types of protection that can be offered: journaled meta-data, and journaled (user's) data. The term "meta-data" refers to the file name, the file owner, creation date, permissions, etc., whereas "data" is that actual contents of the file. By journaling the meta-data, a journaling file system can guarantee fast system boot times, by avoiding long integrity checks during boot. However, journaling the meta-data does not prevent the contents of the file from getting scrambled. Note that most journaling file systems journal only the meta-data, and not the data. (Ext3fs can be made to journal data, but at a tremendous performance loss). Note that databases have their own unique ways of guaranteeing data integrity in the face of power loss or system crash.

Bad Blocks on Disk Drive

The most common form of disk drive failure is a slow but steady loss of 'blocks' on the disk drive. Blocks can go bad in a number of ways: microscopic dust sticking to the platter, gouges in the platter when the head struck it, magnetic media applied too thinly at the factory, or worn off due to contact, etc. Over time, bad blocks can accumulate, and, from personal experience, as fast as one a day. Once a block is bad, data cannot be read from it. Bad blocks are not uncommon: all brand new disk drives leave the factory with hundreds (if not thousands) of bad blocks on them. The hard drive electronics can detect a bad block, and automatically reassign in its place a new, good block from elsewhere on the disk. All subsequent accesses to that block by the operating system are automatically and transparently handled by the disk drive. This feature is both good, and bad. As blocks slowly fail on the drive, they are automatically handled until one day the bad-block lookup table on the hard drive is full. At this point, bad blocks become painfully visible to the operating system: Linux grinds to a near halt, while spewing dma_intr: status=0x51 { DriveReady SeekComplete UnrecoverableError } messages.

Despite this being the most common disk failure mode, there are painfully few solutions and precious little that one can do. RAID, even in theory, does not address this problem, nor does file system journaling. At this point, I am aware of only two options: (1) run badblocks or (2) use EVMS. The first option, in the form of 'e2fsck -f -cc' is terrible: it can only be run on an unmounted file system that was built on a raw disk partition, and its painfully slow. A 5 or 10 gig partition can up to an hour, and a 160 gig partition can take a day. Furthermore, it works only on a raw disk partition: if the file system sits on top of a RAID md device, or an LVM logical volume, the exercise is pointless. I have not yet personally tried EVMS ...

(smart == Self-Monitoring Analysis and Reporting Technology System) ide-smart and smartsuite can help understand if this failure mode is about to bite you.

It is likely that md (Linux Software RAID) will gain bad-block replacement capabilities in the 2.5.x kernel series. See this (nasty) discussioni on LKML.

General System Corruption

Windows users are familiar with the vague and uneasy regression of one's system into total chaos, eventually necessitating a clean-slate reinstall of the operating system. Due to bugs in the operating system, the database server, and in other applications, there is a slow buildup of corrupted data until the system finally becomes unusable. There is little that one can do about this, other than to stay away from Windows (Win95/98 in particular), and avoid putting mission-critical services on beta software. Unfortunately, even regular data backups do little to avoid this kind of corruption: most likely, one is backing up corrupted data. The good news is that this is an uncommon phenomenon under Linux; I can't name any examples of this kind of corruption. Which is not to say that it doesn't occur: although unseen when handling ordinary files under linux/ext2fs, it may show up in some database products, or systems that do a lot of document mangling (e.g. due to an obscure bug in a word processor). While Linux won't crash if the word processor has a bug in it, this kind of a bug can lead to irretrievable data loss, which can be almost as bad. Other than file archiving, I know of no strategies for dealing with this kind of data loss.

Note that this kind of corruption can also occur due to bad hardware, cabling, or even an electrically noisy environment. A loose cable may slowly corrupt data, although it will usually show itself in other ways, which the device driver will interpret as broken hardware.

Linux RAID SolutionsThere are three types of RAID solution options available to Linux users: software RAID, outboard DASD boxes, and RAID disk controllers.

Software RAID

Pure software RAID implements the various RAID levels in the kernel disk (block device) code. Pure-software RAID offers the cheapest possible solution: not only are expensive disk controller cards or hot-swap chassis not required, but software RAID works with cheaper IDE disks as well as SCSI disks. With today's fast CPU's, software RAID performance can hold its own against hardware RAID in all but the most heavily loaded and largest systems. The current Linux Software RAID is becoming increasingly fast, feature-rich and reliable, making many of the lower-end hardware solutions uninteresting. Expensive, high-end hardware may still offer advantages, but the nature of those advantages are not entirely clear.

Note that there are currently two Linux Software RAID implementations: the md (multi-disk) driver, which has been around since the early linux-2.0.x days, and the newer EVMS driver. The EVMS driver appears to be disk-format compatible with md. Features of the md driver include:

RAID-0 (striping), 1(mirroring), 4 and 5(parity) support.

Automatic Hot Reconstruction (if the array is inconsistent due to a power outage or a replaced disk, it will be rebuilt in the background while the system is running).

Hot Spare (a standby disk will get used if another disk fails).

Hot Swap (disks can be changed in a running array).

MD does not handle bad block relocation. Note that while Linux MD is tried-and-true, reliable, robust, and does what it promises, its development is essentially at a standstill. For this reason, it seems that EVMS, with its greater activity, and strong long-term vision, is

Promoting Linux Requires Advertising. It Matters to Me. TM

GnuCash!target="_top">

What is RAID?

So what exactly is RAID? Nope, it's not the bug spray I'm talking about here. It is a technique that was developed to provide speed, reliability, and increased storage capacity using multiple disks, rather than single disk solutions. RAID basically takes multiple hard drives and allows them to be used as one large hard drive with benefits depending on the scheme or level of RAID being used. Depending on your needs, there are many different RAID variations and implementations available with prices ranging from less than $100 to over $25,000. Of course, the better the RAID implementation, the more expensive it's probably going to be. There is really no one best RAID implementation. Some implementations are better than others depending on the actual application.

It used to be that RAID was only available in expensive server systems. However, with the advent of inexpensive RAID controllers, it seems it has pretty much reached the mainstream market. Performance nuts, such as myself, are always looking for the latest technology to give us that edge we need. Of course, the mainstream implementation has it's limitations, and RAID isn't really for everyone. There are many levels of RAID being used today. Before I go into the different levels, I'd like to discuss the basic concepts behind these levels in a little more detail.

RAID and Data Protection Solutions for Linux When a system administrator is first asked to provide a reliable, redundant means of protecting critical data on a server, RAID is usually the first term that comes to mind. In fact, RAID is just one part of an overall data availability architecture. RAID, and some of the complimentary storage technologies, are reviewed below.

RAID, short for Redundant Array of Inexpensive Disks, is a method whereby information is spread across several disks, using techniques such as disk striping (RAID Level 0) and disk mirroring (RAID level 1) to achieve redundancy, lower latency and/or higher bandwidth for reading and/or writing, and recoverability from hard-disk crashes. Over six different types of RAID configurations have been defined. A brief introduction can be found in Mike Neuffer's What Is RAID? page.

If you are a sysadmin contemplating the use of RAID, I strongly encourage you to use EVMS instead. Its a more flexible tool that uses RAID under-the-covers, and provides a better and more comprehensive storage solution than stand-alone RAID.

Related References

EVMS HOWTO

Software RAID HOWTO (for the current linux-2.2 and 2.4 kernels)

Software-RAID-0.4x HOWTO (for the older version-0.4x software raid for linux-2.0 and older linux-2.2 kernels)

Software RAID Installation Overview (for the older version-0.4x software raid)

Logical Volume Manager for Linux

LVM HOWTO

The sg3_utils page provides an excellent cross-reference many disk drive diagnostic and monitoring tools, including links to smartmontools, scsirastools and scu. -->

Linux High Performance SCSI & RAID

Linux RAID FAQ answers some simple questions frequently seen on RAID mailing lists.

Linux-iSCSI Project

DPT Hardware RAID HOWTO

Root RAID HOWTO cookbook

Bootable-RAID on SuSE 7.3 Step by Step

Software-RAID Boot/Root HOWTO




Linux High-Availability HOWTO


-->

Multiple Disk System Tuning (or see this newer version)

SCSI HOWTO

SCSI Programming HOWTO

Disk I/O benchmarking Software

RAID und Linux, Martin Schulze, December 1996 (German) (old/out of date)

RAID Reviews contains some product reviews and performance benchmarks, circa 1998, that were originally a part of this web page. Obsolete/unmaintained.

Types of Data LossMany users come to RAID with the expectation that using it will prevent data loss. This is expecting too much: RAID can help avoid data loss, but it can't prevent it. To understand why, and to be able to plan a better data protection strategy, it is useful to understand the different types of failures, and the way they can cause data loss.

Accidental or Intentional Erasure

One of the leading causes of data loss is the accidental or intentional erasure of files by you or another (human) user. This includes files that were erased by hackers who broke into your system, files that were erased by disgruntled employees, and files erased by you, thinking that they weren't needed any more, or due to a sense of discovery, to find out what old-timers mean when they say they fixed it for good by using the wizardly command su - root; cd /; rm -r *. RAID will not help you recover data lost in this way; to mitigate these kinds of losses, you need to perform regular backups (to archive media that aren't easily lost in a fire, stolen, or accidentally erased).

Total Disk Drive Failure

One possible disk drive failure mode is "complete and total disk failure". This can happen when a computer is dropped or kicked, although it can also happen due to old age (of the drive). Typically, the read head crashes into the disk platter, thereby trashing the head, and keeping any/everything on that platter from being readable. If the disk drive has only one platter, this means everything. Failure of the drive electronics (due to e.g. electrostatic discharge) can result in the same symptoms. This is the pre-eminent failure mode that RAID protects against. By splattering data in a redundant way across many disks, the total failure of any one disk will not cause any actual data loss. A far more common disk failure mode, however, is a slow accumulation of bad blocks: disk sectors which have become bad/unreadable. RAID does not protect against data corruption. This case is discussed in detail below.

Power Loss and Ensuing Data Corruption

Many beginners think that they can test RAID by starting a disk-access intensive job, and then unplugging the power while it is running. This is usually guaranteed to cause some kind of data corruption, and RAID does nothing to prevent it or to recover the resulting lost data. This kind of data corruption/loss can be avoided by using a journaling file system, and/or a journaling database server (to avoid data loss in a running SQL server when the system goes down). In discussions of journaling, there are typically two types of protection that can be offered: journaled meta-data, and journaled (user's) data. The term "meta-data" refers to the file name, the file owner, creation date, permissions, etc., whereas "data" is that actual contents of the file. By journaling the meta-data, a journaling file system can guarantee fast system boot times, by avoiding long integrity checks during boot. However, journaling the meta-data does not prevent the contents of the file from getting scrambled. Note that most journaling file systems journal only the meta-data, and not the data. (Ext3fs can be made to journal data, but at a tremendous performance loss). Note that databases have their own unique ways of guaranteeing data integrity in the face of power loss or system crash.

Bad Blocks on Disk Drive

The most common form of disk drive failure is a slow but steady loss of 'blocks' on the disk drive. Blocks can go bad in a number of ways: microscopic dust sticking to the platter, gouges in the platter when the head struck it, magnetic media applied too thinly at the factory, or worn off due to contact, etc. Over time, bad blocks can accumulate, and, from personal experience, as fast as one a day. Once a block is bad, data cannot be read from it. Bad blocks are not uncommon: all brand new disk drives leave the factory with hundreds (if not thousands) of bad blocks on them. The hard drive electronics can detect a bad block, and automatically reassign in its place a new, good block from elsewhere on the disk. All subsequent accesses to that block by the operating system are automatically and transparently handled by the disk drive. This feature is both good, and bad. As blocks slowly fail on the drive, they are automatically handled until one day the bad-block lookup table on the hard drive is full. At this point, bad blocks become painfully visible to the operating system: Linux grinds to a near halt, while spewing dma_intr: status=0x51 { DriveReady SeekComplete UnrecoverableError } messages.

Despite this being the most common disk failure mode, there are painfully few solutions and precious little that one can do. RAID, even in theory, does not address this problem, nor does file system journaling. At this point, I am aware of only two options: (1) run badblocks or (2) use EVMS. The first option, in the form of 'e2fsck -f -cc' is terrible: it can only be run on an unmounted file system that was built on a raw disk partition, and its painfully slow. A 5 or 10 gig partition can up to an hour, and a 160 gig partition can take a day. Furthermore, it works only on a raw disk partition: if the file system sits on top of a RAID md device, or an LVM logical volume, the exercise is pointless. I have not yet personally tried EVMS ...

(smart == Self-Monitoring Analysis and Reporting Technology System) ide-smart and smartsuite can help understand if this failure mode is about to bite you.

It is likely that md (Linux Software RAID) will gain bad-block replacement capabilities in the 2.5.x kernel series. See this (nasty) discussioni on LKML.

General System Corruption

Windows users are familiar with the vague and uneasy regression of one's system into total chaos, eventually necessitating a clean-slate reinstall of the operating system. Due to bugs in the operating system, the database server, and in other applications, there is a slow buildup of corrupted data until the system finally becomes unusable. There is little that one can do about this, other than to stay away from Windows (Win95/98 in particular), and avoid putting mission-critical services on beta software. Unfortunately, even regular data backups do little to avoid this kind of corruption: most likely, one is backing up corrupted data. The good news is that this is an uncommon phenomenon under Linux; I can't name any examples of this kind of corruption. Which is not to say that it doesn't occur: although unseen when handling ordinary files under linux/ext2fs, it may show up in some database products, or systems that do a lot of document mangling (e.g. due to an obscure bug in a word processor). While Linux won't crash if the word processor has a bug in it, this kind of a bug can lead to irretrievable data loss, which can be almost as bad. Other than file archiving, I know of no strategies for dealing with this kind of data loss.

Note that this kind of corruption can also occur due to bad hardware, cabling, or even an electrically noisy environment. A loose cable may slowly corrupt data, although it will usually show itself in other ways, which the device driver will interpret as broken hardware.

Linux RAID SolutionsThere are three types of RAID solution options available to Linux users: software RAID, outboard DASD boxes, and RAID disk controllers.

Software RAID

Pure software RAID implements the various RAID levels in the kernel disk (block device) code. Pure-software RAID offers the cheapest possible solution: not only are expensive disk controller cards or hot-swap chassis not required, but software RAID works with cheaper IDE disks as well as SCSI disks. With today's fast CPU's, software RAID performance can hold its own against hardware RAID in all but the most heavily loaded and largest systems. The current Linux Software RAID is becoming increasingly fast, feature-rich and reliable, making many of the lower-end hardware solutions uninteresting. Expensive, high-end hardware may still offer advantages, but the nature of those advantages are not entirely clear.

Note that there are currently two Linux Software RAID implementations: the md (multi-disk) driver, which has been around since the early linux-2.0.x days, and the newer EVMS driver. The EVMS driver appears to be disk-format compatible with md. Features of the md driver include:

RAID-0 (striping), 1(mirroring), 4 and 5(parity) support.

Automatic Hot Reconstruction (if the array is inconsistent due to a power outage or a replaced disk, it will be rebuilt in the background while the system is running).

Hot Spare (a standby disk will get used if another disk fails).

Hot Swap (disks can be changed in a running array).

MD does not handle bad block relocation. Note that while Linux MD is tried-and-true, reliable, robust, and does what it promises, its development is essentially at a standstill. For this reason, it seems that EVMS, with its greater activity, and strong long-term vision, is the technology to investigate first.

Outboard DASD Solutions

DASD (Direct Access Storage Device, an old IBM mainframe term) are separate boxes that come with their own power supply, provide a cabinet/chassis for holding the hard drives, and appear to Linux as just another SCSI device. In many ways, these offer the most robust RAID solution. Most boxes provide hot-swap disk bays, where failing disk drives can be removed and replaced without turning off power. Outboard solutions usually offer the greatest choice of RAID levels: RAID 0,1,3,4,and 5 are common, as well as combinations of these levels. Some boxes offer redundant power supplies, so that a failure of a power supply will not disable the box. Finally, with Y-scsi cables, such boxes can be attached to several computers, allowing high-availability to be implemented, so that if one computer fails, another can take over operations.

Because these boxes appear as a single drive to the host operating system, yet are composed of multiple SCSI disks, they are sometimes known as SCSI-to-SCSI boxes. Outboard boxes are usually the most reliable RAID solutions, although they are usually the most expensive (e.g. some of the cheaper offerings from IBM are in the twenty-thousand dollar ballpark). The high-end of this technology is frequently called 'SAN' for 'Storage Area Network', and features cable lengths that stretch to kilometers, and the ability for a large number of host CPU's to access one array.

Inboard DASD Solutions

Similar in concept to outboard solutions, there are now a number of bus-to-bus RAID converters that will fit inside a PC case. These in several varieties. One style is a small disk-like box, that fits into a standard 3.5 inch drive bay, and draws power from the power supply in the same way that a disk would. Another style will plug into a PCI, ISA or MicroChannel slot, and use that slot only for electrical power (and the space it provides).

Both SCSI-to-SCSI and EIDE-to-EIDE converters are available. Because these are converters, they appear as ordinary hard-drives to the operating system, and do not require any special drivers. Most such converters seem to support only RAID 0 (stripping) and 1 (mirroring), apparently due to size and cabling restrictions.

The principal advantages of inboard converters are price, reliability, ease-of-use, and in some cases, performance. Disadvantages are usually the lack of RAID-5 support, lack of hot-plug capabilities, and the lack of dual-ended operation.

RAID Disk Controllers

Disk Controllers are adapter cards that plug into the ISA/EISA/PCI bus. Just like regular disk controller cards, a cable attaches them to the disk drives. Unlike regular disk controllers, the RAID controllers will implement RAID on the card itself, performing all necessary operations to provide various RAID levels. Just like outboard boxes, the Linux kernel does not know (or need to know) that RAID is being used. However, just like ordinary disk controllers, these cards must have a corresponding device driver in the Linux kernel to be usable.

If the RAID disk controller has a modern, high-speed DSP/controller on board, and a sufficient amount of cache memory, it can outperform software RAID, especially on a heavily loaded system. However, using and old controller on a modern, fast 2-way or 4-way SMP machine may easily prove to be a performance bottle-neck as compared to a pure software-RAID solution. Some of the performance figures below provide additional insight into this claim.

Related Data Storage Protection TechnologiesThere are several related storage technologies that can provide various amounts of data redundancy, fault tolerance and high-availability features. These are typically used in conjunction with RAID, as a part of the overall system data protection design strategy.

SAN and NAS

There are a variety of high-end storage solutions available for large installations. These go typically under the acronyms 'NAS' and 'SAN'. NAS abbreviates 'Network Area Storage', and refers to NFS and Samba servers that Unix and Windows clients can mount. SAN abbreviates 'Storage Area Network', and refers to schemes that are the conceptual equivalent of thousand-foot-long disk-drive ribbon cables. Although the cables themselves may be fiber-optic (Fibre-Channel) or Ethernet (e.g. iSCSI), the attached devices appear to be 'ordinary disk drives' from the point of view of the host computer. These systems can be quite sophisticated: for example, this white-paper describes a SAN-like system that has built-in RAID and LVM features.

The Linux-iSCSI Project provides an iSCSI device driver that allows the local box to access iSCSI devices on the network.

Journaling

Journaling refers to the concept of having a file system write a 'diary' of information to the disk in such a way as to allow the file system to be quickly restored to a consistent state after a power failure or other unanticipated hardware/software failure. A journaled file system can be brought back on-line quickly after a system reboot, and, as such, is a vital element of building a reliable, available storage solution.

There are a number of journaled file systems available for Linux. These include:

ReiserFS (which is now a part of the default kernel),

ext3fs (see also here (which is backwards-compatible with ext2fs),

JFS (Developed by IBM, based on JFS for AIX),

XFS (Developed by SGI, based on XFS for Irix) These different systems have different performance profiles and differ significantly in features and functions. There are many articles on the web which compare these. Note that some of these articles may be out-of-date with respect to features, performance or reputed bugs.

ReiserFS or ext3: Which Journaling Filesystem is Right for You? Nicholas Petreley, Nov 2001, a plain-language review, including the journaling data vs. meta-data issue.

Journaling File Systems For Linux, Moshe Bar, May 2000, a more technical review of the theory and operation.

Journal File Systems, Juan I. Santos Florido, July 2000 is a technical review of file system theory and implementation components; compares and reviews the Linux journaling file systems.

Journal File Systems in Linux, Ricardo Galli, Jamuary 2002, reviews some of the more technical aspects of the linux kernel, such as the buffer cache, page cache, etc.

Journaling Filesystem Fragmentation Project, Constantin Loizide, 2001 Master's thesis investigating fragmentation effects on long-term performance.

Benchmarks: -- BULMA, May 2001 -- BULMA FAT32, June 2001 -- BULMA Mongo, May 2001 -- Mandrake, Sept 2000 --

LVM and EVMS

Several volume management systems are available for Linux: LVM, the Logical Volume Manager, and EVMS, the Enterprise Volume Management System. LVM implements a set of features and functions that resemble those that would be found in traditional LVM systems on other Unixes. EVMS is a far more ambitious project, and includes a superset of features found in both LVM And Linux MD (Linux Software RAID). As of this writing (August 2002), EVMS appears to be the superior solution: it provides the right set of features for most system administrators today, and it has the long term strategic vision and an active developer base. By contrast, Linux MD development is essentially at a complete standstill, and has been for years. These are discussed in greater detail below.

LVM

The Linux LVM (like all traditional Unix volume management systems) provides an abstraction of the physical disks that makes it easier to administer large file systems and disk arrays. It does this by grouping sets of disks (physical volumes) into a pool (volume group). The volume group can be in turn be carved up into virtual partitions (logical volumes) that behave just like the ordinary disk block devices, except that (unlike disk partitions) they can be dynamically grown, shrunk and moved about without rebooting the system or entering into maintenance/standalone mode. A file system (or a swap space, or a raw block device) sits on top of a logical volume. In short, LVM adds an abstraction layer between the file system mount points (/, /usr, /opt, etc) and the hard drive devices (/dev/hda, /dev/sdb2, etc.)

The benefit of LVM is that you can add and remove hard drives, and move data from one hard drive to another without disrupting the system or other users. Thus, LVM is ideal for administering servers to which disks are constantly being added, removed or simply moved around to accommodate new users, new applications or just provide more space for the data. If you have only one or two disks, the effort to learn LVM may outweigh any administrative benefits that you gain.

Linux LVM and Linux Software RAID can be used together, although neither layer knows about the other, and some of the advantages of LVM seem to be lost as a result. The usual way of using RAID with LVM is as follows:

Use fdisk (or cfdisk, etc.) to create a set of equal-sized disk partitions.

Create a RAID-5 (or other RAID level array) across these partitions.

Use LVM to create a physical volume on the RAID device. For instance, if the RAID array was /dev/md0, then pvcreate /dev/md0.

Finish setting up LVM as normal. In this scenario, although LVM can still be used to dynamically resize logical volumes, one does loose the benefit adding and removing hard drives willy-nilly. Linux RAID devices cannot be dynamically resized, nor is it easy to move a RAID array from one set of drives to another. One must still do space planning in order to have RAID arrays of the appropriate size. This may change: note that LVM is in the process of acquiring mirroring capabilities, although RAID-5 for LVM is still not envisioned.

Another serious drawback of this RAID+LVM combo is that neither Linux Software RAID (MD) nor LVM have any sort of bad-block replacement mechanisms. If (or rather, when) disks start manifesting bad blocks, one is up a creak without a paddle.

EVMS

EVMS provides an over-arching storage menagement solution, ranging from low-level drivers that provide RAID and LVM features, to high-level command-line and graphical tools for managing partitions, raid arrays, logical volumes and file systems. Of particular interest is that EVMS provides a bad-block replacement mechanism. Another interesting feature of EVMS is "snapshotting" (also suppoorted by LVM): the ability to take a "snapshot" of a file system at a particular point in time, even while the system is active, thereby allowing a consistent backup. Traditionally, without snapshots, backups can take many hours to run, and if files are added, renamed or deleted while the backup is running, the backup will record this inconsistent state.

Veritas

The Veritas Foundation Suite is a storage management software product that includes an LVM-like system. The following very old press release announces this system: VERITAS Software Unveils Linux Strategy and Roadmap (January 2000) It seems that it is now available for IBM mainframes running Linux (August 2003)!

Diagnostic and Monitoring ToolsSooner or later, you will feel the need for tools to diagnose hardware problems, or simply monitor the hardware health. Alternately, some rescue operations require low-level configuration tools. In this case, you might find the following useful:

smartmontools

The smartmontools package (http://smartmontools.sourceforge.net) provides a set of utilities for working with the Self-Monitoring, Analysis and Reporting Technology (SMART) system built into modern IDE/ATA and SCSI-3 disks. These tools can report a variety of disk drive health statistics, and the smartd daemon can run continuously to log events into the syslog.

scsirastools

""This project includes changes that enhance the Reliability, Availability and Serviceability (RAS) of the drivers that are commonly used in a Linux software RAID-1 configuration. Other efforts have been made to enable various common hardware RAID adapters and their drivers on Linux." See http://scsirastools.sourceforge.net. The pacakage contains low level scsi utilities including sgdskfl to load disk firmware, sgmode to get and set mode pages, sgdefects to read primary and grown defect lists and sgdiag to perform format and other test functions."

sg3_utils

The sg3_utils package provides a set of utilities for use with the Linux SCSI Generic (sg) device driver. The utilities include sg variants for the traditional dd command, tools for scanning and mapping the SCSI bus, tools for issuing low-level SCSI commands, tools for timing and testing, and some example source & miscellany.

This web page is remarkable because it also provides a nice cross-reference to other diagnostic and monitoring tools.

scu

"The SCSI Command Utility (SCU) implements various SCSI commands necessary for normal maintenance and diagnostics of SCSI peripherals. Some of its features include: formatting, scanning for (and reassigning) bad blocks, downloading new firmware, executing diagnostics and obtaining performance information. It is available on several Unix platforms (and NT), however it is only currently available in binary form. See www.bit-net.com/~rmiller/scu.html for more details."

Hardware RAID ControllersA hardware controller is a PCI or ISA card that mediates between the CPU and the disk drives via the I/O bus. Hardware controllers always need a device driver to be loaded into the kernel, so that the kernel can talk to the card. Note that there are some devices (which I've listed in the "outboard controllers" section below) that only draw power from the PCI/ISA bus, but do not use any of the signal pins, and do not require a (special) device driver. This section lists only those cards that use the PCI/ISA bus for actually moving data.

Vendors supported under Linux: (Current as of 1998; some of the information below may be rancid.)

Highpoint (New Listing!)

Offer several products, such as the RocketRAID 404 controller which allows four IDE ribbon cables (and up to eight IDE drives) to be attached to the controller. Handy for saving up PCI slots, as IDE is significantly cheaper than SCSI. The RocketRAID BIOS is interesting because it allows hardware-RAID arrays to be built across multiple controllers plugged into the same PCI bus. Thus, for example, a 13-drive hardware RAID array can be built by using multiple controllers.

MegaRAID (New Listing!)

MegaRAID offers the MegaRAID i4 controller for IDE drives features four connectors for IDE ribbons (a total of 8 IDE drives per controller). Supports RAID-5, hot swap and hot spare capabilities.

BigStorage

BigStorage offers a broad line of storage products tailored for Linux.

ICP Vortex

ICP Vortex offers full line of disk array controllers. Drivers are a standard part of the 2.0.x and 2.2.x kernels; the boot diskettes for most major Linux distributions will recognize an ICP controller. Initial configuration can be done through on-board ROM BIOS.

ICP Vortex also provides the GDTMonitor management utility. It provides the ability to monitor transfer rates, set hard drive and controller parameters, and hot-swap and reconstruct defect drives. For sites that cannot afford to take down and reboot a server in order to replace failed disks or do other maintenance, this utility is a gotta-have feature. As of January 1999, this is the only such program that I have heard of for a Linux hardware RAID controller, and this feature alone immediately elevates ICP above the competition.

A RAID Primer (PDF) and Manuals; see Chapter K for GDTmon.

Syred

Syred offers a series of RAID controllers. Their sales staff indicated that they use RedHat internally, so the Linux support should be solid.

BusLogic/Mylex

Buslogic/Mylex offers a series of SCSI controllers, including RAID controllers. BusLogic has been well known for their early support of SCSI on Linux. The latest drivers for these cards are being written & maintained by Dandelion Digital.

DPT

Look for the SmartCache [I/III/IV] and SmartRAID [I/III/IV] controllers from Distributed Processing Technology, Inc. Note that one must use the EATA-DMA driver, which is a part of the standard linux kernel distribution. There are two drivers:

EATA-DMA: The driver for all EATA-DMA compliant (DPT) controllers.

EATA-PIO: The driver for the very old PM2001 and PM2012A from DPT.

IBM ServeRAID

IBM Intel based servers have onboard RAID.

Outboard RAID VendorsThere are many outboard box vendors, and, in theory, they should all work with Linux. In practice, some SCSI boxes support features that SCSI cards don't, and vice-versa, so buyer beware. Note Some outboard controllers are not true stand-alone, external boxes with external power supplies, but are small devices that fit into a standard drive bay, and draw power from the system power supply. Others are shaped as PCI or ISA cards, but use the PCI/ISA slots only to draw power, and do not use the signal pins on the bus. All of these devices need some other disk controller (typically, the stock, non-raid controller that came with your box) to communicate with. The upside to such a scheme: no special device drivers are required. The downside: there are even more cards, cables and connectors that can fail.

StorComp

Storage Computer is an early pioneer in RAID, and has continued to provide sophisticated, advanced systems, focused primarily on the 'SAN' style architecture. For example, their 'Virtual Storage Architecture' allows multiple CPU's to access the disks through SCSI interfaces. See, for example, their Product Sheet. They also have an interesting collection of White Papers.

www.raidweb.com

www.raidweb.com

Arco Computer Products

Arco Computer offers the DupliDisk EIDE-to-EIDE converter for RAID-1 (mirroring). Three versions are supported: one that fits into an ISA slot, one that fits into an IDE slot, and one that fits into a drive bay.

DILOG

DILOG offers the 2XFR SCSI-to-SCSI RAID-0 product. Features:

Fits into a 3.5 inch drive bay.

Certified by an IBM SIT lab to inter-operate with Linux.

Dynamic Network Factory

Dynamic Network Factory specializes in larger arrays.

LAND-5

Offer several products. These appear to be stand-alone scsi-attached boxes, and require no special Linux support. See www.land-5.com

Disk Array Management SoftwareMost controllers can be configured and managed via brute force, by rebooting the machine and descending into on-card BIOS or possibly DOS utilities to reconfigure, exchange and rebuild failed drives. However, for many system operators, rebooting is a luxury that is not available. For these sites and servers, there is a real need for configuration and management software that will not only report on a variety of disk statistics, but also raise alarms where there is trouble, allow failed drives to be disabled, swapped out, and reconstructed, and for all this to be done without taking the array off line, without halting any server functions. Currently (January 1999) I am aware of only one vendor that provides this capability: ICP-Vortex.

ICP Vortex (New Listing)

ICP Vortex provides the GDTMonitor management utility for its controllers. The utility provides the ability to monitor transfer rates, set hard drive and controller parameters, and hot-swap and reconstruct defect drives.

BusLogic

Buslogic offers the Global Array Manager which runs under SCO Unix and UnixWare. Thus, a port to Linux is at least theoretically possible. Contact your sales representative.

StorComp

Storage Computer offers an SNMP MIB for storage management. MIB's being being what they are, any SNMP tool on Linux should be able to use this to query and manage the system. However, MIB's being what they are, this is a rather low-level, (very-) hard to use solution. See also a white paper on storage management.

DPT

DPT provides management software with their cards. The distribution includes SCO binaries. Thus, a port to Linux is at least theoretically possible. Contact your sales representative.

HistoryLast updated August 2003 by Linas Vepstas (linas@linas.org) Copyright (c) 1996-1999, 2001-2003 Linas Vepstas. Copyright (c) 2003 Douglas Gilbert Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included at the URL http://www.linas.org/fdl.html, the web page titled "GNU Free Documentation License". The phrase 'Enterprise Linux' is a trademark of Linas Vepstas. All trademarks on this page are property of their respective owners. Return to the Enterprise Linux(TM) Page Go Back to Linas' Home Page

Related Posts Plugin for WordPress, Blogger...

My Labels

? (1) (Active (1) (Compare) (1) (SEO) (1) [Updated (1) [UPDATED] (1) $7.5M (2) 000 (1) 05/03 (1) 10 on Tuesday (6) 101 goals (1) 11 (1) 111th (1) 1on1 (1) 2 (1) 2-bit sampling (1) 2.6.5 (1) 2007 (1) 2008 (1) 2010 (7) 2010 Workshop (2) 2011 (1) 2011 seminar (1) 2012 (1) 25 Deadly Mistakes of Bloggers who Wish to Earn Money Online (Part 1) (6) 25 Deadly Mistakes of Bloggers who Wish to Earn Money Online (Part 2) (1) 25 mistakes of bloggers (1) 3 things (55) 3D City maps (1) 3D Landmarks (1) 3G (2) 4-bit sampling (1) 401.3 (1) 4PSA’s (1) 4PSA\’s (1) 624 (2) 64-bit (1) 642-566 (1) 642-825 (1) 666 (2) 8 new rules of money (1) 831000 (1) a (1) A.R.Rehman (3) A/c (1) abby (1) ABC Poem (1) about (5) about nothing (1) about.com (1) abuse (1) academic hazard (1) According (1) Account (2) accounts (2) AccuConference (1) Achieves (1) Acquires (1) Across-The-Board (1) ACROSTICS (1) Activism (1) Ad (2) Ad Sponsored Free VoIP Calls (1) adaptation (1) AdBrite (1) add ons (14) Additions (1) addresses (2) Adjourned (1) Adjusting (1) AdLift (1) Adoption (2) Adriana Ritt (1) Ads (1) adsense (8) Adult (1) Advanced (1) Advantages (2) Advertising (1) advise (1) Advisors (1) Advisory (1) Advocacy Organizations (1) Adwords (5) Adwords? (1) Affect (1) affiliate marketing (2) Affiliates (1) Affliate (5) Affordable (3) Afilias (1) Africa (1) against (1) Agile (1) Agreement (2) ahead (1) aim13 (1) air travel (1) Alain de Botton (1) Alert: (1) Alexa (1) alien (2) Alpana Jaiswal (2) Alternative (1) AlwaysOn (1) Amal (4) amazing (1) amazon (4) amazon.com (4) America (1) amex (1) among (1) Amsterdam (1) anakin (1) analysis (2) Analyst (1) Analyzer (1) anarchy (4) Anchor.com.au (1) android (4) Android 2.1 (1) Angaditheru (1) Announced (2) announces (1) Announces (10) Annually (1) another (1) Ant (1) Anupama Menon (1) Anurag (1) Anyone (3) Apache (1) apes (1) App (1) apple (9) Apple world (1) applegirl002 (1) Application (1) Approaches (1) Approves (1) apps (1) Arabiv TV (10) Arbor (1) architecture (1) Art work (2) Article (51) Artillery (1) Ascend? (1) asistants (1) ASP.net (2) Asset (1) assets (1) astronomy (1) Atheism (35) atheistcartoons (9) Athirappilly (1) Atlantic.Net (1) Atlas Srugged (1) Attack (3) Attacks (2) Attains (1) Attend (1) Aubrey de Grey (1) Auction (1) audio antenna (1) Audio Player (2) Australian (2) Austrian School (1) author (1) Automatic (1) autoresponder (1) Availability (1) Available (1) Avectra (1) Aventure (1) Award (2) Awards (2) awareness (1) awesome (13) Ayaan Hirsi Ali (1) Ayn Rand (1) Azam (2) Azure (1) Babies (1) Baby (3) Backlinks (2) Backup (3) backupify (1) Backups (1) Balancing (1) banned (1) Bapuji (1) Barack Obama (1) Basic (1) Basics (1) batch codes (1) Bayern (1) BBC (3) bcgc (2) bday (1) beamwidth (1) beauty queen (1) Becomes (3) Beeck (1) Bees? (1) Before You Ask for a Day Off... (1) Beginners (1) benefit (1) Benefits (3) Berkeley (1) best device (1) Best? (1) Beta (16) between (2) beyonce (1) Bhavin (1) bible Tower (1) big thinkers (1) bigthink (7) Bike (1) Bikram Mann (1) Bill Maher (1) Billed (1) Billing (1) billionaire (1) bio (1) Biology (2) bit torrent (1) bites (1) Bitrix (1) bitten (1) Blackberry (1) BladeCenter (1) Bladeshare (1) Blind (1) Blockage (1) Blog (2) Blog Directories (1) blogawards08 (2) blogger (18) Blogger Mistake 11 Expecting To See Ads All the Time (1) bloggers (1) blogging (41) Blogging Mistake 01 -being impatient with Google Adsense Approval (1) Blogging Mistake08 Stopping Blogging After Being Banned in Adsense (1) blogging styles (1) blogging? (1) blogspot (3) bo sanchez (2) Board (1) Boat (1) boatman (1) bonuses (1) book (4) Bookmark (3) books (8) Bookstore (1) Boost (1) boracay (1) boring (1) BP (1) Brack Obama (1) Brand (1) Branding (1) Breach (1) Break (1) breaking (4) Breaks (1) Brief (1) Brilliant (1) Brings (3) Brunozzi (1) buddhsim (1) Budget (1) Builder (1) Building (1) Buildout (1) BulletStorm? (1) Burson-Marsteller (1) business (21) Business and Economy (1) Business-Class (1) business? (1) businesses (3) businessweek (1) Buying (1) buying a car (1) CableWireless (1) California (1) Calls (1) Camera Critters (28) Campus (4) Canada (1) Canadian (1) Cancel (1) Capabilities (1) Capital (3) CareCloud (1) Career (1) Carol (1) Carrier (1) Cars (2) cartoon (7) Carts (1) CastlePointe (1) cat (2) Catalogs (1) catholic bloggers (1) CATO (1) Cato Institute (2) cause (1) Causes (1) ccHost (1) cdo (1) Cebu (29) Cebu Resort (2) Cebu Travel (5) cebu workshop (2) Celebrates (1) celebrity (5) Cell (1) Center (19) Centers (2) CentOS (1) Certificates (2) Certification (2) Certifications (1) Certified (1) Certs (1) Chameleon (1) Change (1) Changing (1) Channel (1) Chaparral (1) Charities (1) Charles Darwin (2) charts (2) chasing (1) Cheap (6) cheapest (1) Cheapest Car (2) Check (1) Checkup (2) Chicken (1) child (2) children (2) children? (1) chillies (1) China (3) Chips (1) choice (1) Choose (6) Choosing (3) Christian (1) Christopher Hitchens (1) church (1) Cincinnati (2) cinema (1) cirque du freak (1) Cisco (1) Citrix (1) Claims (1) CLARISSE (1) clickbank (2) client (3) clients (2) Climate change (8) Closes (1) Cloud (35) Cloud-computing (1) CloudLinux (1) CloudMove (1) club (2) CMS’s (1) Cnet (1) Co-location (2) coaching call (1) Coast (1) Coca-Cola (1) cockroach (1) Codero (2) Collaboration (1) Colocation (3) Comedy (10) comic (1) comics (3) Commenting (1) comments (2) Commerce (1) commercials (2) Commons (1) Commtouch (1) Communication (1) Communications (2) Community (4) Comodo (2) Company (5) Compare (1) compared (3) Comparison (2) complete information (1) Completed (1) Completes (1) Completion (1) Compliance (1) Compromised (1) computers (3) Computing (7) comunism (1) conclusions (1) Condo (2) condo parking (1) Conference (1) Conferences (2) Configuring (1) conflicts (1) confusion (1) Connect (2) Connects (1) Cons (1) cons? (1) Consider (2) Consideration (1) Considerations (1) conspiracy (1) conspiracy of the rich (1) Consulting (1) consumer exploitation (1) Consumers (1) Contact Me (1) Content (4) Contest (1) Continues (2) Continuing (1) Control (4) ControlCircle (2) Conventional (1) Conversion (1) Conversions (2) Converter (1) Cook (1) Cool stuff (33) Copenhagen (4) CoreXchange (1) Corporation (1) corruption (1) countries (1) Coupon (1) Cowboys (1) crack (1) cracking (1) Craig Venter (1) craze (1) Create (2) Created (1) Creating (1) creating a home theater (1) creationism (1) creative (2) creative commons (1) creativity (2) Credit (1) Crime (1) Crisis (4) Critic (4) Critical (2) crysis (2) cs lewis (1) cubao (1) CUNY (1) cure (1) currencies (1) Current (1) Curry (1) Curve (1) Customer (3) Customers (4) Customizing (1) Cyber (2) cycle (1) Cycling (1) Cypress Hill (1) da vinci code (1) Daddy (1) Dallas (2) dan heath (1) Dance (5) danger (2) Daniel Dennet (1) daniel pink (1) dark matter (1) Daryl Edelstein (1) Dashboard (1) data safe (7) Database (1) Databases: (1) Datacenter (2) Daughter (1) davao (1) dear (1) Debian (1) Debt (1) debunking (2) debuts (1) decade (2) Decision (1) decisions (1) Dedicated (16) DediPower (1) Deepa Kashyap (1) Deepak Amembal (1) Delhi (1) Delivers (2) Dell (2) Deloitte (1) Demand-Dial (1) Demands (1) Deploys (1) Depression (1) design (4) designer (1) Desire (1) Desire: (1) Despite (1) Determining (1) Develop (1) Developer (1) Developing (2) development (4) Diary (1) DID (3) Did you know (1) Diego-Maradona (1) difference (1) Different (1) differs (1) Digg? (1) Digital (1) digital sonar (1) dinosaurs (2) DirectAdmin: (1) Directed (1) Directi (1) Director (2) Directories (1) Directory: (1) Disaster-Recovery (1) DiscountASP.NET (2) discounted (1) Discounts (1) discover (1) discoverability (1) discovery (2) Discussion (1) disease (1) Display (1) Disruptive (1) Do the following as soon as you arise: (1) Do-Follow (1) Document Edit (10) documentary (2) Doesn’t (1) Dogs (6) dolphins (2) Domain (18) domain name (1) domain? (2) Domains (1) DomainsFree.org (1) don't give up (1) donate (1) Donations (2) doomsday (1) Doors (1) Downgrade (1) Download (18) downtime (1) draft (1) Dramatically (1) Dream (1) DreamMachine (1) dreams (3) drive (1) Drive letter assignment (1) drones (1) drugs (1) Drupal (1) dtalpha talkback (1) Dubai (1) Durga Nandan (2) During (1) dvd (2) Dwssruthi (1) E-Business (1) E-Commerce (3) E-mail (1) E71 (3) E72 (1) Earn (1) Earth (5) earth day (1) earth hour 2008 (1) Earthquake (1) easter egg (1) ebook (1) eBOOK STATS (4) Ebooks2Eriches (20) ecological (1) eCommerce (1) Economic (2) Economic freedom (2) economics (24) economix (27) Economy (2) Edge (1) Educate (1) education (4) Educational (7) efficiency (2) Eid (1) eiffel tower (1) EIU (1) Electric Car (1) Elements (1) Elephant (3) email (3) Emerging (1) empire strikes back (1) enable (1) Enchanting (1) energy (2) Engine (7) engines (1) English Video Song (1) Enhance (1) Enhanced (1) Enhancements (15) Enjoy (1) Ensim (1) enterprise (7) enterprise 2.0 (2) enterprises (1) Entertainment (50) entry-level (1) Environment (5) environmental (3) ePages (2) Equinix (1) Equities (1) Equity (1) error (1) error? (1) ESPN TV (1) Ethernet (1) ethics (3) EU (1) European (1) European Parliament (1) European Voice (2) Evaluation (1) evaluations (1) Evasion (1) Event (1) Events (54) Every (1) Everything (1) Evian (1) Evolution (29) Exchange (3) Execs (1) Expanding (1) Expands (5) Expansion (3) Expert (1) Experts (1) Explain (1) exploit (1) Extends (2) Extras (1) Extreme (1) facebook (50) Facebook Marketing (1) Facebook? (1) FaceItPages (1) Faces (1) Factors (3) facts (1) Fail” (1) fancy fonts (1) farms? (1) Farmville (1) Father (1) Faulty (1) Features (4) features? (1) FEMSA (1) FIBERTOWN (1) fiction (1) Fifa world cup 2010 (1) Financial crisis (1) Financial services (1) finding (1) firefly (1) firefox (5) firmware (1) first (2) First Aid (10) Flawed (1) Flexibility (1) flickr (2) Flights (1) flood (1) floods (1) Flower (3) Flowtown (2) FM (2) FM Radio (1) Follow Me (1) followtheprocess (1) Fonts (1) food fight (1) Footnotes (1) Fora.tv (20) Forbidden (1) forecast (1) foreign policy (2) Forget (1) Formed (1) Former (2) Forum (1) forwarders (1) fossils (1) Foundation (1) Fourth (1) Framework (2) Francisco (1) free (82) Free Calls (1) Free Calls Voip (1) Free Download (2) free hugs (6) Free Streaming Mobile TV (15) Free- (1) free? (1) FreeBe TV (1) FreeBSD (1) Freedom (8) freedom of speech (2) Freemont (1) freshminds (1) friends (5) Front (1) fuel (1) Fujitsu (1) full screen (1) Fun (1) Functionality (1) Functions (1) fundamentalism (1) Funding (2) Funny (39) funny video (1) Fusion (1) FusionHQ (1) future (12) gadgets (3) gaining (1) galaxies (1) game (1) Games (16) Gandhiji (1) Gardner (1) Garmin electronics (1) Garmin Marine Autopilot (1) garyvee (1) Geert Wilders (1) generate (1) generating (2) Generation (1) genetics (1) Genius (5) genomics (2) gentleman's quarterly (1) Geocities (1) Geolocation (1) geopolitics (2) George Carlin (3) George Soros (1) Gerd Leonhard (4) Germany (1) get a mentor (1) gf (2) GHP10 (1) GigaOM’s (1) Gizmox (1) Glenn (1) Global (3) Global warming (1) Globalization (2) GlobalSign (1) Gluster (1) Gmail (1) GMR18HD (1) GMR24HD (1) GMR404 (1) GMX Mail (1) GNSS engine (1) GNSS products (1) goal (1) God (10) GoodFella (1) Goodfellow (1) Google (31) google chrome (1) Google’s (1) Government (3) GPRS (1) GPS simulator (1) GPS transmission (1) GPS/GLONASS (1) GPS/GLONASS antenna (1) gq (1) GrandMother (1) great (3) Greater (1) green (4) Greenpeace (1) Gregory Paul (1) Ground (1) Group (1) Growth (3) GSD22 (1) Guarantee (2) Guarantees (1) Guardian (1) Guest (2) guest post (5) Guest Posts (9) guide (5) Guidelines/Rules (1) gumasa (1) Guru (1) GXM51 (1) HAARP (1) Hacked? (1) Hacker (1) hacking (2) Hands (1) hands on (1) Handy (1) Hans Rosling (1) Hans-Dieter (1) Harbor (1) Harbour (1) hardware (5) Hardy (1) harry potter (1) Harvard (1) Health (14) Heard (1) HEGERDESIGN: (1) help (1) Helpful (1) Helps (2) Her Morning Elegance (1) Hetzner (1) Hewlett-Packard (1) Higher (1) Hiking (1) Hip Hop (1) Hires (1) hiring (1) History (3) Hitch (1) HIV (1) Holdem (1) holidays (3) home (2) home renovation (1) Honey (1) hope (3) Horse (1) Hosted (1) HOSTEK.COM (1) Hostgator (1) Hosting (95) Hosting: (3) Hosting? (2) Hosting) (1) HostingCon (2) HostPapa (3) Hosts (2) HostSEO.org (1) HostV (1) Hostway (1) Hotel (1) house blessing (1) Houston (1) how to (37) how to select a condo (1) HTC (1) http://directory.t35.com (1) http://www.conspiracyoftherich.com (1) Human rights (2) humanist (4) Hummer (3) Humor (3) Hybrid (1) Hype (1) hypocrisy (2) Hyundai (1) ICANN (1) ICC (1) Ideas (8) Identifies (1) identify (1) idiosyncratic (1) illmindead (2) ImageNow (1) images (3) ImageShack (1) Imagine (1) imax (1) imax 3d (1) IMG_6227 (1) Importance (2) Important (1) Improve (1) Improves (1) Improving (2) imw (1) Incidents (1) Income (3) Incorporates (1) Incubator (1) Independence Day (1) India (4) India? (1) Indian (2) IndiBlogger (1) Indirank (1) individuals (2) Indonesia TV (2) industry (1) info (1) Infographics (1) infographs (6) Information (1) Infrastructure (4) Inifiniti (1) Injection (2) innovation (3) Innovative (1) insane (1) Insider (2) Inspirational (3) installed (1) Instant (1) Instant Messenger (1) Instantly (1) Institute (1) Integration (1) Intel Corporation (1) Intelligence (5) Intelligent (1) intelligent design (1) Intels (1) Interactive (2) Interesting Facts (1) Intermedia (1) International (2) internet (98) internet marketing (34) internet marketing workshop (4) Internet Tricks (2) Interoute (1) Interoute’s (1) interview (27) interviewing (1) Introduces (2) Introducing (1) introduction (1) Investigating (1) Investing (2) Investment (1) investments (1) iPad (3) iphone (5) iphone 4G (1) ipod nano (2) ipod touch (2) IQ (2) Iran (2) Iranian (1) iron man 2 (2) iron man 2 trailer 2 (1) irrationality (1) irreplaceable (1) Ishwor (1) Islam (2) Issue (1) Issues (1) Istanbul (1) Italia (1) iTunes (1) iWonder (2) JaguarPC (1) Jai Ho (2) Jajah India (1) Jamie Oliver (1) jan hilado (1) Japan (4) Japanese (1) Jason (1) Java-based (1) JavaScript (1) Jay Leno (1) Jerry Coyne (1) Jersey (1) Jidhu (7) Jidhu's Poem (2) Jimmy Carr (1) Jingles (1) Johnathan Zittrain (1) Joins (4) Jomar (1) jomar hilario (6) Jomar's Bag (1) Jon Stewart (6) Jonathan Miller (1) Joomla (1) joyce burton titular (1) Juan Enriquez (2) juno reactor (1) justice (1) Kal (8) Keeping (1) kerygma conference (1) Keyword (1) keyword research (1) keywords (1) KFC (1) Khader Khan (1) Kia (1) kids (1) kindle (1) Kingsley (1) Kirsten Lepore (1) know? (2) Knowledge (1) KnownHost (1) Korea (1) Kyoto Protocol (1) Label (1) LabSat (1) LabSat 2 (1) lady gaga (1) Landrush (1) Language (2) Laptop (3) latest (7) Latisys (5) launched (2) Launches (8) Le Monde Diplo (1) Leader (1) leading (2) Learn (5) learning (1) legal (1) Legendary (1) leo laporte (1) Leopard Seal (1) Lesson (1) Level? (1) Lewis Black (1) LG (1) libertarian (3) Lichfield. (1) life (2) life tip (1) life tips (1) lifehacking (1) Lights (1) lighttpd? (1) limited (2) lindsay lohan (1) Lineup (1) link defined (1) LinkedIn (1) Linux (10) Linxter (1) Liquidity (1) live streaming (5) LiveScience (1) LMAO (2) Local (2) LOL (24) London (1) Loneliness (1) Longer (1) lorie (1) Love (3) love story (2) lowest (1) luna lovegood (1) lyrics (1) Maarten (1) macau (1) macbook (2) MACBOOK TOUCH (2) MACTOUCH (1) made to stick (2) Mafia (1) Magazine (1) Magazine\’s (1) magazines (1) mail (1) Maintenance (4) Makes (1) Malayalam Poem (2) malaysia (1) Malaysia Tv (3) Malicious (1) mall of asia (1) Malware (2) Manage (1) Managed (5) management (5) management? (1) Manager (3) Managing (1) manila (4) Manjunath (1) Manjusha Sinha (2) Mantu Kumar (1) maps (1) March (3) Market (3) marketing (48) Marketplace (1) marvel (1) mashable (2) Massive (1) Maximizing (1) maximum (1) mblog (3) Means (1) Media (3) medicine (1) medium-sized (1) Melen (1) members (1) Messenger (4) metacafe (1) metal (3) Michael Shermer (3) Michael Specter (1) Michel Jackson (3) Michio Kaku (1) Microsoft (13) Microsoft Windows (1) Middle (1) Migration (1) Milan (1) Milestones (1) Million (4) Millions (1) mindanao (1) mindset (1) Mises (5) Mises Institute (1) Mistake07 Expecting Perfection From One Blog (1) Mistakenly (1) Mixed (1) Mobile (7) mobile broadcasting (1) Mobile News (1) Mobile Phone Applications (1) Mobile Phones (3) Mobile Streaming TV (9) Mobile-Optimized (1) monde diplomatique (1) Money (7) Monitoring (2) Montana (1) Months (1) Moody Monday (4) morality (1) more money (1) Mortal (1) mothers day (1) Motorola (3) move in (1) Moves (1) movie (1) Movie Reviews (1) movies (5) movieweb (1) Moving (1) Mozart (1) Mozilla (3) Mr.Bean (1) msnbc (1) Mt Kilimanjaro (1) Mufarish (2) Multiple (3) multiply (1) Multitude (1) Mumbai (1) Mundu (2) Muneer (1) Mushtaque (2) music (10) music apps (1) My Photography (2) My Snaps (1) My Writings (10) MyDomain (1) myLittleAdmin (1) MySpace (3) MySQL (1) MySQL.com (1) Namecast (1) Named (1) Names (5) Nano (1) Napalm Death (1) Narendra Guragain (2) NASA (1) NASDAQ (1) NatGeographic (3) National Geographic (1) Nature (4) navigation solutions (1) Nederlands (1) needs (1) needy (1) Nerissa (4) NET (1) net at night (1) NetBenefit (1) Netcraft (1) NetFlix? (1) NetFlow (1) Network (4) networking (10) Networks (2) Neutrality (1) New software (11) Newbie (1) News (108) Nexius (1) nginx (1) Nicholas Wade (1) Nimbula (1) Nimsoft (1) nNIN (1) Nokia (4) Nokia E72 (1) Non-Profits (1) Nortel (2) Northern (1) noughties (1) nova (1) Now that I'm rich beyond (1) NTLDR (1) nuclear (2) Number (1) NYT (4) nytimes (4) Offer (1) Offering (4) Offers (8) offers. (1) office (1) Oil spill (1) On-Premise (1) OnDemand (1) ondoy (2) online (8) Online Marketing (1) online mentoring (1) Online Publishing (3) online storage portal (5) Online Streming Radio (1) online tv (1) Online: (1) Open-Xchange (4) OpenRegistry (1) Opens (1) OpenSRS (1) OpenStack (1) OpenVPN (1) OpenVZ (1) Operate (1) Operating system (1) Operator (2) opinion (56) oppinion (1) opportunities (1) Opportunity (1) Optimisation (1) optimism (1) Optimization (4) Optimization: (1) Optimizing (1) Oren Lavie (1) organic (1) OS (5) OS 4.0 (1) other (1) Other Video (19) Others (16) Outage (1) outcome (1) Outgrow (1) Outsourcing (1) overpopulation (1) Overview (3) Owners (1) p (1) Pachu (1) pacific spectrum (1) package (1) Package (1) Pad.com (1) Pages) (1) Paintings (1) Palm (1) Panel (4) Panels (2) pappaya (1) Parallels (5) paris (2) parking slot (1) parking tips (1) Parmita Borah (1) Participating (1) Partner (5) Partners (6) Partnership (1) party (1) passive (1) passwive income (1) Patch (1) Paul (1) Paul Krugman (2) Pay-per-click (1) Pblog (180) Peakflow (1) Pelikan (1) Pepsi (2) Percent (2) percentage (1) percy jackson (1) perfect (1) Perfectly (2) Performance (1) Performance? (1) personaity (1) Personal (129) personal development (1) Perspective (1) Pew Research (1) phase (1) philippines (22) Philippines EarthQuake March 25 (1) philosophy (3) phishing (1) Phoenix (1) phones (4) Photo Editor (1) photo essay (1) photobucket (1) photohunt (8) photos (12) photosynth (1) pictures (5) Pictures and Photos (5) piece (1) pinoy (2) Plan? (1) Plans (7) Platform (3) Platforms (2) Play (1) playing (1) Playstation (1) Plesk (2) Plixer (1) Plugin (5) podcast (1) podcasting (1) Poem (5) Pointers (1) Poker (2) poker face (1) Politics (8) politix (6) pollution (2) Porsche (1) portable armor (1) Portables (11) Portal (1) positive (1) post it (6) Post: (2) potd (1) poverty (2) Powerful (2) PR (1) pr0n (1) Practice (1) prayer (1) pre-selling condo (1) Prediction (1) Predictions (1) preselling (1) Presence (1) present (2) presentation (3) presentations (1) Presents (2) preserved (1) President (1) presidential (1) Press (1) Prevent (1) price (3) Prince of Persia (1) principle (1) Prior (1) privacy (3) Private (5) Process (1) Processor (1) Product (4) Products (1) profile photo (1) profit (1) Program (5) programmer (1) Programming (2) programming? (1) Programs (2) programs? (1) Project (2) Promos (2) Promote (1) promoting (2) promotion (3) Promotion: (1) property (1) Pros (1) protecting (1) Protection (1) Proud (1) provide (3) Provider (7) Providers (5) psychology (1) Public (1) Publishing (1) puerto galera (1) PunktBayern (1) Purchase (1) Purchases (1) Purchasing (1) PZ Myers (1) Q and A (1) Qatar (1) quake (1) Qualifications (1) Quarter (1) Queplix (1) question (1) Question: (1) questions (2) quote (5) Rachets (1) Rackspace (1) Rails (2) rain (4) Raises (1) Rajlakshmi (1) ramesh (1) Rapid-Deployment (1) RATM (1) ray cumfort (1) reached (1) reaches (1) reading (1) Ready (1) real estate (1) really (1) reason (3) reasons (1) Reasons (1) Receives (1) Recession (1) recipe (1) Recipes (2) recognition? (1) Recognized (1) Recommender (1) Red River (1) refer (1) register (2) registering (1) Registrar (1) Registry (2) Regrets (1) regulations (1) Reinvented (1) Related (1) Release (4) Released (1) Releases (1) Reliability (1) reliable (1) relief (2) Religion (36) religulous (3) Remain (1) Renewal (1) renovation (1) Replacement (2) Report (1) Reports (1) repost (1) request (1) rescue (1) Research (4) Reseller (5) Reselling (2) Resource (27) resources (2) Responsibility (1) result (1) Results (1) Retains (1) Retargeting (1) Retireat21.com (1) Revealed (1) Revealing (1) Reveals (1) revenue (1) Review (11) Review? (1) Reviewed (1) Reviews (6) Revisits (2) RF output (1) rich (1) rich dad poor dad (1) richard branson (1) Richard Dawkins (7) Right (3) road (1) robert kiyosaki (1) Robin Epstein (1) Robin Sharma (1) Robust (1) Rogue (1) Rolled (1) Roller (1) rose (1) rosewood (2) Rothbard (3) Round (1) Roundup (2) Route 66 (1) Route 66 Maps + Navigation (1) Router (1) Routing (1) rss feed (1) RT-N16 (1) rules (2) Rumours (1) Runescape (1) Running (1) s (1) Safari (1) Safer (1) safety (10) safwan (1) Sale (1) Sales (3) salsa (1) Sam Harris (3) sandbox (1) Sander (1) Sandy Hiyaa (1) Saroj (1) satellite constellations (1) Scam? (2) scarlett johanssen (1) Sci-Fi (2) SciAm (1) science (50) Scratch (1) screwtape letters (1) scribd (5) script (1) Scripts (1) Scrutinizer (1) Sean (1) sean ryker (1) seanryker (1) Seaport (1) search (8) Search engine (14) Search Engine Optimization (2) Second (1) Secret to success in network marketing (1) Secrets (1) secularism (2) Secure (1) Securenet (1) Securing (1) Security (22) seeking (1) Selected (2) selecting a condo (1) selection (1) Seletskiy (1) Self Help (45) Self-Certifies (1) Self-help (17) Self-Hosted (1) selling (2) Seminars (5) Sentrigo (1) Sentry42 (1) seo (9) SEO.com (1) Serengeti (1) Series (1) Server (20) server. (1) Server2008 (1) ServerPronto (1) Servers (5) servers? (1) service (11) Services (18) Serving (1) seth godin (2) Settings (9) sex (1) Sexual slavery (1) Shadows (1) shadows of mindor (1) Shalet Jimmy (1) shane escueta (1) Shape (1) Shared (4) Shared Post (1) SharePoint (1) sharing (7) sharing? (1) shelfari (1) Shell (1) shirt (1) Shopping (2) short (1) Shortcuts (5) should (1) Shreya Chatterjee (4) Shuts (1) shutting (2) sidereel (1) Siemon (1) Signs (1) Silence (1) Silver (1) Simone (1) simple (2) Simplified (2) singapore expo. (2) singer (1) SiteCloud (1) Skeptic (1) Skills (1) sky (1) skywatch Friday (9) Slavery (1) Slayer (2) sleeping (1) slide (2) Slideshare (1) small (1) smart (4) smartphone (2) Smooth (1) sms (1) social (8) Social (1) social impact (3) Social Media (49) Social network (1) Social Networking (36) Social Sciences (1) Society and Culture (1) sociology (2) Socious (1) SoftLayer (2) SoftLayer® (1) Software (6) Solution (5) Solutions (3) Solutions: (1) Solved (2) Some obstacles to success (1) Sony Digital Camera (1) Sony Ericsson (1) sony internet tv (4) sony-ericsson (1) Source (2) space (1) Sparks (1) speakers (3) Spear (1) Speed (1) Speeding (1) Spells (1) Spiral (1) Splice (1) spoiler (1) spoilers (1) spoilers galore (1) Spooner (1) Square (1) SquareSpace (1) sta rosa (1) stable (1) star wars (2) stars (1) start (2) Startups (13) Static (1) Stations of the Cross (1) statistics (4) Status (1) Step-By-Step (1) Stephen Colbert (1) Stephen Fry (1) Stephen Wolfram (1) stephenpierce (1) Steve Jobs (1) Stevie (1) Stick (1) Stiglitz (3) Still (1) Stolen (1) Storage (2) Strategy (1) Strategy. (1) StratoGen (1) Stream (2) Streaming (3) streaming music (2) stress (1) Structure (1) Study (4) stupidity (1) Success (2) Success. (1) successful (1) Suggestions (1) suitable (1) Summit (1) suns (1) Superb (1) support (6) Supports (2) Surfing (1) Survey (1) Swathi Pradeep (1) sweat (1) Sweet Dreams (1) sweets (1) Switch (1) switch book (1) switched.com (1) switchfoot (1) SWsoft (1) Sylvia Kirkwood (1) Symantec (1) Symbian S60 3rd Edition (1) System (4) Systems (2) T (1) Tablet (1) tablets (1) tagged (2) Taglish (1) taguig (2) Taking (1) TalentGate (1) Target (1) taxes (1) Teacher (1) Tech (37) Tech N9ne (1) Tech-Speak (1) Techniques (1) Technologies (2) Technology (43) technorati (1) Techs (1) TED (18) ted.com (1) TEDxBucharest (1) TelecityGroups (1) telecom (1) Telecommunications (1) TELEHOUSE (1) telepone (1) television (1) Tenzing (1) Terminal (1) terminator (1) Terran (1) Terry Pratchett (1) test (1) test. (1) Texas (1) texting (1) Thakkudu (1) The Book Update (2) The Daily Show (2) The Economist (35) The Greatest Show On Earth (1) The Top Ten Step to Achieve Personal Power: (1) theedgeradio.net (1) their (2) there (1) thin (1) Things (2) Think (1) thinks (1) THINKstrategies\’ (1) ThinkTank (5) Third (1) Thonissen (1) Thor (1) Thoughts (5) thrash (2) Threat (2) Threats (1) Three (1) Thrissur Pooram (1) through (2) Thursday Challenge (26) Tierra (2) Tim Berners-Lee (1) Tim Minchin (1) time (1) Timro Laagi (1) tips (52) To have a positive day keep the following in mind: (1) today (2) Tom Morello (1) tomb raider (1) Tomorrow (1) tony robbins (2) tools (3) Top-Level (1) TopGear (1) topic (1) topseos.in (1) Total (1) touch and classic controls (1) Toy (1) toyota FJ Cruiser (1) toyota innova (1) TrackVia (1) Trade (1) traditional (2) traffic (6) trailer (3) trailer 2 (1) Training (1) Transformations (1) travel journal (2) Trees (1) trend (1) trends (4) Tricks (5) Tripod (1) trq 2 (1) Trust (1) Trustwave (2) trustworthy (1) Trustworthy? (1) truth (3) Tucows (1) Tumblr (1) Turakhia (1) Turkey (1) turn over (1) Turtle (2) tutorial (48) TV (2) tv channel (22) tv.sarah connors chronicles (1) tv.terminator (1) twelve (1) Twitter (14) types (2) Types (1) typhoon (2) UAE (1) Ubiquity (1) Uglies) (1) UK (1) Umamaheswari Anandane (2) Under (2) Undercover (1) Understanding (3) Unfriend (1) UNICEF (1) Unified (2) universe (3) University of California (1) unlock (1) Unmanaged (1) unpaid (1) Unveiled (1) Unveils (1) Update (2) Updates (4) Upgrade (2) Upgrades (2) Uptime (2) Urban (2) US presidency (1) USA (1) usb 3.0 (1) Useful (1) Using (3) Utada's "First Love" (1) Utilizing (2) V (1) VA (2) va training (2) VAIO JS (1) valentines (1) Validation (1) valuable (1) Valuation (1) Valuations (1) Value (2) vampire's assistant (1) vanityfair (1) Vantage (1) Vblog (120) Vdeck (1) VegasNAP (1) Vendor (1) Vendors (1) version (4) versus (2) VEXXHOST (2) Vibhuti Bhandarkar (1) Victim (1) Victor J Stenger (1) video (36) video blog (1) Video clips (2) Video Editor (2) Video player (4) videos (3) videos. (1) View Blogger Mistake10 Using Small Ads (1) Village (1) Vimeo (1) vince golangco (1) Vineet Nayar (1) vinnaithandi varuvaya (1) viral (1) Virginia (5) Virsto (1) Virtual (5) virtual assistant (6) virtual assistants (2) virtual car (1) Virtualization (2) Viruses (1) Vishu (1) vision (1) visualization (1) vivaz (1) VMware (1) VoipNow (2) von Mises (6) vote (1) Vouchers (1) Voxel (2) wala lang (1) Wall Street (1) WAP (1) war machine (2) Washington (1) washington post (1) water (1) Waxman (1) web 2.0 (10) Web browser (25) Web Design and Development (1) Web Rings and Cliques (1) Webhosting (3) WebHostingBuzz (1) Webinar: (1) weblog awards (1) WebPageWizard.org (1) Website (17) WebSiteHosting.com (1) Websites (5) wedding (2) WEF (1) Welcomes (1) where (2) Which (5) while (1) White (1) white sand (1) Wi-Fi (1) widget (1) WiFi (1) Wikipedia (1) Wildcatters (1) Wilfried (1) Windows (17) Windows 7 (5) Windows 7 OS (1) Windows Live Messenger (5) Windows XP (1) Winner (2) Winners (1) Wisconsin (1) within (1) Wizard: (1) wolrd issues (1) Womens Day (1) Won’t (1) wonders (1) Wordless Wednesday (33) wordpress (12) work (1) Working (1) Workouts (1) Works (2) workshop (6) World (2) World economy (3) world issues (27) world news (17) world politix (8) WORLDLINK (1) worldview (4) Worldwide (1) Worthy (1) Would (1) wow (5) writing (1) wtf? (1) Wysuwa (1) X-Men (1) XBox (1) XenServer (1) Xing (1) XM Satellite Radio (1) Xmas (2) Xoom (1) Xplane (1) Yahoo (2) yaro (1) YbGlob (1) years (1) Yellow (1) youth (1) youtube (12) yuppies (1) Zemanta (1) zen habits (1) सुक्सेस्स (1)

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites