The Collaborative Virtual Workspace
You walk down the hallway and go into the design room. It's as hectic here as always; stuff is lying all over the floor. Alex, the lead architect, is here with two other designers, Brad and Lynn. They have been discussing the architecture for the new project.
“I think we've almost got it,” says Alex, “take a look at our design.” He hands you a document, which you duly examine.
“Not too bad,” you reply, “but you might want to look at something.” You walk over to the whiteboard and draw out a rough sketch. Brad sees where you're heading, grabs a marker, and adds some components to your drawing.
Lynn notices a problem and says “We may have some problems implementing the security interface with that. Let me give Rachel in security a call.” She grabs the phone, and after a quick conversation, tells everyone the impact the security team sees from this implementation.
“Okay,” you say, “sounds like you guys are on the right track. I'll carry this preliminary design over to the programmers and get a rough estimate on the time they'll need to implement it.” As you walk out, you notice your beeper has a message from your secretary reminding you of a meeting at 3:00 with the division head.
Activities like these occur in work environments every day; however, in this scenario the individuals involved never physically moved. In fact, one person sits down the hall from you, another works at a remote site, and the third was at home. Yet everyone was able to interact as though individuals, objects and documents were physically colocated.
As computers move to take a dominant position in the workplace and at home, the interactions between people change significantly. Instead of gathering around a water cooler or at a small cafe, meetings have moved to the Internet. However, with this change of venue come certain restrictions. No longer can you read a person's body language or infer meanings from the tone of someone's voice. With many Internet collaboration tools, such as Internet Relay Chat (IRC) or instant messengers, you can only interpret the words others type.
The project on which I currently work, the Collaborative Virtual Workspace (CVW), looks to add more meaning to computer-based social interactions. Instead of relying solely on spoken words, CVW adds actions, audio and video, and a more descriptive virtual environment to social settings. Additionally, users within the CVW environment can create and pass around various artifacts, such as documents and pictures. This is because CVW implements a persistent storage mechanism in conjunction with the environment. Anything created within CVW can be saved for others to see whenever they like.
Best of all, CVW is freely available. To further encourage innovation in collaborative systems, The MITRE Corporation has made CVW an open source software product. By disseminating CVW in this manner, different communities can begin to experiment with and understand synchronous computer-based collaboration. We believe collaboration systems such as CVW will continue to evolve, and the Internet community will have much to offer.
Let's look at where CVW comes from and what makes up our virtual environment.
From it's inception in 1994, CVW was built on a client-server architecture. At the heart of the server is a MUD, Object-Oriented (MOO) from Xerox PARC (ftp://ftp.lambda.moo.mud.org/pub/MOO/). Once only within the domain of dungeons and dragons players, MUDs and MOOs have progressed to incorporate numerous social settings. Although providing a very descriptive environment, MOOs present one challenge to the average computer user today—they are predominantly text driven. With no fancy graphic interfaces or elaborate designs, a user simply connects to a server using a MOO client program or telnet, logs in and begins interacting within the environment.
One of the true strengths of a MOO server is its extensibility. The server contains an object-oriented programming language called “MOO”. Using the MOO language, programmers can create new rooms, implement new actions, and provide various means of interacting with others within the virtual environment. Add the ability to allow a large number of people to connect simultaneously, and it's easy to see why MOOs have become a popular collaboration environment.
If you download the LambdaMOO source code and run it on your Linux box, you'll notice not much exists in that environment by default. Each MOO administrator must either build a new virtual environment, or obtain the code someone else has written.
CVW's MOO server already contains the code for our virtual environment. We have extended our MOO server in order to create a large building, the floor plan of which displays graphically in the client. Although this tightly couples the client to a CVW server exclusively, it does provide a more intuitive interface for new users. The building consists of several floors, each with seven rooms and various other meeting places (hallway, lobby). These can be modified to suit any group's needs.
Using a room-based metaphor provides two other distinct advantages. First, session management can be logically partitioned. Each room will administer the particular session requirements for the users in that area. By having this controlled at the server side, any clients connecting to the server do not have to configure their audio, video or document settings to communicate with the other users. Secondly, security can likewise be easily controlled. As each room may implement an individual access control policy, private meeting places can be created. Again, this provides a very intuitive means of implementing security—if the server denies a user access to a room, they usually understand they don't have permission to enter that area.
In addition to the MOO server, we incorporated document persistence into our collaboration system. This allows CVW to encompass the role of a collaboration framework. If individuals meet to discuss a topic, they may create documents or graphics using whatever tools that may be available to them (document editors, drawing programs). Using CVW, users can import these external documents and allow others to view or edit them. Although MOOs do allow users to create objects, these are normally simple text documents that can't be easily exported to other external applications. This persistence capability allows for asynchronous collaboration—users may enter or leave the room whenever they desire, but they would still have access to the work being performed.
Since the addition of persistence incorporated a significant change to a MOO environment, we implemented this functionality as a unique server process, the Document server. This server does not have to run on the same machine as the MOO server, but it should have enough disk space available to store all the documents created by the users. Storage of documents is quite simple—basically, a flat database directory. To date this has proven sufficient, but a large implementation of CVW may want to look to re-engineer this process.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide