Overall, we'll have... 3 types of storage (1) Source (2) Network (3) Workspace 3 types authentication (1) Access to source (2) Access to network (3) Access to workspace (handled by UI) 2 types of connections/requests (1) Opening of network (mounting of volume) (2) Execution of source Correct? Jeff -- +----------------------------------+ | J.W. Bizzaro | | | | http://bioinformatics.org/~jeff/ | | | | BIOINFORMATICS.ORG | | The Open Lab | | | | http://bioinformatics.org/ | +----------------------------------+