From: Jim Choate <ravage@einstein.ssz.com>
To: cypherpunks@toad.com
Message Hash: 8a86746790562da3bee1c6260ba31d3c3bcccb233a67945f46145087b7ad4380
Message ID: <199612151513.JAA03511@einstein>
Reply To: N/A
UTC Datetime: 1996-12-15 21:49:30 UTC
Raw Date: Sun, 15 Dec 1996 13:49:30 -0800 (PST)
From: Jim Choate <ravage@einstein.ssz.com>
Date: Sun, 15 Dec 1996 13:49:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: In Defense of Anecdotal Evidence (fwd)
Message-ID: <199612151513.JAA03511@einstein>
MIME-Version: 1.0
Content-Type: text
Forwarded message:
> Date: Sat, 14 Dec 1996 21:53:02 -0800
> Subject: Re: In Defense of Anecdotal Evidence
>
> Yes and no. Depends on the objective. If I had to purchase and install
> a new server for my employer, and not being an expert in security myself,
> I would (barring having a very trusted friend for advice) certainly be
> inclined to trust the published reports more than anecdotes, even when
> the anecdotes come from erstwhile reputable posters on these lists.
Published reports as done in the computer magazines are anecdotal evidence.
They neither print their error bands on their stats, the raw results of
their tests, or their complete test proceedures.
Jim Choate
CyberTects
ravage@ssz.com
Return to December 1996
Return to “Jim Choate <ravage@einstein.ssz.com>”
1996-12-15 (Sun, 15 Dec 1996 13:49:30 -0800 (PST)) - Re: In Defense of Anecdotal Evidence (fwd) - Jim Choate <ravage@einstein.ssz.com>