Re: Resource discovery, replication (WWW Announcements archives?)
Fisher Mark <FisherM@is3.indy.tce.com>
Errors-To: listmaster@www0.cern.ch
Date: Wed, 4 May 1994 20:31:50 +0200
Errors-To: listmaster@www0.cern.ch
Message-id: <2DC7FFE3@MSMAIL.INDY.TCE.COM>
Errors-To: listmaster@www0.cern.ch
Reply-To: FisherM@is3.indy.tce.com
Originator: www-talk@info.cern.ch
Sender: www-talk@www0.cern.ch
Precedence: bulk
From: Fisher Mark <FisherM@is3.indy.tce.com>
To: Multiple recipients of list <www-talk@www0.cern.ch>
Subject: Re: Resource discovery, replication (WWW Announcements archives?)
X-Listprocessor-Version: 6.0c -- ListProcessor by Anastasios Kotsikonas
X-Mailer: Microsoft Mail V3.0
X-Mailer: Microsoft Mail V3.0
Dan Connolly writes in message <9405041031.AA23634@ulua.hal.com>:
>With my broadcast strategy, I just set up a process that gathers new
>articles and expires old ones. Server sites wouldn't necessarily renew
>their announcements at the same interval, but let's say the maximum
>interval for 95% of the sites is one month. Then after two months,
>my database reaches steady-state. From then on, It maintains itself.
>
>And its scalable: everybody has access to everything without anybody
>having to do everything.
Exactly the Right Thing, IMHO :). Centralized strategies, or the two-phase
commit strategy in the relational database world, are needed when maximum
reliability is one of the goals of the information system. My impression is
that there is enough redundancy arising from the structure of the Web (home
pages having pointers to other home pages) that a small proportion of
out-of-date information would not be much of a problem. Meanwhile, the
computing resource requirements should be much less under this scheme.
(Unfortunately this is based on hearsay, as our TCP/IP Internet connection
is not due until summer.)
As far as security goes, <9405041228.AA24223@ulua.hal.com>:
>You may believe that, and you may be right most of the time.
>But there is no mechanism to ensure it. DNS
>can be spoofed. TCP/IP is not inherently secure. In short, security-
>minded folks won't be satisfied.
Security mechanisms will evolve, eventually becoming as common as
command-line shells. Remember that the first FORTRAN compiler was a
research project that took 7 or so man-years to complete (don't have the
precise figures in front of me). Now it is expected that an undergraduate
can write a compiler with modern tools as part of a single-semester course.
As security is needed, it will be added.
======================================================================
Mark Fisher Thomson Consumer Electronics
fisherm@tcemail.indy.tce.com Indianapolis, IN
"Just as you should not underestimate the bandwidth of a station wagon
traveling 65 mph filled with 8mm tapes, you should not overestimate
the bandwidth of FTP by mail."