Information Utility Breakout Expeditions Meeting 8/16/1999.

Slides:



Advertisements
Similar presentations
Applications of Feather-Weight Virtual Machines (FVMs) Hadi Salimi Distributed Systems Lab, School of Computer Engineering, Iran University of Science.
Advertisements

Presentation by Prabhjot Singh
What is OceanStore? - 10^10 users with files each - Goals: Durability, Availability, Enc. & Auth, High performance - Worldwide infrastructure to.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
November 2003 InterLab Juli Hearn Savannah River Site We-SHARE Web-based Electronic Sharing and Reallocation of Assets.
Storage Interoperability: Fact vs. Fiction Steve Duplessie Founder/Sr. Analyst The Enterprise Storage Group, Inc.
Next Steps toward More Trustworthy Interfaces Burt Kaliski, RSA Laboratories 1 st Workshop on Trustworthy Interfaces for Passwords and Personal Information.
Information Capture and Re-Use Joe Hellerstein. Scenario Ubiquitous computing is more than clients! –sensors and their data feeds are key –smart dust.
Where Do the 7 layers “fit”? Or, where is the dividing line between hdw & s/w? ? ?
Solving Linear Equations Rule 7 ‑ 1: We can perform any mathematical operation on one side of an equation, provided we perform the same operation on the.
FIT3105 Smart card based authentication and identity management Lecture 4.
Stanford Archival Vault (SAV)
Other File Systems: AFS, Napster. 2 Recap NFS: –Server exposes one or more directories Client accesses them by mounting the directories –Stateless server.
Experiences with Structured Recording and Replay in Interactive Remote Instruction Kurt Maly et al. Old Dominion University, Norfolk, Virginia, USA.
Remus: High Availability via Asynchronous Virtual Machine Replication.
Authorization. Authorization: Two Meanings Determining permission Is principal P permitted to perform action A on object U? Adding permission P is now.
Slide 1 Ubiquitous Storage Breakout Group Endeavour mini-retreat January, 2000.
Packing for the Expedition David Culler. 5/25/992 Ongoing Endeavors Millennium: building a large distributed experimental testbed –Berkeley Cluster Software.
Cloud Usability Framework
Microsoft Office Access 2007 A rich client for Windows SharePoint Services 3.0 Mark Bower Senior Consultant Microsoft UK
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
High Availability & Oracle RAC 18 Aug 2005 John Sheaffer Platform Solution Specialist
Globus 4 Guy Warner NeSC Training.
OVERVIEW May 26, Overview Automate the performance management and compensation processes Integrate employee data between
Selecting and Implementing An Embedded Database System Presented by Jeff Webb March 2005 Article written by Michael Olson IEEE Software, 2000.
PRISM: Proxies for Internet Streaming Media J. Kurose, P. Shenoy, D. Towsley (UMass/Amherst) L. Gao (Smith College) G. Hjalmtysson, J. Rexford (AT&T Research.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
S ERVER C LIENT M ONITORING S YSTEM P RESENTING T EAM KS3 Final Presentation.
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
An Introduction to Software Engineering. What is Software?
1 The Fast(est) Path to Building a Private/Hybrid Cloud October 25th, 2011 Paul Mourani RightScale.
Introduction to DFS. Distributed File Systems A file system whose clients, servers and storage devices are dispersed among the machines of a distributed.
DataReader 2 Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain- specific Modeling Joe Hoffert, Akshay Dabholkar, Aniruddha Gokhale, and.
EXAMPLE 1 Dividing a Fraction by a Fraction a = = 3 4 1, or b. – – = = 7 (– 2) 9 – 4 = 1 4 – 2, or.
Operating Systems Structure what is the organizational principle?
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
1. Flip over 2nd fraction (reciprocal) 2. keep 1st fraction the same 3. change ÷ to an X 4. multiply 5. reduce.
POND: THE OCEANSTORE PROTOTYPE S. Rea, P. Eaton, D. Geels, H. Weatherspoon, J. Kubiatowicz U. C. Berkeley.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Comprehensive Project Management Solutions with the.NET Server family.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Cloud Distributed Computing Environment Hadoop. Hadoop is an open-source software system that provides a distributed computing environment on cloud (data.
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
Orleans ❤ Service Fabric A mega-quick demonstration of aforementioned love.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Practical Session 10 Computer Architecture and Assembly Language.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Computer Architecture and Assembly Language
Least Common Multiple.
Outline What does the OS protect? Authentication for operating systems
>> Introduction to Web Applications
Outline What does the OS protect? Authentication for operating systems
How to Protect Big Data in a Containerized Environment
Least Common Multiple By Monica Yuskaitis.
2 or more does NOT affects.
Computer Architecture and Assembly Language
For the MVHS Cyber Defense CLub
Harrison Howell CSCE 824 Dr. Farkas
Information Capture and Re-Use
Torwards an Oceanic Data Utility
Presentation transcript:

Information Utility Breakout Expeditions Meeting 8/16/1999

8/16/99Expeditions Diverse OS2 Path to Success Requirement Platform That Can be Built Interesting Questions / Challenges Application that can demonstrate it

8/16/99Expeditions Diverse OS3 Complementary SubProject Fit Each has an independent path to success Powerful multiplier if they play together –whole class of new questions »class of storage vs. degree of replication »speculative rivers via erasure codes –common issues / challenges »delegation of trust vs accessibility I-store DB2 Millennium Ninja DDS svc Ocean CFS IceBerg

8/16/99Expeditions Diverse OS4 Requirements of any information service Storage transmission location - how do you find it? naming- what do you call it? Presentation protection reliability / availability management

8/16/99Expeditions Diverse OS5 Key issues Need to think of each object as data and code At the very least –access interface –indexing interface what about transcoding Reciprocal trust –many ways for a host to verify that client applications are not malicious –much harder for client to verify host is trustworthy