1 / 5

Information Utility Breakout

Information Utility Breakout. Expeditions Meeting 8/16/1999. Path to Success Requirement. Application that can demonstrate it. Interesting Questions / Challenges. Platform That Can be Built. Complementary SubProject Fit. IceBerg. Each has an independent path to success

khavard
Download Presentation

Information Utility Breakout

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Utility Breakout Expeditions Meeting 8/16/1999

  2. Path to Success Requirement Application that can demonstrate it Interesting Questions / Challenges Platform That Can be Built Expeditions Diverse OS

  3. Complementary SubProject Fit IceBerg • Each has an independent path to success • Powerful multiplier if they play together • whole class of new questions • class of storage vs. degree of replication • speculative rivers via erasure codes • common issues / challenges • delegation of trust vs accessibility svc Ocean Ninja DDS DB2 CFS I-store Millennium Expeditions Diverse OS

  4. Requirements of any information service • Storage • transmission • location - how do you find it? • naming - what do you call it? • Presentation • protection • reliability / availability • management Expeditions Diverse OS

  5. Key issues • Need to think of each object as data and code • At the very least • access interface • indexing interface • what about transcoding • Reciprocal trust • many ways for a host to verify that client applications are not malicious • much harder for client to verify host is trustworthy Expeditions Diverse OS

More Related