Talk:Untrusted Distributed Storage

From Soma-notes
Revision as of 14:15, 3 November 2008 by AlexC (talk | contribs)

Group 1:
Pond:
1) Why use Java?
2) How was the inner-ring chosen?
3) How big was the prototype able to scale?

Farsite:
1) What is convergence cryptography?
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?

Retro:
1) Why did this never move beyond a research project?
2) (in lessons learned) networking turned out to be the limiting factor over disk space.
Why had they assumed that networking wouldn't be an issue?
3) What planned goals did they achieve?