Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
Republishing before Silence
 
Command Line Utilities: What Would Purr Do?
 
Retiring InfoNuovo.com
 
Confirmable Experience: What a Wideness Gains
 
Confirmable Experience: Consider the Real World
 
Cybersmith: IE 8.0 Mitigation #1: Site-wide Compat...
 
DMware: OK, What's CMIS Exactly?
 
Document Interoperability: The Web Lesson
 
Cybersmith: The IE 8.0 Disruption
 
Cybersmith: The Confirmability of Confirmable Expe...

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2004-12-11

 

Self-Configuring Networks

ACM News Service: Needed -- Self-Configuring Networks.  I am still looking for decentralized discovery and configuration mechanisms, and maybe this military requirement has some equivalence for P2P distributed-object operations. DARPA is looking at mobile self-configuring ad hoc networks, and it appears to be a piggyback on top of IP.  That part makes sense for me.  Their current experimental scheme tops out at 200 nodes, which is interesting.  I wonder if there is a way to work out regions or some kind using a scalable, fractal growth approach. That then has me wonder about authentication and attestation mechanisms (so here we go around the track again ...). Joab Jackson's 2004-11-22 Government Computer News article features an interview with U.S. Army Colonel Timothy Gibson and what is going on with tactical network in the field.

Tracking Down MANET

I didn't find links to MANET or the Control Plane notions, but a web search uncovered the Naval Research Laboratory's page on the IETF MANET working group.  There are piles of links to work that goes back to at least 1998. WCTG-NIST MANET Projects.  Here's a NIST page with material on Mobile Ad Hoc Networks (MANETs).  I am just as keen about this sort of thing for creating dynamic overlays in fixed-position systems too, and here's more information. Defense Against Cyber Attacks on Mobile Ad hoc Networks (MANETs).  There is also serious concern for defending MANETs against cyber attacks, something that would worry me even in a presumably-more-benign environment than battlefield tactical systems (one would hope).  This is going to be classified work according to the announcement of a March, 2004, solicitation.
I had more but I lost it once and I am going to stop and post this much.  I really hate web-intermediated document authoring.  I really do.

2004-12-10

 

Open Source Enterprise

ACM News Service: Open -Source Practices Moving Into Enterprise Development.  This blurb reminds me of two things.  First, the article is about how in-house software development is moving toward open-source-based content and methodologies.  This appears to be related to the harmony with iterative development, collaboration, and reuse in application-development shops. Secondly, it illustrates what seems to be the successful case of open-source ISV operation: having a fundamental open-source product for which there is a supported, packaged commercial version.  There is also the allied notion of having a free (open-source or not) version with a higher-value commercial version for businesses and others to adopt after being introduced via the free/open version.  VA Software and the SourceForge Enterprise packaging are an example.  The Jabber-XMPP and SourceID cases apply the technique directly, and there is some harmony in the PGP - OpenPGP/GnuPG case.  I find that heartening, perhaps even more so than the Linux-specific versions. The 2004-12-07 John Waters Application Development Trends article goes deeper, especially with regard to the basis for the harmonies between open-source approaches and agile application development in enterprise shops.
Listening to:
Georges Bizet, L'arlesienne Suites 1&2, Slovak Philharmonic Orchestra, Windows Media version, Playlist in Windows Media Player 9.0.

2004-12-05

 

Failure Is Your Friend

ACM Queue - A Conversation with Bruce Lindsay - Designing for failure may be the key to success..  Although the title maxim has lots of implications, here I want it to attract you to a comprehensive and breezy little article that shows how much is to be gained by having a healthy respect for failure.  IBM Fellow Bruce Lindsay basically goes through the whole set of architectural principles around the detection and handling of failure by software and how, in general terms, reliable systems are achieved with unreliable components. One key factor that Bruce underscores is that you don't want to go hunting for failures with a modified or adjusted version of the system (no debugging version versus production version, to be harsh about it).  There should only be one version and it is the same one that you troubleshoot as do production with. That leaves a new problem with regard to needing to be able to inject failures, in some benign way, so that it is always confirmable that the recovery and mitigation processes work and those paths operate -- and operational personnel are familiar with seeing them, if they are visible at all.  I think of this as a software fire drill and I was led to this as the result of two experiences. The first experience was when we were building our first (nearly) IBM plug-compatible byte-oriented computers at Sperry Univac.  We were also going to be shipping our own disk drives, but on the development floor we had IBM disk drives on the prototypes so we could get the operating system built.  Things were going swimmingly until we received the first Univac drives from the factory.  These early-production drives were not so reliable as the IBM ones, and suddenly the operating system was crashing a lot.  The error-recovery software in the disk-handling bowels of the operating system had never been checked and live tested.  The fault-handling software had not been thoroughly exercised and we saw the worst possible Maytag repairman problem.  There may have been disk-error-related crashes before, but they may have gone unnoticed among the other surface issues that were being worked out and debugged at the time. The idea of wiring in software fire drills and actually injecting reversible errors into the stack of operations is something that I applied in the early 70's when I was writing some multi-threaded terminal-cluster control software atop an operating system designed for real-time applications. The fact that I knew there were going to be errors, and I had to make sure that I could reverse them, had tremendous impact on the design approach.  And it worked so well that I never had to actually inject errors: the hardware in the terminal controllers had race conditions that gave me ample real-life failures to be assured that the recovery software was exercised early and often.  The only problem with that was that there was an over-simplified channel coupler between the computer and the terminal controller, with no way the computer could programmatically reset the controller once the controller went autistic.  Everything in my computer-side control software failed soft, but all work stopped until the administrator powered-down and back up.  It was not a pretty sight.  The software was more reliable than the hardware and some false economies in the hardware left us with no way to do anything about it.  This is part of the story at the bottom of the page here.
 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $