Next Generation Consistency Enforcement

نویسنده

  • Zechao Shang
چکیده

When more than one worker can access data simultaneously, they usually break data consistency. To enforce data consistency, a huge performance penalty must be paid. This divides system architecture into two directions. One direction considers data consistency less important than “greater goods”, such as availability or partition tolerance, and so sacrifices it. Dropping data consistency enforcement components from a system usually leads to significant performance improvements. However, data consistency is still indispensable and ubiquitous in the real world applications whether the data systems support it or not. As a result, researchers and practitioners started to consider the other direction: high performance consistency enforcement. Recent representative works include data-flow systems, transaction processing on partitioned database and invariant-based concurrency control, etc. Unfortunately, although these studies have achieved considerable progress, there is still a giant performance gap between them and the systems without data consistency at all. Why is protecting data consistency so hard? Based on previous experience, we believe the “no man left behind” promise is the root of all problems. As in most of the RDBMS textbooks, a typical use of databases is online banking. Data consistency (as a part of ACID) is enforced to prevent money being lost. It is a banker’s public relation nightmare if even just one customer’s account is compromised, so every constraint on every tuple must be respected. Recent protocols build on this same commitment; for example, invariant-based concurrency control protects all invariants that it is capable of. However, we are not in the 20th century any more. People have a huge volume of data now. The ideal story is to protect perfect consistency on big data. As this is not feasible, everyone must choose between perfect consistency and big data, and maintaining “no man left behind”-style consistency becomes questionable. We envision the next generation system that protects data consistency when consistency is as important as scalability and performance. One potential scenario involves analytical jobs. There are more and

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring Environmental Enforcement Success: The Elusive Search for Objectivity

How best to measure the effectiveness of environmental enforcement is a long-standing question . Over the 42 years during which the U .S . Environmental Protection Agency (EPA) has engaged in enforcement work, the agency’s system for evaluating its own enforcement efforts (as well as those of the states) has evolved considerably . Beginning with a simple counting of numbers of formal enforcemen...

متن کامل

Maintaining Color Consistency Across Non-Linear Devices

We introduce a new color transformation representation based on higher-dimensional Bezier fitting to maintain color consistency across non-linear devices (like commodity printers and displays). Our representation yields more accurate and artifact-free results than existing methods, and is amenable to hardware implementation, thus making it suitable for next generation commodity devices.

متن کامل

Face Sketch Generation Using Evolutionary Computing

In this paper, an evolutionary genetic algorithm is used to generate face sketch from the face description. Face sketch generation without face image is extremely important for the law enforcement agencies. The genetic algorithm is used for generating face sketch through several iterations of the algorithm. The face image description is captured through graphical user interface just by clicking...

متن کامل

DRM, Trusted Computing and Operating System Architecture

Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an open computing platform such as a PC. Recent trusted computing initiatives namely, the Trusted Computing Group (TCG) specification, and Microsoft’...

متن کامل

IJASCSE, Vol1 Issue 2, 2012

Towards next generation, Criminal activity in virtual worlds is becoming a major problem for law enforcement agencies. Virtual communities such as Second Life will be quickly becoming the next frontier of cybercrime. Even now a day’s Forensic investigators are becoming interested in being able to accurately and automatically track people in virtual communities. Mostly in the multimedia context,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017