New Features

These features and enhancements are new in this release of AMASS for UNIX:

AMASS Read Only—AMASS read only allows users to set AMASS to a read only state. You can read from AMASS, but not write or delete. To change the state to read only we use the amasstat command. The options are as follows:

Usage: amasstat [-aicfswuy] [-t sec]

-aChanges filesystem to active status.

-iChanges filesystem to inactive status (reads and writes from/to open files continue).

-rChanges filesystem status to read only.

-RChanges filesystem status to read/write.

-cChecks current status, but do not change.

-fForces status change even if timeout occurs.

-sSuppresses messages from kernel.

-tTime, in seconds, to wait for AMASS to go inactive.

-uDisplays this usage message.

-vDisplays the current AMASS version.

-wDisables writes to AMASS when inactive (reads from open files continue).

-ySuppresses confirmation and informational messages.

If -a, -i, and -care not specified, then the active status of the amass filesystem is toggled.

Cache Size—AMASS supports up to 256 partitions and has been certified with up to 4 TB cache. The 4 TB cache budget may be spent on a single partition or dispersed among multiple partitions. In theory, each partition could use 4 TB cache, or up to 64 PB total; however, the total amount of cache among all partitions has only been certified up to 4 TB.

drivestat—Three new command line options have been added to this tool.

-rResets device runtime state flags to initial condition.

-jResets device eject state flags to initial condition.

The -rjoption addresses a drive in an active state, but has no work scheduled for the drive. This situation arises after a volume, stuck in a drive, has been cleared offline. After restoring the drive to an active state, the drive remains idle. The -rjoption will remove the drive state at the time of failure and restore the drive to its initial conditions. AMASS will assume and trust the operator to have cleared the drive and put the media away.

The -rjoption cannot be run on an active drive.

-DDisplays detailed amass debug logging.

The -Doption has been a hidden option for several release cycles and one AMASS support person has instructed users how to use it. It is now part of the standard -uusage output.

Usage: drivestat -D<device-number><juke-number><debug-option>; where <debug- option> is defined as the arithmetic sum of the following:

0 = Resets all debug flags.

1 = Sets scsi_debug flag.

2 = Sets drvfd_debug flag.

2

© December 2004, ADIC

Page 2
Image 2
ADIC 5.4 manual New Features, Usage amasstat -aicfswuy -t sec

5.4 specifications

ADIC 5.4 is the latest iteration of the Advanced Data Integrity Checker (ADIC), designed to bolster data security and ensure reliability in digital ecosystems. This version introduces a host of features and technologies that enhance the robustness of data management systems across various industries.

One of the most significant features of ADIC 5.4 is its advanced error detection and correction capabilities. Utilizing sophisticated algorithms, this tool can identify discrepancies in data integrity caused by corruption, unexpected changes, or malicious tampering. By promptly flagging these issues, ADIC minimizes the risk of data loss and ensures that organizations can maintain high standards of reliability.

Another key characteristic of ADIC 5.4 is its integration with Artificial Intelligence (AI) and Machine Learning (ML). These technologies allow the system to learn from previous data patterns, improving its detection and correction efficiency over time. By leveraging AI, ADIC can predict potential vulnerabilities, providing organizations with actionable insights to preemptively address data risks.

ADIC 5.4 also boasts enhanced compatibility with cloud-based environments. As more businesses migrate to the cloud, the need for tools that can seamlessly integrate and secure data stored in decentralized locations becomes critical. ADIC 5.4’s multi-platform support ensures that users can validate data integrity, regardless of where it resides, whether in on-premises systems or across multiple cloud providers.

Furthermore, the user interface has been revamped for better usability, featuring intuitive dashboards that present complex data insights in an easily digestible format. This allows users of varying expertise levels to navigate the system efficiently, promoting quick decision-making in critical situations.

The implementation of real-time monitoring within ADIC 5.4 is another noteworthy characteristic. This enables organizations to receive immediate alerts on data integrity issues, allowing for swift remediation actions. The system’s ability to generate comprehensive reports aids in compliance with regulations and internal policies, supporting organizations in maintaining transparency and accountability.

In summary, ADIC 5.4 represents a pivotal advancement in data integrity verification technologies. With its powerful error detection, AI integration, cloud compatibility, improved user interface, and real-time monitoring capabilities, it provides organizations with the tools necessary to safeguard their data assets effectively. As data security remains a paramount concern, solutions like ADIC 5.4 are essential for maintaining trust and efficiency in digital operations.