The big data system, components, tools, and technologies: a survey
The traditional databases are not capable of handling unstructured data and high volumes
of real-time datasets. Diverse datasets are unstructured lead to big data, and it is laborious …
of real-time datasets. Diverse datasets are unstructured lead to big data, and it is laborious …
A large-scale analysis of hundreds of in-memory key-value cache clusters at twitter
Modern web services use in-memory caching extensively to increase throughput and reduce
latency. There have been several workload analyses of production systems that have fueled …
latency. There have been several workload analyses of production systems that have fueled …
Elastic sketch: Adaptive and fast network-wide measurements
When network is undergoing problems such as congestion, scan attack, DDoS attack, etc.,
measurements are much more important than usual. In this case, traffic characteristics …
measurements are much more important than usual. In this case, traffic characteristics …
Netcache: Balancing key-value stores with fast in-network caching
We present NetCache, a new key-value store architecture that leverages the power and
flexibility of new-generation programmable switches to handle queries on hot items and …
flexibility of new-generation programmable switches to handle queries on hot items and …
Shenango: Achieving high {CPU} efficiency for latency-sensitive datacenter workloads
Datacenter applications demand microsecond-scale tail latencies and high request rates
from operating systems, and most applications handle loads that have high variance over …
from operating systems, and most applications handle loads that have high variance over …
Tactical provenance analysis for endpoint detection and response systems
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …
by matching system events against known adversarial behaviors. However, current solutions …
Datacenter {RPCs} can be general and fast
It is commonly believed that datacenter networking software must sacrifice generality to
attain high performance. The popularity of specialized distributed systems designed …
attain high performance. The popularity of specialized distributed systems designed …
Wisckey: Separating keys from values in ssd-conscious storage
We present WiscKey, a persistent LSM-tree-based key-value store with a performance-
oriented data layout that separates keys from values to minimize I/O amplification. The …
oriented data layout that separates keys from values to minimize I/O amplification. The …
Network requirements for resource disaggregation
Traditional datacenters are designed as a collection of servers, each of which tightly couples
the resources required for computing tasks. Recent industry trends suggest a paradigm shift …
the resources required for computing tasks. Recent industry trends suggest a paradigm shift …
Hemem: Scalable tiered memory management for big data applications and real nvm
High-capacity non-volatile memory (NVM) is a new main memory tier. Tiered DRAM+ NVM
servers increase total memory capacity by up to 8x, but can diminish memory bandwidth by …
servers increase total memory capacity by up to 8x, but can diminish memory bandwidth by …