scispace - formally typeset
Search or ask a question
Topic

Journaling file system

About: Journaling file system is a research topic. Over the lifetime, 2243 publications have been published within this topic receiving 41252 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, reflective journals were used in engaging with the notion of creating transparency in the research process, and explore the impact of critical self-reflection on research design, and how reflective journals can have concrete effects on the research design.
Abstract: The problem of bias in qualitative research particularly is still debated in methodology texts and there is a lack of agreement on how much researcher influence is acceptable, whether or not it needs to be "controlled," and how it might be accounted for. Denzin (1994) refers to this as "the interpretive crisis" (p. 501). I chose to make my experiences, opinions, thoughts, and feelings visible and an acknowledged part of the research process through keeping reflective journals and using them in writing up the research. The aim of this paper is to show how reflective journals were used in engaging with the notion of creating transparency in the research process, and explore the impact of critical self-reflection on research design. Key Words: Self-reflection, Qualitative Research, and Research Journals Introduction A reflexive approach to the research process is now widely accepted in much qualitative research. Researchers are urged to talk about themselves, "their presuppositions, choices, experiences, and actions during the research process" (Mruck & Breuer, 2003, p. 3). Reflective practice such as this aims to make visible to the reader the constructed nature of research outcomes, a construction that "originates in the various choices and decisions researchers undertake during the process of researching" (Mruck & Breuer, p. 3). Increasingly qualitative research, particularly that which is situated within feminist, critical, and poststructuralist paradigms is, ... presented in ways that make it clear how the researcher's own experiences, values, and positions of privilege in various hierarchies have influenced their research interests, the way they choose to do their research, and the ways they choose to represent their research findings. (Harrison, MacGibbon, & Morton, 2001, p. 325) Rather than attempting to control researcher values through method or by bracketing assumptions, the aim is to consciously acknowledge those values. Keeping self-reflective journals is a strategy that can facilitate reflexivity, whereby researchers use their journal to examine "personal assumptions and goals" and clarify "individual belief systems and subjectivities" (Ahern as cited in Russell & Kelly, 2002, p. 2). Whilst keeping a reflective journal is a common practice in qualitative research, particularly reflexive research (Etherington, 2004), there is relatively little literature on the use of reflective journals in the research process, and limited guidance for novice researchers as to the purposes of keeping a reflective journal from a methodological perspective and how to use their reflections as an integral part of the research process. This aim of this paper is to show the reader how reflective journals were used in engaging with the notion of creating transparency in the research process, and how keeping a reflective journal can have concrete effects on the research design. The goal is to provide a research "trail" of gradually altering methodologies and reshaping analysis. My target audience is novice researchers, perhaps doctoral students, who have been advised to keep a research journal, but are not sure about the purpose of keeping such a journal or how they might use it in their research. The purpose is to share my experiences with, and uses of, reflective research journals so that novice researchers can more consciously engage in journaling and make it part of their research from the beginning, and also, to illustrate in a descriptive way how journals might be written and how they might be used. The project in which I used reflective journals was a doctoral research study that explored how tertiary supervisors understand and practise assessment of the early childhood practicum. Participants were tertiary supervisors who supervised and assessed students enrolled in pre-service early childhood education courses offered by universities and/or institutes of Technical and Further Education (TAFE) in Australia. …

941 citations

Proceedings ArticleDOI
John R. Douceur1, Atul Adya1, William J. Bolosky1, P. Simon1, Marvin M. Theimer1 
02 Jul 2002
TL;DR: This work presents a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication, and includes convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys.
Abstract: The Farsite distributed file system provides availability by replicating each file onto multiple desktop computers. Since this replication consumes significant storage space, it is important to reclaim used space where possible. Measurement of over 500 desktop file systems shows that nearly half of all consumed space is occupied by duplicate files. We present a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication. Our mechanism includes: (1) convergent encryption, which enables duplicate files to be coalesced into the space of a single file, even if the files are encrypted with different users' keys; and (2) SALAD, a Self-Arranging Lossy Associative Database for aggregating file content and location information in a decentralized, scalable, fault-tolerant manner. Large-scale simulation experiments show that the duplicate-file coalescing system is scalable, highly effective, and fault-tolerant.

690 citations

Proceedings ArticleDOI
Matt Blaze1
01 Dec 1993
TL;DR: Encryption techniques for file system-level encryption are described, and general issues of cryptographic system interfaces to support routine secure computing are discussed.
Abstract: Although cryptographic techniques are playing an increasingly important role in modern computing system security, user-level tools for encrypting file data are cumbersome and suffer from a number of inherent vulnerabilities. The Cryptographic File System (CFS) pushes encryption services into the file system itself. CFS supports secure storage at the system level through a standard Unix file system interface to encrypted files. Users associate a cryptographic key with the directories they wish to protect. Files in these directories (as well as their pathname components) are transparently encrypted and decrypted with the specified key without further user intervention; cleartext is never stored on a disk or sent to a remote file server. CFS can use any available file system for its underlying storage without modification, including remote file servers such as NFS. System management functions, such as file backup, work in a normal manner and without knowledge of the key.This paper describes the design and implementation of CFS under Unix. Encryption techniques for file system-level encryption are described, and general issues of cryptographic system interfaces to support routine secure computing are discussed.

536 citations

Patent
24 May 1996
TL;DR: In this paper, a database server maintains a schedule of events file adapted to contain information relating to predetermined downloading schedules to the subscribers of the database server, which are then transmitted to individual subscribers so that requests for information can be launched from the subscribers terminals at a predetermined time in accordance with the schedule of event file.
Abstract: A method for operating a server system adapted to provide information files to a plurality of subscribers over communications network, such as Internet. A plurality of publishers store their publishing material such as newspapers, magazines or software files in a database server. The database server maintains a schedule of events file adapted to contain information relating to predetermined downloading schedules to the subscribers of the database server. The schedule of events file or the relevant portions of it are then transmitted to individual subscribers so that requests for information can be launched from the subscribers terminals at a predetermined time in accordance with the schedule of event file. The server then transmits to each requesting subscriber a set of predetermined data files as authorized by a corresponding one of the publishers, including each file's name, size and identification code in response to said information request from each one of the subscribers. In accordance with another aspect of the invention, the database server keeps a track of information file transmittals and makes sure that a file has been successfully downloaded. If not, the database server keeps a track of the portion of the files that have been successfully transmitted and attempts to retransmit the portion that has not been received successfully, several times until the entire file is successfully received.

525 citations

Patent
09 Feb 2000
TL;DR: In this paper, a data processing system having an efficient logging mechanism which stores log records for repairing a file system when its consistency is lost, is described, where the collected data is temporarily stored in a log buffer, and finally saved into a log volume by a log writing unit.
Abstract: A data processing system having an efficient logging mechanism which stores log records for repairing a file system when its consistency is lost. When there is a transaction attempting to update metadata stored in metadata volumes, a metadata loading unit reads the requested metadata objects out of the volumes and loads them to a metadata cache. At that time, a metadata manager updates its internal database to record from which metadata volume each metadata object has been fetched. Each time the transaction updates a metadata object in the cache, a log collection unit collects a copy of the updated metadata object, together with a volume ID which indicates its home metadata volume. The collected data is temporarily stored in a log buffer, and finally saved into a log volume by a log writing unit.

452 citations


Network Information
Related Topics (5)
Experiential learning
63.4K papers, 1.6M citations
79% related
Professional development
81.1K papers, 1.3M citations
77% related
Curriculum
177.5K papers, 2.3M citations
77% related
Social network
42.9K papers, 1.5M citations
76% related
Educational technology
72.4K papers, 1.7M citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202348
2022149
202148
202069
201949
201863