Extreme Programming in Perl

Total Page:16

File Type:pdf, Size:1020Kb

Extreme Programming in Perl Extreme Programming in Perl Robert Nagler February 22, 2017 Copyright c 2004 Robert Nagler Licensed under a Creative Commons Attribution 4.0 International License [email protected] Contents Preface ix 1 The Problem 1 1.1 Some Statistics . .2 1.2 Risk Averse Methodologies . .2 1.3 Fostering Failure . .3 1.4 Get Me a Rock . .4 1.5 Requirements Risk . .5 1.6 Let's Rock And Roll . .5 2 Extreme Programming 7 2.1 Core Values . .8 2.2 Communication . .9 2.3 Simplicity . .9 2.4 Feedback . 10 2.5 Courage . 11 2.6 The Practices . 12 2.7 Adopting XP . 13 3 Perl 15 3.1 Core Values . 15 3.2 Customer-Orientation . 16 3.3 Testing . 16 3.4 CPAN . 17 3.5 Organizing Your Workshop . 17 4 Release Planning 19 4.1 Planning Game . 20 4.2 Roles . 20 4.3 Stories . 20 4.4 On-site Customer . 21 4.5 Story Cards . 21 4.6 Dead Wood . 24 4.7 Estimation . 25 iii 4.8 Easing Estimation . 26 4.9 Spike Solutions . 26 4.10 Prioritization . 27 4.11 All the Facts . 28 4.12 Small Releases . 28 5 Iteration Planning 31 5.1 Tasks . 31 5.2 The Meeting . 32 5.3 Get Me a Bucket . 33 5.4 Velocity . 33 5.5 Watch Your Speed . 34 5.6 Customer Priorities . 34 5.7 Taking Care of Business . 35 5.8 The Beat Goes on . 35 6 Pair Programming 37 6.1 Quality . 37 6.2 How It Works . 38 6.3 Ease on down the Road . 38 6.4 Rest & Relaxation . 39 6.5 People Problems . 39 6.6 Different Strokes . 40 6.7 Yea, Whatever . 42 6.8 Gumption Traps . 42 6.9 Reducing Risk Through Knowledge Transfer . 43 7 Tracking 45 7.1 Iteration Tracking . 46 7.2 Don't Slip the Date . 46 7.3 Adding Tasks . 47 7.4 The Tracker . 47 7.5 Release Tracking . 47 7.6 What Goes Wrong? . 49 7.7 Fixing Troubled Projects . 51 7.8 Meetings . 52 7.9 Show Your Stuff . 52 7.10 Sign Off . 52 7.11 Here and Now . 53 8 Acceptance Testing 55 8.1 Acceptance Tests . 55 8.2 Automation . 56 56section.8.3 Copyright c 2004 Robert Nagler iv [email protected] 8.4 Group Multiple Paths . 58 8.5 Without Deviation, Testing Is Incomplete . 59 8.6 Subject Matter Oriented Programming . 60 8.7 Data-Driven Testing . 61 8.8 Empower The Customer to Test . 64 9 Coding Style 65 9.1 There's More Than One Way To Do It . 66 9.2 Give Me Consistency or Give Me Death . 66 9.3 Team Colors . 67 9.4 An Example . 67 9.5 You Say, \if else", And I Say, \?:"............ 70 9.6 Once And Only Once . 70 9.7 Refactored Example . 71 9.8 Change Log . 73 9.9 Refactoring . 75 9.10 Input Validation . 75 9.11 You'd Rather Die . 76 10 Logistics 79 11 Test-Driven Design 81 11.1 Unit Tests . 82 11.2 Test First, By Intention . 82 11.3 Exponential Moving Average . 84 11.4 Test Things That Might Break . 84 11.5 Satisfy The Test, Don't Trick It . 85 11.6 Test Base Cases First . 86 11.7 Choose Self-Evident Data . 87 11.8 Use The Algorithm, Luke! . 87 11.9 Fail Fast . 88 11.10Deviance Testing . 89 11.11Only Test The New API . 90 11.12Solid Foundation . 91 12 Continuous Design 93 12.1 Refactoring . 94 12.2 Simple Moving Average . 94 12.3 SMA Unit Test . 95 12.4 SMA Implementation . 96 12.5 Move Common Features to a Base Class . 98 12.6 Refactor the Unit Tests . 99 12.7 Fixing a Defect . 100 12.8 Global Refactoring . 102 Copyright c 2004 Robert Nagler v [email protected] 12.9 Continuous Rennovation in the Real World . 104 12.10Simplify Accessors . 105 12.11Change Happens . 106 13 Unit Testing 107 13.1 Testing Isn't Hard . 107 13.2 Mail::POP3Client ........................ 108 13.3 Make Assumptions . 108 13.4 Test Data Dependent Algorithms . 109 13.5 Validate Basic Assumptions First . 110 13.6 Validate Using Implementation Knowledge . 110 13.7 Distinguish Error Cases Uniquely . 112 13.8 Avoid Context Sensitive Returns . 113 13.9 Use IO::Scalar for Files . 113 13.10Perturb One Parameter per Deviance Case . 114 13.11Relate Results When You Need To . 114 13.12Order Dependencies to Minimize Test Length . 115 13.13Consistent APIs Ease Testing . 116 13.14Inject Failures . 117 13.15Mock Objects . 118 13.16Does It Work? . 119 14 Refactoring 121 14.1 Design on Demand . 122 14.2 Mail::POP3Client ........................ 122 14.3 Remove Unused Code . 122 14.4 Refactor Then Fix . 123 14.5 Consistent Names Ease Refactoring . 125 14.6 Generate Repetitive Code . 126 14.7 Fix Once and Only Once . 126 14.8 Stylin' . 127 14.9 Tactics Versus Strategy . 127 14.10Refactor With a Partner . 128 14.11Sharing with Code References . 131 14.12Refactoring Illuminates Fixes . 132 14.13Brush and Floss Regularly . 133 15.
Recommended publications
  • Referência Debian I
    Referência Debian i Referência Debian Osamu Aoki Referência Debian ii Copyright © 2013-2021 Osamu Aoki Esta Referência Debian (versão 2.85) (2021-09-17 09:11:56 UTC) pretende fornecer uma visão geral do sistema Debian como um guia do utilizador pós-instalação. Cobre muitos aspetos da administração do sistema através de exemplos shell-command para não programadores. Referência Debian iii COLLABORATORS TITLE : Referência Debian ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki 17 de setembro de 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Referência Debian iv Conteúdo 1 Manuais de GNU/Linux 1 1.1 Básico da consola ................................................... 1 1.1.1 A linha de comandos da shell ........................................ 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 A conta root .................................................. 2 1.1.4 A linha de comandos shell do root ...................................... 3 1.1.5 GUI de ferramentas de administração do sistema .............................. 3 1.1.6 Consolas virtuais ............................................... 3 1.1.7 Como abandonar a linha de comandos .................................... 3 1.1.8 Como desligar o sistema ........................................... 4 1.1.9 Recuperar uma consola sã .......................................... 4 1.1.10 Sugestões de pacotes adicionais para o novato ................................ 4 1.1.11 Uma conta de utilizador extra ........................................ 5 1.1.12 Configuração
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Pragmaticperl-Interviews-A4.Pdf
    Pragmatic Perl Interviews pragmaticperl.com 2013—2015 Editor and interviewer: Viacheslav Tykhanovskyi Covers: Marko Ivanyk Revision: 2018-03-02 11:22 © Pragmatic Perl Contents 1 Preface .......................................... 1 2 Alexis Sukrieh (April 2013) ............................... 2 3 Sawyer X (May 2013) .................................. 10 4 Stevan Little (September 2013) ............................. 17 5 chromatic (October 2013) ................................ 22 6 Marc Lehmann (November 2013) ............................ 29 7 Tokuhiro Matsuno (January 2014) ........................... 46 8 Randal Schwartz (February 2014) ........................... 53 9 Christian Walde (May 2014) .............................. 56 10 Florian Ragwitz (rafl) (June 2014) ........................... 62 11 Curtis “Ovid” Poe (September 2014) .......................... 70 12 Leon Timmermans (October 2014) ........................... 77 13 Olaf Alders (December 2014) .............................. 81 14 Ricardo Signes (January 2015) ............................. 87 15 Neil Bowers (February 2015) .............................. 94 16 Renée Bäcker (June 2015) ................................ 102 17 David Golden (July 2015) ................................ 109 18 Philippe Bruhat (Book) (August 2015) . 115 19 Author .......................................... 123 i Preface 1 Preface Hello there! You have downloaded a compilation of interviews done with Perl pro- grammers in Pragmatic Perl journal from 2013 to 2015. Since the journal itself is in Russian
    [Show full text]
  • Effective Perl Programming
    Effective Perl Programming Second Edition The Effective Software Development Series Scott Meyers, Consulting Editor Visit informit.com/esds for a complete list of available publications. he Effective Software Development Series provides expert advice on Tall aspects of modern software development. Books in the series are well written, technically sound, and of lasting value. Each describes the critical things experts always do—or always avoid—to produce outstanding software. Scott Meyers, author of the best-selling books Effective C++ (now in its third edition), More Effective C++, and Effective STL (all available in both print and electronic versions), conceived of the series and acts as its consulting editor. Authors in the series work with Meyers to create essential reading in a format that is familiar and accessible for software developers of every stripe. Effective Perl Programming Ways to Write Better, More Idiomatic Perl Second Edition Joseph N. Hall Joshua A. McAdams brian d foy Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • Towards Left Duff S Mdbg Holt Winters Gai Incl Tax Drupal Fapi Icici
    jimportneoneo_clienterrorentitynotfoundrelatedtonoeneo_j_sdn neo_j_traversalcyperneo_jclientpy_neo_neo_jneo_jphpgraphesrelsjshelltraverserwritebatchtransactioneventhandlerbatchinsertereverymangraphenedbgraphdatabaseserviceneo_j_communityjconfigurationjserverstartnodenotintransactionexceptionrest_graphdbneographytransactionfailureexceptionrelationshipentityneo_j_ogmsdnwrappingneoserverbootstrappergraphrepositoryneo_j_graphdbnodeentityembeddedgraphdatabaseneo_jtemplate neo_j_spatialcypher_neo_jneo_j_cyphercypher_querynoe_jcypherneo_jrestclientpy_neoallshortestpathscypher_querieslinkuriousneoclipseexecutionresultbatch_importerwebadmingraphdatabasetimetreegraphawarerelatedtoviacypherqueryrecorelationshiptypespringrestgraphdatabaseflockdbneomodelneo_j_rbshortpathpersistable withindistancegraphdbneo_jneo_j_webadminmiddle_ground_betweenanormcypher materialised handaling hinted finds_nothingbulbsbulbflowrexprorexster cayleygremlintitandborient_dbaurelius tinkerpoptitan_cassandratitan_graph_dbtitan_graphorientdbtitan rexter enough_ram arangotinkerpop_gremlinpyorientlinkset arangodb_graphfoxxodocumentarangodborientjssails_orientdborientgraphexectedbaasbox spark_javarddrddsunpersist asigned aql fetchplanoriento bsonobjectpyspark_rddrddmatrixfactorizationmodelresultiterablemlibpushdownlineage transforamtionspark_rddpairrddreducebykeymappartitionstakeorderedrowmatrixpair_rddblockmanagerlinearregressionwithsgddstreamsencouter fieldtypes spark_dataframejavarddgroupbykeyorg_apache_spark_rddlabeledpointdatabricksaggregatebykeyjavasparkcontextsaveastextfilejavapairdstreamcombinebykeysparkcontext_textfilejavadstreammappartitionswithindexupdatestatebykeyreducebykeyandwindowrepartitioning
    [Show full text]
  • Java B E a Ns ™” - Ed Ro M an W W W.Theserverside.Co M Page 23 What Else Do We Need
    #1447: Applications Development for Linux/IPF® Joel Berman Itanium Linux Marketing Manager Linux is Linux develop once, deploy often! so me workloads run best on IPF so me workloads run best on IA32 November 17, 2003 page 2 What is the benefit of 64- bits? Big Numbers Big Memory Wide data November 17, 2003 page 3 Intel® Spring Analyst Meeting November 17, 2003 page 4 When to deploy Linux on Itanium? Some Positioning Guidelines Linux on Itaniu m or IA-32? Large data sets Yes (>1 TB)? No Yes M e m ory intensive a p ps (> 4 G B)? No Floating point intensive Yes apps? No Want to port & migrate existing 64-bit Yes apps from a proprietary platfor m ? No Want to deploy multiple O S’s on a single Yes 64-bit platfor m for investment protection? No Itanium IA-32 November 17, 2003 page 5 Market Opportunities & Committed ISVs W o r klo a d s Needs Key ISVs Com mitted High-Performance Technical Heavy use of floating-point operations Adina, MSC.Software, Accelrys, Computing Large data sets Earth Decision Sciences, scientific research 64-bit computing with high memory bandwidth Metacomp Technologies, life & materials sciences and low latency means faster calculations, more Mecalog, Platform Computing, oil & gas in-depth data analysis, and more vivid, precise Linux NetworX, Scyld, Scali, government & defense modeling and simulation – all for quicker time-to- Cluster File Systems, … computer-aided engineering breakthroughs Large Database Applications Load entire databases into memory for faster Oracle9i, Sybase Adaptive data warehousing &
    [Show full text]
  • December 2009 (PDF)
    DECEMBER 2009 VOLUME 34 NUMBER 6 OPINION Musings 2 Rik Farrow SECURITY The Conflicts Facing Those Responding to Cyberconflict 7 DaviD DittRich THE USENIX MAGAZINE Top 10 Web Hacking Techniques: “What’s Possible, Not Probable” 16 JeRemiah GRossman Hardening the Web with NoScript 21 Giorgio maone Correct OS Kernel?­ Proof? Done! 28 GeRwin klein Improving TCP Security with Robust Cookies 35 Perry metzGeR, willia m allen simPson, anD Paul vixie COLUMns Practical Perl Tools: Essential Techniques 44 DaviD n. Blank-Edelman Pete’s All Things Sun: Swaddling Applications in a Security Blanket 51 PeteR BaeR Galvin iVoyeur: 7 Habits of Highly Effective Nagios Implementations 57 Dave JosePhsen /dev/random: A Realist’s Glossary of Terms Widely Employed in the Information Security Arena 62 RoBeRt G. Ferrell BooK reVieWS Book Reviews 65 elizaBeth zwicky et al. useniX NOTES 2010 Election for the USENIX Board of Directors 70 ellie younG USACO Teams Shine 71 RoB kolstaD ConFerences Reports from the 18th USENIX Security Symposium 73 Reports from the 2nd Workshop on Cyber Security Experimentation and Test (CSET ’09) 101 Reports from the 4th USENIX Workshop on Hot Topics in Security (HotSec ’09) 108 The Advanced Computing Systems Association dec09covers.indd 1 10.29.09 10:09:48 AM Upcoming Events Fi r s t Wo r k s h o p o n su s t a i n a b l e in F o r m a t i o n 2n d USENIX Wo r k s h o p o n ho t to p i c s in te c h n o l o g y (su s t a i n IT ’10) pa r a l l e l i s m (ho t pa r ’10) Co-located with FAST ’10 Sponsored by USENIX in cooperation with ACM
    [Show full text]
  • Effective Perl.Pdf
    Effective Perl Programming Second Edition The Effective Software Development Series Scott Meyers, Consulting Editor Visit informit.com/esds for a complete list of available publications. he Effective Software Development Series provides expert advice on Tall aspects of modern software development. Books in the series are well written, technically sound, and of lasting value. Each describes the critical things experts always do—or always avoid—to produce outstanding software. Scott Meyers, author of the best-selling books Effective C++ (now in its third edition), More Effective C++, and Effective STL (all available in both print and electronic versions), conceived of the series and acts as its consulting editor. Authors in the series work with Meyers to create essential reading in a format that is familiar and accessible for software developers of every stripe. Effective Perl Programming Ways to Write Better, More Idiomatic Perl Second Edition Joseph N. Hall Joshua A. McAdams brian d foy Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • A Comparative Case Study on Tools for Internal Software Quality Measures
    A Comparative Case Study on Tools for Internal Software Quality Measures Bachelor of Science Thesis in Software Engineering and Management MAYRA NILSSON Department of Computer Science and Engineering UNIVERSITY OF GOTHENBURG CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden 2018 The Author grants to University of Gothenburg and Chalmers University of Technology the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let University of Gothenburg and Chalmers University of Technology store the Work electronically and make it accessible on the Internet. {A Comparative Case Study on Tools for Internal Software Quality Measures} {MAYRA G. NILSSON } © {MAYRA G. NILSSON}, June 2018. Supervisor: {LUCAS GREN}{VARD ANTINYAN} Examiner: {JENIFFER HORKOFF} University of Gothenburg Chalmers University of Technology Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 [Cover: Generated image based on keywords used in this
    [Show full text]
  • Master's Thesis Maintainability Aspects of the Website
    Die approbierte Originalversion dieser Diplom-/Masterarbeit ist an der Hauptbibliothek der Technischen Universität Wien aufgestellt (http://www.ub.tuwien.ac.at). The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology (http://www.ub.tuwien.ac.at/englweb/). Master’s Thesis Maintainability Aspects of the Website Development Life Cycle carried out at the Information Systems Institute Distributed Systems Group Technical University of Vienna under the guidance of Univ.Prof. Dr. Schahram Dustdar and Univ.Ass. Dipl.Ing. Dr. Clemens Kerer and Univ.Ass. Dipl.Ing. Martin Vasko as the contributing advisors responsible by Markus Krump¨ock Kogelweg 11, 2631 Sieding Matr.Nr. 9571186 Vienna, August 2008 i 0.1 Abstract The development of websites often happens in an “ad hoc” manner. There- fore changes in requirements (for example a graphic redesign) often lead to a complete rebuild from scratch. To make things even worse, websites and web applications are, due to a highly dynamic web, more often object of changes, compared to classical software for the desktop, since they not only consist of software but also content and the rollout of changes is much more easy. The variety of programming languages and technologies for the development of dynamic web applications and the availability of many different frameworks and template engines make things more complicated. Therefore the goal of this thesis is to develop some “best practices” and guidelines for how to design and implement websites for maintainability in order to create websites with a long lifetime without doing complete rebuilds.
    [Show full text]
  • Introduction to Perl
    Introduction to Perl March 8, 2011 by Benjamin J. Lynch http://msi.umn.edu/~blynch/tutorial/perl.pdf © 2010 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Outline • What Perl Is • When Perl Should Be used • Basic Syntax • Examples and Hands-on Practice • More built-in functions • Useful Tools to Manage Your Code © 2010 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Perl Is • a very useful scripting language • a language with many modules available to execute specific tasks in various scientific fields • a language used to generate web content and interact with databases • a language used to parse output text and organize results • a language used to “glue” programs together © 2010 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Perl Is • an interpreted language –Perl scripts/programs do not need to be compiled as a separate step. –After you write a Perl script, you can immediately have a Perl interpreter execute the script. © 2010 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Perl Is • A language with minimal syntactic limitations –A long Perl script can be written on a single line –There is no required indentation for control structures –Perl has dynamically-typed variables, so a string can turn into an integer on the fly. © 2010 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Running a Basic Perl Script • Log in • Open a text editor like vi, pico, or gedit • Enter the 3 lines below and save the file as hello.pl #!/usr/local/bin/perl use strict; print “Hello \n”; © 2010 Regents of the University of Minnesota.
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]