Version 16 (modified by nejucomo, at 2012-10-30T19:32:02Z) (diff) |
---|
Weekly Meeting
There is a weekly conference call using Google Hangout. The agenda is set prior to each meeting and is focused on topics directly relevant to Tahoe-LAFS development. The connection URL is posted on this page and IRC a few minutes before the meeting.
Who | Core developers or interested community members |
---|---|
What | Dev Topics Meeting |
When | Thursdays 15:30Z (8:30am Pacific); was: |
Where | Google Hangout, IRC fallback (see below) |
Why | Voice/video interaction complements IRC/mailing list |
How | See Agenda below |
Etiquette
- Strive to follow the established agenda.
- Participants may have high latency; if you'd like to speak, say "turn" or raise your hand and wait for silence.
- Be respectful.
- Use IRC for textual chat *not* the hangout chat feature.
Agenda
Upcoming:
Note: The meeting time and date have changed. See the table above and double check the date here:
- 2012-11-01: Garbage collection: use cases and protocols.
Proposed Future Topics
- Proof-of-Retrievability review of a paper draft Zooko will distribute. (was scheduled:
2012-10-30)
- Rainhill design review which David-Sarah will distribute; call for outside crypto expert reviewers. (was scheduled:
2012-11-06)
Notes / Archives
2012-10-23
Topics: Ticket #1240, Tahoe-LAFS birthday party, future agendas.
Attendees: Zooko, David-Sarah, amiller, ambimorph, nejucomo.
Concise summary:
- #1240 debug session - Incorrect caching logic suspected.
- Tahoe-LAFS birthday party - Saturday, 2012-10-27 at 23:00z - Each locale connects with a projector + google hangout.
- Future agendas - next week, Proof of Retrievability paper review; two weeks out, Rainhill review with outside crypto reviewers.
Finely detailed notes in MeetingNotes_2012_10_23
2012-10-16
Topics: Proof-of-Retrievability
Attendees: Zooko, David-Sarah, nejucomo
From IRC, Zooko summarizes (edited for spelling):
- "The reason we can do better than the previous state of the art is that we've expanded the setting to multiple servers and multiple clients, which opens up new defenses for the good guys against Ponda Baba."
- "It is useful way to think, to start with the completely safe camouflaged download protocol: just run your normal verifier, but tell it to save what it gets, and then to talk about how to make it faster without breaking camouflage."
- "There are two dimensions of how you might be able to make it faster: the dimension of multiple downloader/verifiers and the dimension of multiple servers."