* Posts by CaitlinBestler

25 posts • joined 6 Oct 2011

Five things you need to know about Microsoft's looming Windows 10 Spring Creators Update

CaitlinBestler

Chrome OS

Who came up with the list of OSs? And in what decade?

Chrome OS is now as common as Mac OS, and *way* ahead of any BSD, let alone the Amiga.

Bruce Perens wants to anti-SLAPP Grsecurity's Brad Spengler with $670,000 in legal bills

CaitlinBestler

But your honor they couldn't possibly have spent that much!

After all, consider the idiots who were suing them.

Amazon told to repay €250m in 'unfair state aid' from Luxembourg

CaitlinBestler

Rule of Law

I am not doubting the findings that Ireland and Luxemburg granted excessive tax reductions to Amazon and Apple.

However, I am disturbed by this idea that a commission can just retroactively impose taxes, even if the bills are being given to companies who can afford it.

If you paid your taxes in year X and the government you paid them to agreed that you had paid in full then it should require a trial where the taxpayer is found guilty of having deliberately misled the government in some way.

If the EU wants to find Luxembourg guilty and asses Luxenbourg for the taxes that should have been collected, that would make sense. But this is telling all companies doing business in the EU that they

can never know what their true tax rate is, the EU can change the rules ex post facto.

More data lost or stolen in first half of 2017 than the whole of last year

CaitlinBestler

Security Is Not Hopeless

Whody en you listen to the breached companies lament you would get the impression that cyber-security is impossible.

But consider for a moment that we do not have routine electronics looting of bank accounts, or of confidential files have by law firms for clients. Somehow *those* records can be kept secure.

Nobody designs their bank accounts so that a single password can abscond with the entire assets of a company, but apparently that is all it takes to steal all of the data held about consumers. But that's understandable, cash has real value that needs protecting.

FTC wants AT&T to kick in $4bn to help balance US budget. Why? Some dodgy ads or something

CaitlinBestler

A Cancellation Fee of $20 per month?

That's not allegedly misleading, that's theft plain and simple.

A one time $20 cancellation fee might have been reasonable, and something a consumer

might reasonably expect. But no customer would reasonably expect tht cancelling a service

would not reduce their bill.

WannaCry-slayer Marcus Hutchins 'built Kronos banking trojan' – FBI

CaitlinBestler

Why not wait and extradite?

What was so urgent that they had to arrest him at the airport?

Did they have any reason to doubt that Britain would extradite him after they issued a

throoughly vetted indictment?

This at the minimum suggests to me that the prosecutors are not confident in their case.

Steve Bannon wants Facebook, Google 'regulated like utilities'

CaitlinBestler

Confusing Natural Physical Monopoly With Convenient Oligopoly

The justification for Common Carrier regulations is that it would never make sense to build two or more parallel replicas of physical structures. The "Free Market" is not dynamic enough to build a second railroad into a town when the first railroad owner could just end their overpricing as soon as the second railroad was in place. Rather than letting these common carriers have a natural monopoly we regulate them.

The left has been contending that ISPs have a natural monopoly on providing broadband service, which therefore should be regulated as a common carrier. Perhaps Mr. Bannon has forgotten that the Republican party is against this classification. I think it makes sense, but I can see this as an area of legitimate debate.

I can even construct an argument that the Internet has created a new type of natural monopoly, where the advantages of having over 50% of the market make it impossible for anyone to compete with you to ever get a larger share. The argument is that the value of the data that Amazon/Google/Facebook can gather cannot be replicated.

But whether this creates a monopoly, as opposed to an oligopoly, is still open to debate. In any case there is absolutely no rationale for protecting the ISPs from being regulated as common carriers and then regulating the Google/Facebooks as being common carriers - other tha the political parties they choose to donate to.

Nimbus Data dedupe patent

CaitlinBestler

Totally obvious

I agree with the first comment, Claim 1 is obvious that I would not have even

considered it to be a good answer to a computer science quiz on "how do

you index a large binary key?"

Intel's non-volatile memory is firmly in non-growth territory

CaitlinBestler

News?

SInce when is it news that revenue from an existing technology is declining?

Judge rules FBI can hack any time, any, place, anywhere

CaitlinBestler

Re: Planting of Evidence?

That is exactly the grounds on which some lawyer will demand the right to review the NIT code.

There is a very simple test that judges should be applying to these cases. If law enforcement is

doing something that would get someone else arrested then they need a warrant.

I don't have the right to sabotage any web client that visits my site with malware. Neither does

the FBI. Requiring a warrant limits the scope and volume of such infections, and therefore cuts

the risk of collateral damage to lhe computers of law abiding citizens.

Admin fishes dirty office chat from mistyped-email bin and then ...?

CaitlinBestler

you only read enough to identify that this was no work related - honest

I believe the correct response is to return the email to the sender, indicating that you had only read

enough to identify that this was not work related.

Then remind the sender that personal messages should be sent using personal email.

Nobody will believe that you didn't read the whole email, but the message that you don't

appreciate having personal stuff like this get misdirected to you will have been delivered.

Torus: Because the world needs another distributed storage software solution

CaitlinBestler

There is still room for a new solution - Torus isn't a new solution.

I was struck reading there very sparse technical detail that *everything* described has already been done and that it really has very little relationship with containers.

No objections to object stores: Everyone's going smaller and faster

CaitlinBestler

Object Storage is not NECESSARY for smaller clusters.

Small clusters can use centralized metadata to manage storage very quickly.

Centralized metadata can support both POSIX and object semantics.

But when you scale up the metadata must be distributed, making efficient support of POSIX untenable.

That said, there is no inherent reason for "file servers" to be faster than "object servers".

The metadata operations required to put a new version of a 10 MB document are actually

less demanding with object storage than with file storage. The only advantage file APIs have

is their familiarity to developers and the maturity of the code base implementing POSIX APIs.

Neither the existing code or the APIs will scale to the degree that object APIs allow, however.

You keep using that word – NVMe. Does it mean what I think it means?

CaitlinBestler

Re: This could be a good thing..

RDMA security relies on network level security *and* the local interface only enabling access to memory

as explicitly granted by the user. Both InfiniBand and iWARP APIs require this. The RDMA device does

not have access to any portion of physical memory it wants.

I would be surprised if someone designed a new API which did not match this security.

Applications can of course make application layer security mistakes. An RDMA interface is only

more vulnerable to the extent that eliminating bottlenecks would allow the applications to do their

work, and their mistakes, faster.

Panama Papers hack: Unpatched WordPress, Drupal bugs to blame?

CaitlinBestler

Simpler yet - Just Encryt

A law firm should not store client files in unencrypted format.

You should have to retrieve them and then supply a pass-phrase on the receiving computer.

Security is actually simple, you just have to take it seriously.

All-American Apple challenges US gov call for iOS 'backdoor'

CaitlinBestler

Re: I guess we'll find out how good Apple designers are or are not

The real question is whether Apple has careless left a hole in their security.

You should not be able to update the firmware without entering the password or doing a full

factory reset first. If Apple's firmware allows itself to be bypassed then the "guess limit" never

really did any good anyway. Apple should have been allowing longer PINs to make brute force

attacks infeasible even without this firmware assist.

But forcing Apple to disclose this detail about potential flaws in its designs on the theory

that this *might* unlock information that is useful to the FBI strikes me as a real stretch.

If Apple confirms that such an attack is possible then hackers will inevitably figure out how it is done.

Meanwhile, I doubt that an iphone has unbreakable *physical* security. The FBI, on its own dime,

should be able to *clone* the memory and then just start a series of 10-try run until they've tried

all 10,000 PINs. They do not need Apple's help to do that.

SwiftStack's multi-modal 'we're so much better than you' FUD play

CaitlinBestler

Files are not static

The slickest piece of evasion here is talking about files as though they were the same thing as Objects, just with different metadata attributes.

The fundamental difference is that files are updated very differently than how objects are updated.

Objects are put, as a whole, in a conceptual instant.

Files have a series of writes applied at different offsets, each conceptually at one instant. But there are

complex rules governing when each of those updates can and may be visible to other reading the file.

If you access files as though they were object, which most file access does, then it is easy to map a file to an object. The only difficulties come when you play games like renaming hierarchical directories.

Figuring out exactly how much of the file system semantics to support with objects is a tricky issue. Most end users do not yet fully understand the tradeoffs so it is not surprising that we do not know their preferences yet.

This sort of double-talk from Swiftstack does not help the process.

Promoting placing its clumsy ring on flash is particularly pathetic. It's a data structure that is not needed; its main impact is to delay when the cluster responds permanently to changed membership. Optimizing your achilles heel does not make it a feature.

SwiftStack CPO: 'If you take a filesystem and bolt on an object API'... it's upside down

CaitlinBestler

Metadata is stored somewhere, preferably at one layer not two.

A file or object storage system store both metadata and data.

Having the storage server, or even a "smart" drive, store the metadata related to precise locations make sense. But it is hardly a new concept.

But a full local file system has a lot of naming metadata, which is handled by the object cluster. Writing that redundant metadata wastes CPU power, disk space and disk writes. It also creates more links that can be broken, with no way to use the redundant information for repair. It's a lose-lose proposition.

Using a pre-existing local file system may be a development trade-off worth considering, but it is far from something to boast about.

IETF's older white men urged to tone it down

CaitlinBestler

Re: Important RFCs by women ?

I've already posted a comment that I think that the IETF's tone is far superior to other standards bodies and especially to most open source projects. So it really isn't a high priority target for improving things.

But, I have to respond to this. Implying that being listed as an RFC author implies merit is nonsense.

And yes, I am an RFC author.

But my work on RFCs represents a small part of my technical work. What percent of your work becomes published in an RFC depends on a wide variety of factors, such as who your employer is. None of these factors are correlated with how good of a designer and/or writer you are.

People (both men and women) are included or excluded from being listed as an author for political reasons. I know I was included as an author on some I-Ds from relatively light contributions, but only acknowledged on the RDMA MPA draft despite making major contributions. This is probably all very similar to the process of who gets listed as an author on a research paper. There are many factors, and the number of RFCs is still a bit too small to be proving things by statistical analysis.

CaitlinBestler

Barking up the wrong tree.

While no technical body is perfect on these issues, my experience has been that the IETF gets closest to functioning as a true meritocracy. I've been involved in several standards groups, including IETF, and several open source projects. The IETF is far ahead on the tone of discussions and fairness.

There is some amount of "Boy's Club", yes. But compared to open-source communities it is nothing.

If we could get the discussions on most open-source projects to be as respectful and professional as those in the IETF we could declare victory for the decade.

Block storage is dead, says ex-HP and Supermicro data bigwig

CaitlinBestler

Re: Object can be faster, but UDP?

Internal traffic within a storage cluster is carried over a VLAN, frequently configured to use no-drop Ethernet. This is how FCoE works. Everything that works for FCoE works for UDP.

You still need to confirm successful transfer, but that is true with connection-oriented transports as well.

16 or 32 bit protection is totallly inadequate when trying to manage Petabytes of data.

Custom congestion control building upon negotiated reservations can start the transfer at full wire speed. You cannot do that with any connection-oriented transport.

Smartmobe brain maker Qualcomm teases 64-bit ARM server chip secrets

CaitlinBestler

The vast majority of datacenter workloads will run well on ARM cores.

The critical question with any of these designs is how well they have integrated the Ethernet interface.

Having fast enough processing is meaningless if poor bus design adds to per-frame latency.

Aspera high speed file transfer: Let the cloud protocol wars begin

CaitlinBestler

Re: In two words: reliable multicast

The bottom line is that there is very little that can be done to optimize WAN transfers that cannot be done with an improved TCP congestion algorithm.

Within a datacenter, or in-house corporate intranet, multicast can indeed be a verey useful solution.

Not only do you get the obvious multiplier effect when replicating, multicast also enables dynamic load balancing when selecting targets.

Tachyon Nexus theorises on ultra fast storage

CaitlinBestler

Replication is the only protection from network splits

A journal can only help you recover if your network is intact.

If this scheme only leaves a single journal and a single life copy of the new data I don't see how it can be robust during network failures.

Deduplication: a power-hungry way to streamline storage

CaitlinBestler

Not All Dedup is the Same

When dedup in integrated into the file system (such as ZFS, or apparently now Windows 8) there is no "dedup equipment" to be separated from the files. Any disk array is meaningless if you don't have a copy of the file system that filled it in.

When you are talking about "one corrupt database" ruining your entire set of stored data you are assuming that there is a "dedup database" that is somehow separate from and not integrated with the file system directories themselves.

Of course you file system directories need to be sufficiently robust,and that is something you should kick the tires on with any FS vendor.

The other issue is whether dedup is necessary. The justification for saving raw disk space loses some appeal every year. But in the long run, dedup will also reduce network traffic. This is already true to the degree that backup traffic can be reduced, and will be more as distributed dedup algorithms become more widely deployed.

Biting the hand that feeds IT © 1998–2019