<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Robust Design: Fault Tolerance – Nature vs. Malicious</title>
	<atom:link href="http://www.embeddedinsights.com/channels/2010/06/01/robust-design-fault-tolerance-%e2%80%93-nature-vs-malicious/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.embeddedinsights.com/channels/2010/06/01/robust-design-fault-tolerance-%e2%80%93-nature-vs-malicious/</link>
	<description>Shedding Light on the Hidden World of Embedded Systems</description>
	<lastBuildDate>Mon, 28 Jul 2014 16:18:37 -0400</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0</generator>
	<item>
		<title>By: Anonymous @EM</title>
		<link>http://www.embeddedinsights.com/channels/2010/06/01/robust-design-fault-tolerance-%e2%80%93-nature-vs-malicious/#comment-879</link>
		<dc:creator>Anonymous @EM</dc:creator>
		<pubDate>Mon, 14 Jun 2010 21:39:07 +0000</pubDate>
		<guid isPermaLink="false">http://robert.blogs.embeddedinsights.com/2010/06/01/robust-design-fault-tolerance-%e2%80%93-nature-vs-malicious/#comment-879</guid>
		<description>There are so many free services offered by the security firms (BlackHat.com, web platform people, any generalist independents left, etc.) it seems odd to call it without scope (e.g. BOP service maintenance in the Gulf of Mexico.)

Then again, use cases and rude power management schemes (as for compromised servers) are nice to scope things by.
If there&#039;s no space affect (0G physiology) to the Captain&#039;s voice, either they&#039;re not waiting for orbit to start payload missions or that&#039;s not her directly.
If the user replaces battery #4 with a museum piece, &#039;normal operation&#039; is out, but compost and mixed drinks are kind of normal electrolytes.
Is that Febreeze or fuming nitric acid?
When should the requester offering barfight functionality be presented?
Is the compromised honeypot core-dumping and resetting in a controlled fashion?</description>
		<content:encoded><![CDATA[<p>There are so many free services offered by the security firms (BlackHat.com, web platform people, any generalist independents left, etc.) it seems odd to call it without scope (e.g. BOP service maintenance in the Gulf of Mexico.)</p>
<p>Then again, use cases and rude power management schemes (as for compromised servers) are nice to scope things by.<br />
If there&#8217;s no space affect (0G physiology) to the Captain&#8217;s voice, either they&#8217;re not waiting for orbit to start payload missions or that&#8217;s not her directly.<br />
If the user replaces battery #4 with a museum piece, &#8216;normal operation&#8217; is out, but compost and mixed drinks are kind of normal electrolytes.<br />
Is that Febreeze or fuming nitric acid?<br />
When should the requester offering barfight functionality be presented?<br />
Is the compromised honeypot core-dumping and resetting in a controlled fashion?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: A.S. @EM</title>
		<link>http://www.embeddedinsights.com/channels/2010/06/01/robust-design-fault-tolerance-%e2%80%93-nature-vs-malicious/#comment-878</link>
		<dc:creator>A.S. @EM</dc:creator>
		<pubDate>Mon, 14 Jun 2010 21:38:33 +0000</pubDate>
		<guid isPermaLink="false">http://robert.blogs.embeddedinsights.com/2010/06/01/robust-design-fault-tolerance-%e2%80%93-nature-vs-malicious/#comment-878</guid>
		<description>Looking forward to the series.</description>
		<content:encoded><![CDATA[<p>Looking forward to the series.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
