USENIX Association Proceedings of LISA 2002 : 16 th Systems Administration Conference
نویسنده
چکیده
Systems that are more dependable and less expensive to maintain may be more expensive to purchase. If ordinary customers cannot calculate the costs of downtime, such systems may not succeed because it will be difficult to justify a higher price. Hence, we propose an easy-tocalculate estimate of downtime. As one reviewer commented, the cost estimate we propose ‘‘is simply a symbolic translation of the most obvious, common sense approach to the problem.’’ We take this remark as a complement, noting that prior work has ignored pieces of this obvious formula. We introduce this formula, argue why it will be important to have a formula that can easily be calculated, suggest why it will be hard to get a more accurate estimate, and give some examples. Widespread use of this obvious formula can lay a foundation for systems that reduce downtime.
منابع مشابه
USENIX Association Proceedings of the 14 th Systems Administration Conference ( LISA 2000 ) New Orleans
Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein.
متن کاملUSENIX Association Proceedings of LISA 2002 : 16 th Systems Administration Conference
Security vulnerabilities are discovered, become publicly known, get exploited by attackers, and patches come out. When should one apply security patches? Patch too soon, and you may suffer from instability induced by bugs in the patches. Patch too late, and you get hacked by attackers exploiting the vulnerability. We explore the factors affecting when it is best to apply security patches, provi...
متن کاملUSENIX Association Proceedings of LISA 2002 : 16 th Systems Administration Conference
We have built a comprehensive solution to address the management aspects of deployment and analysis of applications in Internet Data Centers. Our work was motivated by the high total cost of ownership of operating such centers, largely due to the variety of applications and their distinctive management requirements. We have chosen an approach that encapsulates application specific knowledge (is...
متن کاملUSENIX Association Proceedings of LISA 2002 : 16 th Systems Administration Conference
Quotidian system administration is often characterized by the fulfillment of common user requests, especially on sites that serve a variety of needs. User creation, group management, and mail alias maintenance are just three examples of the many repetitive tasks that can crowd the sysadmin's day. Matters worsen when users neglect to provide necessary information for the job. They can grow bleak...
متن کاملUSENIX Association Proceedings of LISA 2002 : 16 th Systems Administration
Disk quota systems exist to protect a limited resource and ensure that users can share it. However, existing quota management systems concentrate on controlling user privileges, rather than protecting resources. This paper suggests a new management model based upon a holistic view of resources and their controls. By acting upon a resource globally rather than upon individual users, the new appr...
متن کاملUSENIX Association Proceedings of LISA 2002 : 16 th Systems Administration
As the security threats on the Internet are becoming more prevalent, firewalls and other forms of protection are becoming more commonplace. Unfortunately, improperly configured firewalls can cause a variety of problems. One particularly nasty problem is when a firewall administrator chooses to use – or continue using – Path MTU Discovery (a good choice in most situations), but blocks packets re...
متن کامل