Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Networked Windows NT System Field Failure Data Analysis
PRDC '99 Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing
Software Rejuvenation: Analysis, Module and Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Recursive Restartability: Turning the Reboot Sledgehammer into a Scalpel
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
Recovery Oriented Computing (ROC): Motivation, Definition, Techniques,
Recovery Oriented Computing (ROC): Motivation, Definition, Techniques,
Improving availability with recursive microreboots: a soft-state system case study
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
A recovery-oriented approach to dependable services: repairing past errors with system-wide undo
A recovery-oriented approach to dependable services: repairing past errors with system-wide undo
Rewind, repair, replay: three R's to dependability
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Microreboot — A technique for cheap recovery
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Proactive management of software aging
IBM Journal of Research and Development
Hi-index | 0.00 |
Traditional cluster system management tools seldom consider the relevance betweenmanaged objects. Such relevance is the reason of related fault and may also lead to human operation errors. Because of this defect, traditional tools do not have the capability of handling of consistency, atomicity and recovery. This article proposes a transaction-based facility, destructive transaction, to solve the problems at some degree. Destructive transaction is a construct to wire down management rules stored in a system administrator's mind. It provides a method to describe managed objects relationships, atomicity facility and recovery for failed operation. And it significantly reduces human caused error possibility.