For years, the Security Tango…..

Home Forums The Show Discussion For years, the Security Tango…..

This topic contains 1 reply, has 2 voices, and was last updated by  RChandra 1 year ago.

Viewing 2 posts - 1 through 2 (of 2 total)
  • Author
    Posts
  • #4484

    Rev 2
    Participant

    I wonder whether the Soundbytes stars actually look at these forums. Anyway,…..

    For years and years, the Security Tango has been a wonderful and useful and generous gift to all of computerdom.

    For years and years, it has been called a Tango because the steps are intended to be done in correct sequence.

    And for years and years, the sequence of actions in Step Four has been different from the sequence of actions in Step Five, which purports to be a repetition of the above.

    And you’re going to reply, “It doesn’t matter”, which prompts the question: If the whole idea of doing this is to do it in the correct sequence, and it doesn’t matter what the correct sequence is, then what’s the point?

    #4630

    RChandra
    Participant

    Some things are not dependent on the others. If they could be done efficiently in parallel, they probably could be. The authors had to pick an order to list them, and if they say it doesn’t matter, I suppose it could have been written in the other order.

Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic.

Comments are closed.