Rejected RFC
Previously posted at http://joel.westside.com/wsContentPublisher/story.view?RowId=9
User Experience Working Group A. Mukerji Request for Comments: nnnn J. Aufrecht Category: Informational April 1, 2001 Extensions to Standard Enumeration of User Output Functions Status of this Memo This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The traditional enumeration of user excretory function, "Number One" and "Number Two," fails to address the entire function domain. This memo extends current practice by defining functions Three through Ten. For backwards compatibility (especially as regards Number Two), new names and subtypes for Function Numbers One and Two are proposed. Function Definitions 1: Streaming Media Release. Distinct from RTSP (Real Time Streaming Protocol.) Usually intended to be unicast, but the decision to broadcast or multicast is left to the implementor. A natural consequence of Java. 2: Core Dump, also Dot Release. Preferred implementation is FIFO. Core logs may be examined for evidence of invalid input or system corruption. 2.1: Enhanced Dispersion Core Dump. May cause a paper jam. 2.2: Accelerated Core Dump. Frequently a consequence of I18N. While examination of the logs alone may not yield evidence of a preceding race condition, inspection of the environment will frequently produce confirmation. 3: Backward Accumulation Receipt Feed (BARF) A common routing problem, typically a result of input type mismatch or compiler error. Also caused by mistaking big-endian packets for little-endian. Although not specified, virtually all implementations are LIFO. A standard websafe 240-color palette should be more than adequate to render results. 4: Simple Network Offline Terminal (SNO TTY) When produced by a Sudden Node Echo Event (type ZE), care should be taken to properly garbage-collect so as to minimize impact on other users. Use of bless() or equivalent is common practice to avoid terminal ncurses-related errors, especially in hex. 5: Splashed, Packetized Interactive Transmission (SPIT) Indiscriminate vectoring of packets may results in process termination, especially if recipient is a large trucker. 6: Reserved for Future Implementation 7: Passive Hydrogenated Audio Response Transmission. A common component of a Distributed Denial of Service attack. Although difficult to authenticate, it is even harder to repudiate. Generally results in the perpetrator being advised to flush his or her cache. 7.1: Passive *Hydrated* A.R.T. A highly destructive variant, inevitably resulting in reassignment of host domain to "wet.1." Disaster recovery planning, especially the use of redundant trunks, is essential. 8: Process Fork(). Typically involves a named pipe (despite vendor claims, virtually all pipes are named). Care should be taken to avoid unhandled exceptions. Alternately, a "transparent" firewall may deter intruders (and prevent spread of viruses), but can never be 100% effective; incorrectly withdrawn standards may further compromise protection. Other deterrents include access control lists, proper use of assert(), and the innate repellant properties of technical users, in particular system administrators. As an aside, the authors would like to point out that certain well-known difficulties in the technical community may be partially attributable to the standard practice of performing fsck *prior* to mount, which may result in parameters being passed and buffer caches filled inappropriately. We recommend instead that fsck be incorporated as part of the mount function. This operation should be performed in pairs (or teams) whenever possible, although diminishing returns may be experienced at higher values of N. Users should beware inadvertant Random Access errors, and, while care must be taken to avoid race conditions at all cost, note that the opposite is true as regards *raise* conditions. Further, Quality of Services guarantees should be treated with skepticism and validated with previous users if at all possible. Interfaces should be placed in promiscuous mode when performing such validations. Although readers may note certain similarities to eXtreme Programming, we believe these to be strictly superficial. (However, it is interesting to note that, in both cases, the client is likely to get fscked.) 9: User Spawn(). Often the consequence of a good fork() without adequate exception handling. This may be prevented by asserting appropriate limits before filesystems are mounted and buffers overflowed. 10: Pre-Emptive Recursive I/O Deallocation. Typically preceded by transmissions via Proprietary Messaging System, a lossy protocol with no documentation. Fault-tolerance (and even remote access) are strongly recommended to avoid damage to peripherals. Users encountering invalid checksums are urged to disregard the parity bit. Unintelligible error messages are unfortunately the norm; for example, "File is Read-Only" is replaced with "I just can't, okay?" Author's Addresses Arindum Mukerji (raja@moselle.com) Joel Aufrecht (joel@aufrecht.org) Copyright Notice Copyright (C) 2001, Joel Aufrecht and Arindum Mukerji. All Rights Reserved. This document and the information contained herein is provided on an "AS IS" basis, especially as regards Function Numbers Eight through Ten.