Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Ripoff (Score 1) 487

It depends - again it's a question of the numbers. Although there is some good evidence that a PS is the most likely part to fail in a rig and as such you should know what your plan is for a failure. A large storage setup could provide similar mitigation with multiple units assuming your storage pool is large enough or a less critical storage pool could be mitigated with a cold spare.

Comment Re:Not ZFS? (Score 1) 487

http://my.safaribooksonline.com/9780596521974/ch04

4.1.1. Data Integrity in HDFS

HDFS transparently checksums all data written to it and by default verifies checksums when reading data. A separate checksum is created for every io.bytes.per.checksum bytes of data. The default is 512 bytes, and since a CRC-32 checksum is 4 bytes long, the storage overhead is less than 1%.

Datanodes are responsible for verifying the data they receive before storing the data and its checksum. This applies to data that they receive from clients and from other datanodes during replication. A client writing data sends it to a pipeline of datanodes (as explained in Chapter 3), and the last datanode in the pipeline verifies the checksum. If it detects an error, the client receives a ChecksumException, a subclass of IOException.

When clients read data from datanodes, they verify checksums as well, comparing them with the ones stored at the datanode. Each datanode keeps a persistent log of checksum verifications, so it knows the last time each of its blocks was verified. When a client successfully verifies a block, it tells the datanode, which updates its log. Keeping statistics such as these is valuable in detecting bad disks.

Aside from block verification on client reads, each datanode runs a DataBlockScanner in a background thread that periodically verifies all the blocks stored on the datanode. This is to guard against corruption due to "bit rot" in the physical storage media. See Section 10.1.4.3 for details on how to access the scanner reports.

The Internet

URL Shortener tr.im To Go Community-Owned, Open Source 145

Death Metal sends word that the owners of URL-shortening service tr.im are in the process of releasing the project's source code and moving it into the public domain. This comes after reports that the service may shut down and that they were entertaining offers from prospective buyers. From a post on the site's blog: "It is our hope that tr.im, being an excellent URL shortener in its own right, can now begin to stand in contrast to the closed twitter/bit.ly walled garden: it will become a completely open solution owned and operated by the community for the benefit of the entire community." They plan to complete the transition by September 15th, and the code will be released under the MIT license. In addition, "tr.im will offer all link-map data associated with tr.im URLs to anyone that wants it in real-time. This will involve a variety of time-based snapshots of aggregated destination URLs, the number of tr.im URLs created for any given destination URL, and aggregate click data."
The Internet

Comcast the Latest ISP To Try DNS Hijacking 352

A semi-anonymous reader writes "In the latest blow to DNS neutrality, Comcast is starting to redirect users to an ad-laden holding page when they try to connect to nonexistent domains. I have just received an email from them to that effect, tried it, and lo and behold, indeed there is the ugly DNS hijack page. The good news is that the opt-out is a more sensible registration based on cable modem MAC, rather than the deplorable 'cookie method' we just saw from Bell Canada. All you Comcast customers and friends of Comcast customers who want to get out of this, go here to opt out. Is there anything that can be done to stop (and reverse) this DNS breakage trend that the ISPs seem to be latching onto lately? Maybe the latest net neutrality bill will help." Update: 08/05 20:03 GMT by T : Here's a page from Comcast with (scant) details on the web-jacking program, which says that yesterday marked the national rollout.
Books

Good PDF Reader Device With Internet Browsing? 167

ranjix writes "I need a handheld device which would allow me to read ebooks and/or browse the internet while actively and intensely laying in the hammock (and Yes, I do have a hammock in my mom's basement). I'll try to sum up the basic requirements: (good) PDF reader (and ebooks of whatever sort), WiFi connectivity and Internet browser, screen minimum 4.5", readable in sunlight, etc, fairly responsive, at least 4-5 hours battery. Obviously I looked at the usual suspects: Kindle/Amazon tries to grab one into the proprietary formats and their own network (while other ebook readers don't really browse the internet), laptops/netbooks are pretty hard to hold, and the UMPC arena seems a hodge-podge of 'to be released' (Viliv S5? Aigo whatever?) with 'seriously expensive' (Sony, OQO) or plain 'we recommend you don't buy' (Samsung Q1Ex). Is there anything else I could use in the given circumstances?"
It's funny.  Laugh.

Apple Introduces "MacBook Wheel" Screenshot-sm 268

CommonCents noted an Apple announcement a few hours before the anticipated keynote. He says "Apples' latest must have gadget does away with the keyboard. With the new MacBook Wheel, Apple has replaced the traditional keyboard with a giant wheel."

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...