Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles 2007
DOI: 10.1145/1294261.1294283
|View full text |Cite
|
Sign up to set email alerts
|

Staged deployment in mirage, an integrated software upgrade testing and distribution system

Abstract: Despite major advances in the engineering of maintainable and robust software over the years, upgrading software remains a primitive and error-prone activity. In this paper, we argue that several problems with upgrading software are caused by a poor integration between upgrade deployment, user-machine testing, and problem reporting. To support this argument, we present a characterization of software upgrades resulting from a survey we conducted of 50 system administrators. Motivated by the survey results, we p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(18 citation statements)
references
References 16 publications
0
18
0
Order By: Relevance
“…In particular, although extant studies on decision making about IS upgrades have addressed efficient decision-making systems, such as the cost of IS upgrades, the time required, and the timing of appropriate decisions, the limitations of those studies are the factors that can be influenced by the business environment, such as external vendor support, jobs, and positions [12,16]. In addition, the most relevant studies on successful IS upgrades and decision models have targeted users and experts [16,[18][19][20], disregarding managers. Therefore, a wider scope of targets is needed in order to study efficiently decision-making models.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, although extant studies on decision making about IS upgrades have addressed efficient decision-making systems, such as the cost of IS upgrades, the time required, and the timing of appropriate decisions, the limitations of those studies are the factors that can be influenced by the business environment, such as external vendor support, jobs, and positions [12,16]. In addition, the most relevant studies on successful IS upgrades and decision models have targeted users and experts [16,[18][19][20], disregarding managers. Therefore, a wider scope of targets is needed in order to study efficiently decision-making models.…”
Section: Introductionmentioning
confidence: 99%
“…The first two checks occur in png_get_uint_31 (line 37), which checks that the PNG height and width values are less than 0x7fffffffL. The third and fourth sanity checks occur in png_check_IHDR (lines [21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36], which check that the PNG height and width values are less than one million. The fifth and final sanity check occurs at line 72, immediately before the target memory allocation site at line 87.…”
Section: Target Expression Extractionmentioning
confidence: 99%
“…In addition to transferring checks between independently developed applications, we have also used CP to transfer checks between different versions of the same application. The motivation is to automatically obtain a targeted update that eliminates an error in an older version without the disruption often associated with full upgrade [31].…”
Section: Multiversion Code Transfermentioning
confidence: 99%
“…Deviations from the profiles can help detect, localise, and identify faults. In [3], it has been argued that some problems with software upgrades are caused by a poor integration between deployment, testing, and problem reporting. This argument results in a framework integrating testing and problem reporting into deployment cycle of software upgrades.…”
Section: Related Workmentioning
confidence: 99%
“…Facebook integrates software modifications a few times per day [2]. The statistical data in [3], [4] expose the vulnerability of software upgrades. Once an upgrade fails, the aftermath may be serious, as in the losses of NSA [5].…”
Section: Introductionmentioning
confidence: 99%