Red Rock Eater Digest - Workshop on Internet-Scale Software Technologieswriting

militaryeducationinternationalinternet-policycryptographyactivismlawcommerce
3 min read · Edit on Pyrite

Source

Automatically imported from: http://commons.somewhere.com:80/rre/2000/RRE.Workshop.on.Internet.html

Content

| | | | --- | --- | | Red Rock Eater Digest | Most Recent Article: Tue, 15 Aug 2000 |

``` [Reformatted.]

---

This message was forwarded through the Red Rock Eater News Service (RRE). You are welcome to send the message along to others but please do not use the "redirect" option. For information about RRE, including instructions for (un)subscribing, see http://dlis.gseis.ucla.edu/people/pagre/rre.html

---

Date: Thu, 8 Jun 2000 12:00:00 -0700 From: Jim Whitehead Subject: CFP: The Workshop on Internet-Scale Software Technologies

Call for Participation

The Workshop on Internet-Scale Software Technologies (TWIST 2000)

"Organizational and Technical Issues in the Tension Between Centralized and Decentralized Applications on the Internet"

July 13-14, 2000

Institute for Software Research University of California, Irvine Irvine, California, USA

http://www.isr.uci.edu/twist2000/

The goal of TWIST 2000 is to substantively explore design tensions between centralizing and decentralizing forces on the Internet, the pros and cons of centralized and decentralized architectures, and the long term implications which lead architects to design one way or the other.

Many of the most successful applications on the Internet today are architecturally centralized. Among these are eBay, AOL, and Amazon.com. The success of these centralized architectures is surprising to some, given the fundamentally decentralized way the Internet itself and the World Wide Web work.

Alternatively, many companies and research projects have advocated decentralized applications. Such applications are touted as having the advantages of robustness, scalability based upon replication (rather than just raw speed), resource sharing, and ability to span trust domains. Applications of the decentralized approach include SETI@Home (parallel scientific computing) and the Air Traffic Control system (distributed command and control).

Many applications employ a mixed strategy, including financial trading and email. Consider how Travelocity, for example, is implemented as a decentralized Web application wrapping the centralized Sabre reservations service. Other applications exhibit both strategies depending on the layer of abstraction considered: the Domain Name Service is a centralized monopoly of names in a decentralized database, or how Akamai appears as a single global Web cache to a browser but internally relies on globally distributed servers, or eBay, a centralized service enabling wildly decentralized marketplaces.

We seek answers to such questions as:

* - Can centralized applications continue to scale with the growth of Internet users, traffic, types of services, and customer base?* - Can existing centralized approaches continue to grow unabated, or will they reach hard limits?* - If they can grow unabated, then how can this be accomplished and how does it impact decentralized application architecture and development?

Issues to consider include:

* - At what levels of an application's design should distribution be employed?* - What are the key distinguishing characteristics of services (applications) for which centralized architectures (exploiting Moore's Law) will continue to suffice?* - Under what circumstances are decentralized architectures superior? Necessary?* - What sort of application spaces do applications such as Internet phones/smartphones have?

Axes of influence include:

- Economic and business models. - Trust. - Robustness/fault-tolerance. - Scale. - Problem characteristics. - Democratization. Participants often vote their resources by deciding to share information or compute cycles.

Preliminary list of Presenters:

Nasser Barghouti, Baer Stearing Adam L. Beberg, Mithral Communications & Design, Inc., The Cosm Project Gregory Alan Bolcer, Founder and CEO, Endeavors Technology, Inc. Mard Day, Cisco Systems John King, Dean, School of Information, University of Michigan Edith H. Stern, Manager, Business Integration Technologies, IBM Research Dawit Yimam, GMD - German National Research Center for IT Eric Yu, Assistant Professor, Dept. of Computer Science, University of Toronto

Attendance

---

Attendance at the workshop is based on submission of an informal statement of your interests. As well, we encourage submission of 1-5 page position papers which will be distributed in advance to the workshop attendees.

Submission details and deadlines are available at the workshop web site:

http://www.isr.uci.edu/twist2000/

Workshop Report

---

The workshop organizers will produce a report subsequent to the workshop which will be submitted for widespread publication. A proceedings will not be produced.

TWIST Workshop Series

---

TWIST 2000 is the third workshop in the annual TWIST series. TWIST 99 focused on Internet-Scale Namespaces. WISEN 98 focused on Internet-Scale Event Notification. For information on TWIST 99 or WISEN 98, visit:

http://www.isr.uci.edu/twist/

Sponsored by

---

UC Institute for Software Research http://www.isr.uci.edu/

For More Information

---

Debra A. Brodbeck ISR Technical Relations Director brodbeck@uci.edu (949) 824-2260 ```

| | | --- | | ProcessTree Network TM For-pay Internet distributed processing. | | Advertising helps support hosting Red Rock Eater Digest @ The Commons. Advertisers are not associated with the list owner. If you have any comments about the advertising, please direct them to the Webmaster @ The Commons. |