![]() |
|
![]() |
| Yes. Because whilst the same pressures exist, there's a short number of engineers licensed to actually sign off on a project, and they're not going to jeopardise that license for you. |
![]() |
| I'm confused. Why would they emigrate? You just said "high salaries"?
Moreover, China is hardly low regulation. You would get there and then not be able to check your email. |
![]() |
| It could happen. People have been predicting it for years, and many think that it is only a matter of time. For a vision from 1982 of how it could happen, see: https://books.google.com/books?id=6f8VqnZaPQwC&pg=PA167>
Consider the following scenario. We are living in 1997, and the world of office automation has finally arrived. Powerful computers that would have filled a room in 1980 now fit neatly in the bottom of drawer of every executive’s desk, which is nothing more than heavy glass plate covering an array of keyboards, screens, and color displays. — The Network Revolution: Confessions of a Computer Scientist; Jacques Vallee, 1982 |
![]() |
| > in those cases, the unit test might not catch anything because the spec is wrong!
That's why you have three different, independent parties design everything important thrice, and compare the results. I'm serious. If you're not convinced this is necessary, just take a look at https://ghostwriteattack.com/riscvuzz.pdf. (Your other suggestions are also necessary, and I don't think that would be sufficient.) |
![]() |
| > they refused help from both Crowdstrike and Microsoft
Link? Anyway I find it highly amusing that Delta is seeking damages from Microsoft even though Microsoft had nothing to do with it. |
![]() |
| That’s kinda what aws tells people when its services go down. If your backend can’t take a short outage without weeks of recovery then it’s just a matter of time. |
![]() |
| > It’s an argument that hits home at any bigcorp where the execs are entertaining the thought of suing CrowdStrike
Maybe? Discovery is a core element of any lawsuit. It’s also a protected process: you can’t troll through confidential stuff with an intent to make it public to damage the litigant. If anything, I could see Delta pointing to this statement to restrict what CrowdStrike accesses and how [1]. (As well as with the judge when debating what gets redacted or sealed.) [1] https://www.fjc.gov/sites/default/files/2012/ConfidentialDis... |
![]() |
| Right, the risk structure presumably protects the vendor if just one customer sues, even if the amount of damages claimed is astronomical. Because vendors try to disclaim bet-the-company liability on a single contract.[1] The vendor's game is to make sure the rest of the customer base does not follow this example, because as noted in the linked article while vendors don't accept bet-the-company liability on each contract (or try not to), they do normally have some significant exposure measured in multiples of annual spend.
[1] https://www.gs2law.com/blog/current-trends-in-liability-limi... |
![]() |
| The assumption is not only perfectly valid, it's the very reason such contracts are signed in the first place! It's what companies want to buy, and it's what IT security companies exist to sell. |
![]() |
| > I was the CEO - I'd accept any help I can get while you have the benefit of the public opinion
I’d reserve judgement. Delta may have been cautious about giving the arsonists a wider remit. |
![]() |
| Availability (or not) of insurance coverage is surprisingly effective in enabling or disabling various commercial ventures.
The penny dropped for me whilst reading James Burke's Connections on the exceedingly-delayed introduction of the lateen-rigged sail to Europe, largely on the basis that the syndicates which underwrote (and insured) shipping voyages wouldn't provide financing and coverage to ships so rigged. Far more recently we have notions of redlining for both mortgage lending and insurance coverage (title, mortgage, property, casualty) in inner-city housing and retail markets. Co-inventor of packet-based switching writes of his parents' experience with this in Philadelphia: "On the Future Computer Era: Modification of the American Character and the Role of the Engineer, or, A Little Caution in the Haste to Number" (1968) <https://www.rand.org/pubs/papers/P3780.html> (footnote, p. 6). Similarly, government insurance or guarantees (Medicare, SSI, flood insurance, nuclear power plants) has made high-risk prospects possible, or enabled effective services and markets, where laissez-faire approaches would break down. I propose that similar approaches to issues such as privacy violation might be worth investigating. E.g., voiding any insurance policy over damages caused through the harmful use or unintended disclosure of private information. Much of the current surveillance-capitalism sector would instantly become toxic. The principle current barriers to this are that states themselves benefit through such surveillance, and of course the current industry is highly effective at lobbying for its continuance. |
![]() |
| I assume the argument is that if they can show negligence in their IT practices, then the $500 million in damages can't be all attributed to CrowdStrike's failure. |
![]() |
| "In Alaska, both non-emergency and 911 calls went unanswered at multiple dispatch centers for seven hours.
Some personnel were shifted to the centers that were still up and running to help with their increased load of calls, while others switched to analog phone systems, Austin McDaniel, state public safety department spokesperson, told USA TODAY in an email. McDaniel said they had a plan in place, but the situation was "certainly unique.” Agencies in at least seven states reported temporary outages, including the St. Louis County Sheriff's Office, the Faribault Police Department in Minnesota, and 911 systems in New Hampshire, Fulton County, Indiana, and Middletown, Ohio. Reports of 911 outages across the country peaked at more than 100 on Friday just before 3 a.m., according to Downdetector. In Noble County, Indiana, about 30 miles northwest of Fort Wayne, 911 dispatchers were forced to jot down notes by hand when the system went down in the early morning hours, according to Gabe Creech, the county's emergency management director." https://eu.usatoday.com/story/news/nation/2024/07/19/crowdst... I mean, even if the dispatch could handle it in some sense, certainly it was a problem, that might have increased average time to site for the ambulance or fire fighters. I've haven't seen any report of any direct death. |
![]() |
| Apropos of anything else, “emergency downtime procedures” do not guarantee the same level of care as normal operations. I’ve worked in and out of hospitals as a critical care paramedic for years. |
![]() |
| I would find it more useful if liability here we're attributed to the need to purchase such draconian tools. Certifications that require it and C levels who approve it. We would be better by it. |
![]() |
| Engineering safety culture is built on piles of bodies and suffering unfortunately. I suspect in software the price of failure is mostly low enough that this motivation will never develop. |
![]() |
| > but so far not much in the way of lawsuits
It hasn't been that long? The situation might be that there hasn't been sufficient time to yet gather evidence to commence lawsuits. |
![]() |
| > If Rome wrote an engineering manual, it would still be quite valid today.
“How to conduct water efficiently: first, collect a whole bunch of lead. Then construct pipes from said lead…” |
![]() |
| Gravity is not constant, instead it varies by location and by height.
Bubble sort however, is always bubble sort. A similarly large portion of what engineers do with in software is constant |
![]() |
| It sounds as if you're saying that these were bad things because they were always bad. And maybe they were. But we might never have any software at all if we only had good software. |
![]() |
| This is so wrong
Most suspension bridges were built without a theoretical model, because didnt have one yet. Theory caught up much later. Innovation often happens in absence of Theory. |
![]() |
| Can only do so much when idiot CTOs take their advice from CTO summits, consultants with their own perverse incentives, and of course random conferences |
![]() |
| Context is everything. They had every chance to own up from the day of until now. A ‘lulz haha we goofed up’ in a nerdy security conference doesn’t seem like the right place or time. |
![]() |
| Apologies don’t mean anything from a c-level suit (George Kurtz) that has known history of causing outages. The culture at crowdstrike of being accountable is a facade. |
![]() |
| This comes across as incredibly tone deaf. People suffered degraded medical care, billions lost in the airline industry, billions more lost in productivity, and ultimately its time that people cannot get back. Yet these clowns are accepting joke awards as if this is something to hang on your trophy wall.
This is actually a c-level executive at ClownStrike, by the way. > Michael Sentonas serves as President and is responsible for CrowdStrike’s product and go-to-market functions, including its sales, marketing, product & engineering, threat intelligence, privacy & policy, corporate development, corporate strategy and CTO teams https://www.crowdstrike.com/about-crowdstrike/executive-team... The whole C-level executive suite at ClownStrike needs to go. This company needs a real CTO like Jeremy Rowley. Although I suspect a good person like him would never join the ranks of ClownStrike |
![]() |
| They understand who’s buying their product. It’s not the information security teams who cleaned up this mess, but rather the operations and end user compute teams. |
![]() |
| Shhh, the people here want blood.
BTW, did you know that there's an endless stream of "satisfying" drama on YouTube? I heard that Mr. Beast is finally in some hot water! |
What is the situation? Are the licenses so ironclad that customers have no recourse? I could understand this in the case of consumers who might suffer minor inconvenience as their home PC is out of service for a few hours/days but it seems totally unacceptable for industries to accept this level of risk exposure.
This is one of the big reasons civil engineering is considered such a serious discipline. If a bridge collapses, there’s not only financial liability but the potential for criminal liability as well. Civil engineering students have it drilled into their heads that if they behave unethically or otherwise take unacceptable risks as an engineer they face jail time for it. Is there any path for software engineers to reach this level of accountability and norms of good practice?