Posted on 03/09/2010 7:05:31 AM PST by dangerdoc
!
bttt
Increase the PHYSICAL security of the DataCenter
Of course this requires physical access, but still...
I didn’t know pedophile news was pushed here
Huh?!?!?
“Increase the PHYSICAL security of the DataCenter”
yes.... and no.
You’d also need to unplug from the outside world to prevent encrypted files being copied and cracked offsite. Unplugging from the outside world kind of defeats the purpose of having a datacenter in the first place.
Believe me, physical security is patchwork for our world’s datacenters. As a DC engineer, I can personally attest to the need for physical security in a DC.
I wonder if they have basically invented a non-deterministic Finite State Machine?
http://en.wikipedia.org/wiki/Nondeterministic_finite_state_machine
http://en.wikipedia.org/wiki/Deterministic_finite-state_machine
WTF?
In before the bunny with a pancake picture shows up.
Or maybe more to the point they found a subclass of P = NP?
In this theory, the class P consists of all those decision problems (defined below) that can be solved on a deterministic sequential machine in an amount of time that is polynomial in the size of the input; the class NP consists of all those decision problems whose positive solutions can be verified in polynomial time given the right information, or equivalently, whose solution can be found in polynomial time on a non-deterministic machine.[6] Arguably the biggest open question in theoretical computer science concerns the relationship between those two classes:
Is P equal to NP?
In a 2002 poll of 100 researchers 61 believed the answer to be no, 9 believed the answer is yes, and 22 were unsure; 8 believed the question may be independent of the currently accepted axioms and so impossible to prove or disprove.[7]
Sounds like you need to have physical possession of the computer to do this.
A non-birthcertificate-device is reportedly here to change all that.
If you have no physical security, you have no security.
Period.
?????????????????????
Security consists of many components, all of which are important. Most security losses are due to internal sources which are approved thru the physical controls
.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.