RSTLIST Digest - 8 Dec 2008 to 26 Feb 2009 (#2009-1)
Linda McPhee
linda at WRITE-RESEARCH.COM
Fri Feb 27 05:57:17 UTC 2009
more readable, IMVHO (and assuming you need to keep all the if/thens spelt out):
The sensor notifies the system if it detects a cyber-event. If the cyber-event is an attack, then a response is required. The particular response will depend on policy. Current policy says that if the cyber-event is a botnet then the system notifies the manager. The cyber-event is a botnet. The system notifies the manager. The manager shuts down the system, and the users are angry.
Linda McPhee
www.write-research.com
On Fri 27/02/09 06:03 , RSTLIST automatic digest system <LISTSERV at LISTSERV.LINGUISTLIST.ORG> wrote:
> There is 1 message totalling 91 lines in this issue.
> Topics of the day:
> 1. An RST analysis
>
> ----------------------------------------------------------------------
> Date: Thu, 26 Feb 2009 15:17:38 -0600
> From: Andrew Potter
> Subject: An RST analysis
> This is a multi-part message in MIME format.
> ------=_NextPart_000_013A_01C99825.5C4FB7F0
> Content-Type: text/plain;
> charset="iso-8859-1"
> Content-Transfer-Encoding: quoted-printable
> I am analyzing a short text, and I wonder if I could get a second
> (or =
> third or fourth) opinion. If you have a little time, and are so =
> inclined, I would appreciate your RST analysis. The text, which
> appears =
> below, is very short. If it seems stiltled, that's because it was =
> crafted to be parsed by the Attempto Controlled English (ACE)
> parser. =
> Any suggestions for improved readbility are welcome!
> The sensor detects an cyber-event. The sensor notifies the system.
> If =
> the cyber-event is an attack then a response is required. The =
> particular response that is required depends on the policy. The
> policy =
> says that if the cyber-event is a botnet then the system notifies
> the =
> manager. The cyber-event is a botnet. The system notifies the
> manager. =
> The manager shuts down the system, and the users are angry.
> Any analyses or comments are appreciated!
> Regards,
> Andrew
> ---
> Andrew Potter, Ph.D.
> ------=_NextPart_000_013A_01C99825.5C4FB7F0
> Content-Type: text/html;
> charset="iso-8859-1"
> Content-Transfer-Encoding: quoted-printable
> I am analyzing a short text, and I =
> wonder if I=20
> could get a second (or third or fourth) opinion. If you have a =
> little=20
> time, and are so inclined, I would appreciate your RST analysis. =20
> The text, which appears below, is =
> very=20
> short. If it seems stiltled, that's because it was crafted to be =
> parsed by=20
> the Attempto Controlled English (ACE) parser. Any suggestions for =
> improved=20
> readbility are welcome!
> The sensor detects an cyber-event. The sensor notifies the=20
> system. If the cyber-event is an attack then a response is =
> required. =20
> The particular response that is required depends on the policy. =
> The policy=20
> says that if the cyber-event is a botnet then the system notifies
> the=20
> manager. The cyber-event is a botnet. The system notifies =
> the=20
> manager. The manager shuts down the system, and the users are=20
> angry.
> Any analyses or comments are=20
> appreciated!
> Regards,
> Andrew
> ---
> Andrew Potter, Ph.D.
> apotter at nova.edu
> ------=_NextPart_000_013A_01C99825.5C4FB7F0--
> ------------------------------
> End of RSTLIST Digest - 8 Dec 2008 to 26 Feb 2009 (#2009-1)
> ***********************************************************
>
>
More information about the Rstlist
mailing list