OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help



   RE: [xml-dev] Are people really using Identity constraints specif ied in

[ Lists Home | Date Index | Thread Index ]

Yes.  That is when the horse sense of the human comes into 
play.  One paper I read described the migration away from 
humans-in-the-cockpit to humans-in-the-loop.

Again, when XML was being spec'd, I don't think enough 
people considered real time systems because it didn't 
seem sensible then to consider the WWW as C2 system. 
That is a problem with designing to the story de jure.


From: Joshua Allen [mailto:joshuaa@microsoft.com]

> Some background:  a public safety system can be seen as 
> multiple information ecosystems and technologies that 
> exchange information to prevent crime, solve crime, and 

Yes, people thinking about "systems" often tend to think in terms of a
big machine, and deemphasize the characteristics of a dynamic system of
interacting pieces.  The various and incompatible methods used to hook
all of this stuff together, and the combinatorial complexity leads to
some interesting situations.  The complexity comes in at the
interconnections, and the same complexity that makes it hard to build
the system is what also makes it difficult to stop the hacker who puts
Ted Kennedy's name on the terror watch list three times.


News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS