Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] Dynamo: Amazon's Highly Available Key-value StoreDynamo: Amazon's Highly Available Key-value Store. Giuseppe DeCandia, Deniz ... The paper is structured as follows. Section 2 presents the background ...
-
[2]
[PDF] Bigtable: A Distributed Storage System for Structured DataBigtable: A Distributed Storage System for Structured Data. Fay Chang ... In this paper we describe the sim- ple data model provided by Bigtable, which ...
-
[3]
[PDF] Perspectives on the CAP Theorem - ResearchAbstract. Almost twelve years ago, in 2000, Eric Brewer introduced the idea that there is a fundamental trade-off between consistency, availability, and ...
-
[4]
[PDF] TAO: Facebook's Distributed Data Store for the Social Graph - USENIXJun 26, 2013 · This lookaside cache architecture is well suited to Facebook's rapid iteration cycles, since all. Page 2. 50 2013 USENIX Annual Technical ...
- [5]
-
[6]
[PDF] A History of the ARPANET: The First Decade - DTICApr 1, 1981 · In 1970 major problems with the IMP flow control and storage ... Computing," in Distributed Systems: Infotech State of the Art. Report ...
-
[7]
[PDF] Scalable Transactions for Scalable Distributed Database SystemsJun 21, 2015 · systems, such as distributed key-value stores, for their scalability and availability properties ... Scala, using the same distributed data store, ...<|control11|><|separator|>
-
[8]
A Model and Survey of Distributed Data-Intensive SystemsEach data-intensive system brings its specific choices in terms of data model, usage assumptions, synchronization, processing strategy, deployment, guarantees ...
-
[9]
Redundancy Does Not Imply Fault Tolerance: Analysis of Distributed ...We find that modern distributed systems do not consistently use redundancy to recover from file-system faults: a single file-system fault can cause catastrophic ...
-
[10]
[PDF] Brewer's Conjecture and the Feasibility ofIn this note, we will first discuss what Brewer meant by the conjecture; next we will formalize these concepts and prove the conjecture;. *Laboratory for ...
-
[11]
[PDF] Brewer's Conjecture and the Feasibility of Consistent, Available ...MA 02139. 1Eric Brewer is a professor at the University of California, Berkeley, and the co-founder and Chief Scientist of Inktomi. Page 2. finally, we will ...
-
[12]
[PDF] Paxos Made Simple - Leslie LamportNov 1, 2001 · The Paxos consensus algorithm is precisely the one described above, where requests and responses are sent as ordinary messages. (Response ...
-
[13]
[PDF] The Chubby lock service for loosely-coupled distributed systemsThis paper describes a lock service called Chubby. It is intended for use within a loosely-coupled distributed sys- tem consisting of moderately large ...
-
[14]
[PDF] Implementing Remote Procedure CallsThis paper describes a package providing a remote procedure call facility, the options that face the designer of such a package, and the decisions. ~we made. We ...
-
[15]
[PDF] The Log-Structured Merge-Tree (LSM-Tree) - UMass Boston CSThe LSM-tree access method presented in this paper enables us to perform the frequent index inserts for the Account-ID||Timestamp index with much less disk ...
-
[16]
[PDF] Cassandra - A Decentralized Structured Storage SystemSep 18, 2009 · ABSTRACT. Cassandra is a distributed storage system for managing very large amounts of structured data spread out across many.Missing: topology | Show results with:topology
-
[17]
Effect of Distributed Directories in Mesh InterconnectsIt features 38 tiles packed in a single die, organized into a 2D mesh. Before accessing remote data, tiles need to query the distributed directory. The effect ...
-
[18]
[PDF] A High-Performance Hierarchical Ring On-Chip Interconnect with ...Sep 6, 2011 · We show that a hierarchi- cal ring interconnect can be configured across a wide range of the performance-power trade-off, and that unlike a ...
-
[19]
(PDF) A performance comparison of hierarchical ring- and mesh ...This paper compares the performance of hierarchical ring- and mesh-connected wormhole routed shared memory multiprocessor networks in a simulation study.
-
[20]
[PDF] Consistent Hashing and Random Trees: Distributed Caching ...In this paper, we describe caching protocols for distributed net- works that can be used to decrease or eliminate the occurrences of “hot spots”. Hot spots ...
-
[21]
None### Abstract
-
[22]
[PDF] Scalable SQL and NoSQL Data Stores - Cattell Family IndexHorizontal scaling differs from “vertical” scaling, where a database system utilizes many cores and/or CPUs that share RAM and disks. Some of the systems we ...Missing: seminal | Show results with:seminal
-
[23]
[PDF] Benchmarking Scalability and Elasticity of Distributed Database ...This work evaluates performance, scalability, and elastic- ity of two widely used distributed database systems: Apache. Cassandra and Apache HBase. Both systems ...Missing: survey | Show results with:survey
-
[24]
None### Summary of Auto-Scaling and Elasticity in Distributed Storage Systems
-
[25]
[PDF] Coded Data Rebalancing for Distributed Data Storage Systems with ...Dec 12, 2024 · This triggers a rebalancing algorithm, that exchanges data between the nodes so that the balance of the database is reinstated. The goal is then ...
-
[26]
[PDF] Yellowbrick: An Elastic Data Warehouse on KubernetesJan 14, 2024 · In this paper, we provide an overview of Yellowbrick and its microservices approach to delivering elasticity, scalability and separation of ...
-
[27]
Availability - Reliability Pillar - AWS DocumentationFor example, if the MTBF is 150 days and the MTTR is 1 hour, the availability estimate is 99.97%. For additional details, see Availability and Beyond: ...
-
[28]
[PDF] Fast Erasure Coding for Data Storage - USENIXFeb 25, 2019 · Techniques to improve erasure coding include optimizing bitmatrix design, computation schedule, XOR reduction, caching, and vectorization. ...
-
[29]
[PDF] Heartbeat: A Timeout-Free Failure Detector for Quiescent Reliable ...This paper introduces heartbeat, a failure detector that can be implemented without timeouts, and shows how it can be used to solve the problem of quiescent ...
-
[30]
Disaster Recovery for Databases: How It Evolves over the Years | TiDBOct 19, 2022 · This article is a brief history of database DR, with an emphasis on DR and high availability (HA) innovations in cloud-based distributed databases.
-
[31]
[PDF] Practical Byzantine Fault ToleranceThis paper describes a new replication algorithm that is able to tolerate Byzantine faults. We believe that Byzantine- fault-tolerant algorithms will be ...
-
[32]
None### Abstract
-
[33]
[PDF] What's Really New with NewSQL? - CMU Database GroupNewSQL is a new class of DBMSs that can scale modern OLTP workloads, unlike legacy systems, and is interpreted as "Not Only SQL".Missing: evolution | Show results with:evolution
-
[34]
What's really new with NewSQL? - ResearchGateAug 7, 2025 · NewSQL systems are RDBMSs built from the ground up in the 2010s to account for the innovations and technical development introduced by NoSQL ...
-
[35]
What is ACID? Atomicity, Consistency, Isolation, DurabilityCan distributed databases provide ACID compliance? Yes, modern distributed SQL databases can support ACID transactions using consensus protocols (like Raft ...
-
[36]
ACID Transactions: The Cornerstone of Database Integrity | YugabyteDistributed ACID transactions are ACID-compliant transactions that modify multiple rows in more than one shard—usually distributed across multiple nodes. A ...What are Distributed ACID... · Are ACID Transactions in a...
-
[37]
Architecture Overview - CockroachDBRaft protocol. The consensus protocol employed in CockroachDB that ensures that your data is safely stored on multiple nodes and that those nodes agree on the ...
-
[38]
Comparing PostgreSQL-Compatible Databases - YugabyteDBIn addition, YugabyteDB has expanded PostgreSQL table partitioning capabilities by adding support for geo-partitioned tables that pin user data to specific ...
-
[39]
Top 5 financial services use cases for CockroachDBJul 8, 2025 · #1 Building a highly available payments system designed for correctness · #2 Delivering an internal database-as-a-service for all developers · #3 ...
-
[40]
Amazon Aurora DSQL, the fastest serverless distributed SQL ...May 27, 2025 · We're announcing the general availability of Amazon Aurora DSQL, the fastest serverless distributed SQL database with virtually unlimited scale.Missing: 2020 | Show results with:2020
-
[41]
Why distributed SQL is better for businesses in 2025 - CockroachDBMay 6, 2025 · Distributed SQL offers elastic scalability, global availability, strong consistency, cloud-native design, and simplifies operations, making it ...<|separator|>
-
[42]
Serverless compute tier - Azure SQL Database - Microsoft LearnOct 17, 2025 · This article describes the new serverless compute tier and compares it with the existing provisioned compute tier for Azure SQL Database.Missing: 2020 | Show results with:2020
-
[43]
What Is NoSQL? NoSQL Databases Explained - MongoDBNoSQL databases are BASE compliant, i.e., basic availability soft state eventual consistency. ... properties: consistency, availability, and partition tolerance.
-
[44]
Convert Your Single-Region Amazon DynamoDB Tables to Global ...Nov 21, 2019 · [This post has been updated on March 17th 2020. You can now update update existing global tables to the new replication model].
-
[45]
Managing Distributed Data - MongoDBMongoDB is the leader in a new generation of databases that are designed for scalability. With a technique called “sharding” you are able to easily distribute ...
-
[46]
Scalable Graph Databases With Neo4j Autonomous ClusteringNov 9, 2022 · The new capability in Neo4j 5 can automatically decide how to distribute primary (writable, synchronous) and secondary (read-only, asynchronous) ...
-
[47]
FaunaDBWelcome to FaunaDB! FaunaDB is a strongly consistent OLTP database with a hybrid document-relational data model accessed via a NoSQL query language (FQL).
-
[48]
NoSQL Database Use Cases - ScyllaDBFor real-time analytics or performing big data work. Learn more about SQL vs NoSQL. What are some of the top NoSQL database use cases? Here are some of the ...Missing: web | Show results with:web
-
[49]
Security Issues in Distributed Storage Networks - IEEE XploreIn this paper, we present different eavesdropper models for distributed storage tasks as well as possible extensions of distributed storage frameworks to secure ...Missing: threats | Show results with:threats
-
[50]
A Survey on Privacy and Security in Distributed Cloud ComputingApr 29, 2025 · This process can increase the risk of data breaches, unauthorized access, or interception during transmission and storage because the raw data ...
-
[51]
Using SSL/TLS to encrypt a connection to a DB instance or clusterSSL/TLS connections provide a layer of security by encrypting data that moves between your client and DB instance or cluster . Optionally, your SSL/TLS ...
-
[52]
Encryption of data in transit - IBMYou can use TLS to protect data in transit on all networks that use TCP/IP. In other words, a TLS connection is a secured TCP/IP connection.
-
[53]
Access control in federated systemsA good user's authentication is a prerequisite for a correct access control. The identity of a user determines the groups to which the user belongs, the roles ...
-
[54]
Implementing role based access control for federated information ...This paper describes a security model for authentication and access control to federated systems. The model supports single sign-on for users; a high level ...
- [55]
-
[56]
Challenges using Prometheus at scale - SysdigMar 26, 2020 · Challenges include managing multiple instances, lack of global visibility, difficulty in horizontal scaling due to memory issues, and the need ...
-
[57]
Does server location really matter under the GDPR? - TechGDPRJul 2, 2024 · The GDPR does not mandate data localization, but it outlines strict rules and requirements for processing data outside of the EEA. Storing and ...
-
[58]
Geographic Regulations around Cross-Border Data TransfersFeb 24, 2023 · Stay compliant with laws like GDPR, CCPA, and LGPD for international data transfers. Discover how Securiti can assist in understanding and ...
-
[59]
[PDF] Zero Trust Architecture - NIST Technical Series PublicationsA zero trust architecture (ZTA) is an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and ...
-
[60]
[PDF] Tamper Detection in Audit Logs - VLDB EndowmentThis paper proposes mechanisms within a database management system (DBMS), based on cryptograph- ically strong one-way hash functions, that prevent an intruder, ...