Large Scale Web Search Engine Design Basics And Challenges
Tuoshi Lu, Yahoo!, Sunnyvale
Search engine technologies have been around for a long time. It's not too hard to build an engine for an enterprise. Databases can also function as search engines. However, to build a search engine at web scale that can support millions of users and search through billions of web pages with sub-second performance is a huge challenge. This challenge is compounded by an open Internet with unstructured information and a very diversified user community. This talk examines the technologies behind modern search engines and the issues search engine designers face.
F2Id Solution, Peace Of Mind For Web Access
Helen Pai, Douglas Felder, Ernesto Frutos, F2ware, San Jose
The explosive growth of the Internet and World Wide Web have made the browser the default access tool of choice for enterprise, financial and banking applications. Cyber criminals intent on stealing your identity continue to devise attacks, such as phishing, man-in-the-middle, and pharming to defeat user ID and password security measures. F2ware has developed a unique technology to greatly increase the security of browser-based enterprise access in the area of user authentication. This technology is low cost, easy to implement with no software downloads or tokens required. F2ware will introduce their F2ID system for B2C and B2B markets the first quarter of 2009.
Storing Stuff Forever
Mary Baker, Hewlett-Packard, Palo Alto
Many enterprises, organizations and individuals find themselves needing to preserve large volumes of quickly accessible digital content indefinitely into the future. The costs of doing so are often prohibitive, and even when money isn't a problem, lots of traditional storage systems and processes aren't designed with good ideas about how to safeguard these digital assets over long time periods. We examine threats to long-lived data from an end-to-end perspective, taking into account not just hardware and software faults but also faults due to people and organizations. We present a simple model of long-term storage failures that helps us reason about various strategies for addressing some of these threats. Using this model we are building tools that exploit the most important strategies for increasing the reliability of long-term storage: detecting latent faults quickly, automating fault repair to make it cheaper and faster, and increasing the independence of data replicas.
Dns Summer Of Fear 2008: How I Learned To Stop Worrying And Love 16 Bit Nonces
Paul Vixie, Internet Systems Consortium, Redwood City
In February 2008 I got a phone call from a guy who said he'd found a way to insert any data he wanted anywhere in the DNS. I spent the next six months trying to coordinate a global patch event. Now this fantastic story of heroism and buffoonery can finally be told.
Implementing Enterprise Application Architecture Design Patterns: A Real World Example
Greg Scull, FCMAT/California School Information Services, Sacramento
This talk is a review of some of the core concepts behind a few frequently used enterprise design patterns.The concepts are Inversion of Control, Dependency Injection, the Factory Pattern, the Data Access Pattern, and Transfer Objects. The purpose of the talk is to examine real world examples of how and why these patterns are important in enterprise application architecture.