Studying copy-on-read and copy-on-write techniques on block device level to aid in large environment forensics
|
|
|
- Dylan Skinner
- 10 years ago
- Views:
Transcription
1 Studying copy-on-read and copy-on-write techniques on block device level to aid in large environment forensics E. van den Haak System and Network Engineering University of Amsterdam Master Thesis, July 2014 Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
2 Background Forensics on cloud solutions and large environments Sheer volume of data (Remote) Acquisition is very hard Making a copy of all data is impossible Making data available remotely is a long procedure Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
3 Concept Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
4 Research Focus on server block device level Copy only relevant data to local storage Copy-on-Read Enable live forensics without interfering with original block device Copy-on-Write Important aspects Data integrity Reproducible Storable Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
5 Research What is a good way to mount block devices read only and store read and changed data in separate sparse files? What methods exist that allow copy-on-write and copy-on-read on block device level? Can these methods be effectively used to do remote data acquisition while storing read- and changed data locally? If necessary, how can an existing method be modified in order to meet the requirements of this research? Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
6 Related Research Forensic mount tool Xmount[1] NIST Cloud Computing Forensic Science Challenges[2] Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
7 Existing methods Methods that either support copy-on-read or copy-on-write Xmount Fusecow Bcache Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
8 Ideal situation Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
9 Proof of concept 1 Both Xmount and Fusecow Open source C GPL Scope Copy-on-read file Read only feature 1 Sources on github[3] Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
10 Detailed concept Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
11 Copy-on-write implementation (existing) write(3,x); write(d,z); write(8,y) Fusecow has two separate files Xmount puts bitmap into header of CoW file Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
12 Copy-on-read implementation read(1); read(e); read(3) Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
13 Copy-on-read implementation remount Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
14 Test setup Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
15 Test setup Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
16 Second test setup Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
17 Results QEMU Fusecoraw works flawless DD Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
18 Results QEMU Fusecoraw works flawless Xmount has trouble remounting as it performs lots of tests DD Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
19 Results QEMU Fusecoraw works flawless Xmount has trouble remounting as it performs lots of tests For now Read only or Copy-on-Read file as Copy-on-Write file DD Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
20 Results QEMU DD Fusecoraw works flawless Xmount has trouble remounting as it performs lots of tests For now Read only or Copy-on-Read file as Copy-on-Write file Requires future work Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
21 Results QEMU DD Fusecoraw works flawless Xmount has trouble remounting as it performs lots of tests For now Read only or Copy-on-Read file as Copy-on-Write file Requires future work Both techniques work as expected, hashes match. Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
22 Conclusion Both proof-of-concepts perform a good job Remounting writable works only with Fusecoraw No issue for current concept Read data is persistent Fusecoraw recommended if writable remounting is desired Xmount recommended if not Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
23 Future Research Fusecoraw Xmount Integrate in concept Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
24 Questions? Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
25 References Gillen Daniel. xmount, NIST Cloud Computing Forensic Science Working Group. Nist cloud computing forensic science challenge (draft), draft_nistir_8006.pdf. Eric van den Haak. Evdh s git repository, Eric van den Haak (UvA) Remote Data Acquisition July 2, / 21
http://www.guido.be/intranet/enqueteoverview/tabid/152/ctl/eresults...
1 van 70 20/03/2014 11:55 EnqueteDescription 2 van 70 20/03/2014 11:55 3 van 70 20/03/2014 11:55 4 van 70 20/03/2014 11:55 5 van 70 20/03/2014 11:55 6 van 70 20/03/2014 11:55 7 van 70 20/03/2014 11:55
LiveBackup. Jagane Sundar [email protected]
LiveBackup Jagane Sundar [email protected] LiveBackup A complete Backup Solution Create Full and Incremental Backups of running VMs A System Administrator or Backup Software can use livebackup_client to
DACSA: A Decoupled Architecture for Cloud Security Analysis
DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta, William Enck, Peng Ning NC State Ahmed Azab Samsung Ltd Xialoan Zhang Google Inc Cloud Provider Landscape Cloud Provider Landscape
Using GitHub for Rally Apps (Mac Version)
Using GitHub for Rally Apps (Mac Version) SOURCE DOCUMENT (must have a rallydev.com email address to access and edit) Introduction Rally has a working relationship with GitHub to enable customer collaboration
Intro to Docker and Containers
Contain Yourself Intro to Docker and Containers Nicola Kabar @nicolakabar [email protected] Solutions Architect at Docker Help Customers Design Solutions based on Docker
Windows Live Messenger Forensics: Contact List Artefacts. Dennis Cortjens ([email protected])
Windows Live Messenger Forensics: Contact List Artefacts Dennis Cortjens ([email protected]) 29th of February, 2012 Contents 1 Document Information 2 1.1 Description.............................................
Distributed Databases
C H A P T E R19 Distributed Databases Practice Exercises 19.1 How might a distributed database designed for a local-area network differ from one designed for a wide-area network? Data transfer on a local-area
Developing tests for the KVM autotest framework
Lucas Meneghel Rodrigues [email protected] KVM Forum 2010 August 9, 2010 1 Automated testing Autotest The wonders of virtualization testing 2 How KVM autotest solves the original problem? Features Test structure
Introduction to Version Control with Git
Introduction to Version Control with Git Dark Cosmology Centre Niels Bohr Institute License All images adapted from Pro Git by Scott Chacon and released under license Creative Commons BY-NC-SA 3.0. See
Digital Forensics for IaaS Cloud Computing
Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or
OpenStack Private Cloud
CatN Cloud Hosting OpenStack Private Cloud [email protected] Tel: 0844 816 2222 www.catn.com Our private cloud, built using OpenStack, offers all the flexibility and agility of public cloud in a locked
Cloud Attached Storage
Using CTERA Agent in VDI mode Cloud Attached Storage November 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by
Introduction to the Git Version Control System
Introduction to the Sebastian Rockel [email protected] University of Hamburg Faculty of Mathematics, Informatics and Natural Sciences Department of Informatics Technical Aspects of Multimodal
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
GPFS-OpenStack Integration. Dinesh Subhraveti IBM Research
GPFS-OpenStack Integration Dinesh Subhraveti IBM Research GPFS File Placement Optimization Tradi5onal shared architecture Shared nothing architecture SAN I/O bo*leneck Scale out performance GPFS cluster
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
Developer Workshop 2015. Marc Dumontier McMaster/OSCAR-EMR
Developer Workshop 2015 Marc Dumontier McMaster/OSCAR-EMR Agenda Code Submission 101 Infrastructure Tools Developing OSCAR Code Submission: Process OSCAR EMR Sourceforge http://www.sourceforge.net/projects/oscarmcmaster
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
Version Control for Computational Economists: An Introduction
Version Control for Computational Economists: An Introduction Jake C. Torcasso April 3, 2014 Starting Point A collection of files on your computer Changes to files and new files over time Interested in
How to Create a Free Private GitHub Repository Educational Account
How to Create a Free Private GitHub Repository Educational Account Computer Science Department College of Engineering, Computer Science, & Technology California State University, Los Angeles What is GitHub?
The Porticor Virtual Private Data solution includes two or three major components:
Architecture The Porticor solution offers a rich variety of cloud encryption capabilities. Your project s needs and characteristics will determine the right choices for your application. The Porticor Virtual
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
Developer support in a federated Platform-as-a-Service environment
Developer support in a federated Platform-as-a-Service environment Master s Thesis Emanuele Rocca Vrije Universiteit Amsterdam Parallel and Distributed Computer Systems June 14, 2012 Emanuele Rocca Developer
LARGE-SCALE DATA STORAGE APPLICATIONS
BENCHMARKING AVAILABILITY AND FAILOVER PERFORMANCE OF LARGE-SCALE DATA STORAGE APPLICATIONS Wei Sun and Alexander Pokluda December 2, 2013 Outline Goal and Motivation Overview of Cassandra and Voldemort
Article. Robust Signature Capture Using SigPlus Software. Copyright Topaz Systems Inc. All rights reserved.
Article Robust Signature Capture Using SigPlus Software Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents
Tivoli Storage Flashcopy Manager for Windows - Tips to implement retry capability to FCM offload backup. Cloud & Smarter Infrastructure IBM Japan
Tivoli Storage Flashcopy Manager for Windows - Tips to implement retry capability to FCM offload backup Cloud & Smarter Infrastructure IBM Japan Rev.1 2013 IBM Corporation Abstract Tivoli Storage Flashcopy
Oracle Cloud Storage and File system
2012 Tieto Corporation Oracle Cloud Storage and File system Andrejs Karpovs Oracle Apps DBA Tieto, [email protected] Few notes about me I Am a DBA Work in Tieto Have 4 years exprerience working
Digital Forensics at the National Institute of Standards and Technology
NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards
DevOps Course Content
DevOps Course Content INTRODUCTION TO DEVOPS What is DevOps? History of DevOps Dev and Ops DevOps definitions DevOps and Software Development Life Cycle DevOps main objectives Infrastructure As A Code
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
SPICE and desktop virtualization
SPICE and desktop virtualization Gerd Hoffmann Red Hat LinuxTag, May 11th 1 What is SPICE Simple Protocol for Independent Computing Environments Virtual desktop infrastructure SPICE
Advanced Computing Tools for Applied Research Chapter 4. Version control
Advanced Computing Tools for Applied Research Jaime Boal Martín-Larrauri Rafael Palacios Hielscher Academic year 2014/2015 1 Version control fundamentals 2 What you probably do now Manually save copies
Windows Small Business Server Backup and Recovery Software Replay for Small Business Server Developed by AppAssure Software an industry-leading manufacturer of application backup and recovery solutions
Sparx Systems Enterprise Architect Cloud-based repository hosting
Enterprise Architect is a full life-cycle repository based modelling tool for requirements management, business and systems modelling, collaborating and sharing information and models. Benefits: Cloud-based
Xopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
Using the IPMI interface
Using the IPMI interface The T800, T1600 and T3200 server models are equipped with an IPMI interface with KVM / IP functionality. This enables you to access the server console if it becomes inaccessible
NIST CFTT: Testing Disk Imaging Tools
NIST CFTT: Testing Disk Imaging Tools James R. Lyle, Ph.D. Computer Scientist National Institute of Standards and Technology 1. Introduction There is a critical need in the law enforcement community to
MATLAB @ Work. MATLAB Source Control Using Git
MATLAB @ Work MATLAB Source Control Using Git Richard Johnson Using source control is a key practice for professional programmers. If you have ever broken a program with a lot of editing changes, you can
Zumastor Linux Storage Server
Zumastor Linux Storage Server Daniel Phillips Google, Inc. [email protected] Abstract Zumastor provides Linux with network storage functionality suited to a medium scale enterprise storage role: live
Unidata Cloud-Related Activities. Unidata Users Committee Meeting September 2014 Ward Fisher
Unidata Cloud-Related Activities Unidata Users Committee Meeting September 2014 Ward Fisher Overview Three ongoing efforts, broadly speaking. Unidata developers are incorporating the cloud and cloud-based
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
DELIVERABLE. Europeana Cloud: Unlocking Europe s Research via The Cloud. Deliverable D2.1 Development Environment
DELIVERABLE Project Acronym: Europeana Cloud Grant Agreement number: 325091 Project Title: Europeana Cloud: Unlocking Europe s Research via The Cloud Deliverable D2.1 Development Environment Revision:
Live View. A New View On Forensic Imaging. Matthiew Morin Champlain College
Live View A New View On Forensic Imaging Matthiew Morin Champlain College Morin 1 Executive Summary The main purpose of this paper is to provide an analysis of the forensic imaging tool known as Live View.
REQUIREMENTS LIVEBOX. http://www.liveboxcloud.com
2015 REQUIREMENTS LIVEBOX http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantees about this documentation and its use and decline any expressed or implied commercial or suitability
CYCLOPS. A Charging platform for OPenStack CLouds. Piyush Harsh. June 10, 2014. Institute of Applied Information Technology
CYCLOPS A Charging platform for OPenStack CLouds Piyush Harsh Institute of Applied Information Technology June 10, 2014 Outline 1 Introduction Accounting Process Enablers 2 Cyclops: Architecture Examples
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
Platform as a Service and Container Clouds
John Rofrano Senior Technical Staff Member, Cloud Automation Services, IBM Research [email protected] or [email protected] Platform as a Service and Container Clouds using IBM Bluemix and Docker for Cloud
Remote Access. Connecting to your computer from home
Remote Access Connecting to your computer from home IT Desktop Support Client and Research Services October 2009 2 Contents Overview 3 Windows 4 Setup 4 Remote Desktop 4 From work 4 From home 4 Installing
Digital Forensics. Module 4 CS 996
Digital Forensics Module 4 CS 996 Hard Drive Forensics Acquisition Bit for bit copy Write protect the evidence media EnCase for DOS Safeback (NTI: www.forensics-intl.com) Analysis EnCase FTK (www.accessdata.com)
Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.
chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event
Active Directory Integration OID & AD in Harmony. Ray Tindall SAGE Computing Services
Active Directory Integration OID & AD in Harmony Ray Tindall SAGE Computing Services Active Directory Integration OID & AD in Harmony? SAGE Computing Services Customised Oracle Training Workshops and Consulting
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
WhatsApp Database Encryption on Android and BlackBerry Project Plan. D. Cortjens A. Spruyt F. Wieringa
WhatsApp Database Encryption on Android and BlackBerry Project Plan D. Cortjens A. Spruyt F. Wieringa 16th of November, 2011 Contents 1 Document Information 2 1.1 Description.............................................
Web/Cloud based CATI using quexs
Web/Cloud based CATI using quexs Session 8E 10:45am-12:00pm Tuesday May 17 2011 Presentations and Discussion: Cloud Computing International Field Directors and Technologies Conference 2011 Adam Zammit
EnCase Endpoint Investigator Fundamentals 5/25/2016
EnCase Endpoint Investigator Fundamentals Guidance Software 1 About Us Tony Balzanto Tony Balzanto is an instructor in the Orlando, FL office of Guidance Software s Professional Development and Training
Maximizing Configuration Management IT Security Benefits with Puppet
White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops
NAS 221 Remote Access Using Cloud Connect TM
NAS 221 Remote Access Using Cloud Connect TM Access the files on your NAS remotely with Cloud Connect TM A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able
Mobilize workforce using Fiori apps: Graybar Story
Mobilize workforce using Fiori apps: Graybar Story AGENDA Introduction Graybar Fiori Project Graybar Fiori Apps App Lifecycle Management Security Demo Key Learning Questions INTRODUCTION A leading distributor
Software Cost. Discounted STS Rate Units Total $0.00 $0.00 $0.00 $0.00 Total $0.00
Cost Form This cost form has been provided to assist respondents in submitting costs associated by deliverable. Remember that all costs are to be the firm, fixed price of the deliverable and project total.
CA DLP. Stored Data Integration Guide. Release 14.0. 3rd Edition
CA DLP Stored Data Integration Guide Release 14.0 3rd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Workshop on Cloud Services for File Synchronisation and Sharing 17-18 NOV 2014
Workshop on Cloud Services for File Synchronisation and Sharing 17-18 NOV 2014 Peer-to-Peer powered Sync and Share by 18 NOV 2014 PowerFolder - Background & Contact Enterprise File Sync- and Share solutions
Live System Forensics
Live System Forensics By: Tim Fernalld & Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College 2/22/12 Contents Contents... 1 1 Introduction... 2 1.1 Research Statement... 2 1.2
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
Oracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
Electronic evidence: More than just a hard drive. March 2015 Publication No. 15-02
Electronic evidence: More than just a hard drive March 2015 Publication No. 15-02 1 Introduction 2 Over the last decade, the computer hard drive has been the main point of data storage and therefore the
Privacy-Preserving Distributed Encrypted Data Storage and Retrieval
Privacy-Preserving Distributed Encrypted Data Storage and Retrieval Sibi Antony Master Thesis Starting Talk WS12/13 1 Overview Motivation Thesis Goals Methodology Initial Analysis Time Table 2 Motivation
SURFsara HPC Cloud Workshop
SURFsara HPC Cloud Workshop doc.hpccloud.surfsara.nl UvA workshop 2016-01-25 UvA HPC Course Jan 2016 Anatoli Danezi, Markus van Dijk [email protected] Agenda Introduction and Overview (current
Networks and Services
Networks and Services Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 TOC 1 Infrastructure as a Service 2 Platform as a Service 3 Software as a Service Infrastructure as a Service Definition Infrastructure
Using Microsoft Azure for Students
Using Microsoft Azure for Students Dive into Azure through Microsoft Imagine s free new offer and learn how to develop and deploy to the cloud, at no cost! To take advantage of Microsoft s cloud development
Dry Dock Documentation
Dry Dock Documentation Release 0.6.11 Taylor "Nekroze" Lawson December 19, 2014 Contents 1 Features 3 2 TODO 5 2.1 Contents:................................................. 5 2.2 Feedback.................................................
Deploying Splunk on Amazon Web Services
Copyright 2014 Splunk Inc. Deploying Splunk on Amazon Web Services Simeon Yep Senior Manager, Business Development Technical Services Roy Arsan Senior SoHware Engineer Disclaimer During the course of this
How To Install Project Photon On Vsphere 5.5 & 6.0 (Vmware Vspher) With Docker (Virtual) On Linux (Amd64) On A Ubuntu Vspheon Vspheres 5.4
Getting Started Using Project Photon on VMware vsphere 5.5 & 6.0 What is Project Photon? Project Photon is a tech preview of an open source, Linux container host runtime optimized for vsphere. Photon is
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Secure Cloud and Remote Service Connections for AllJoyn Applications
Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 24 November 2014 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group
Integrated version control with Fossil SCM
Integrated version control with Fossil SCM Tech Talk 2009-12-01 Arne Bachmann Folie 1 Overview Web address www.fossil-scm.org Author Dr. D.R. Hipp - Author of License GPL v2 Motto No information shall
Sheepdog: distributed storage system for QEMU
Sheepdog: distributed storage system for QEMU Kazutaka Morita NTT Cyber Space Labs. 9 August, 2010 Motivation There is no open source storage system which fits for IaaS environment like Amazon EBS IaaS
Version Control. Version Control
Version Control CS440 Introduction to Software Engineering 2013, 2015 John Bell Based on slides prepared by Jason Leigh for CS 340 University of Illinois at Chicago Version Control Incredibly important
