Editing 2553: Incident Report

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 13: Line 13:
 
This suggests that the ''clock'' time is really a proxy for the ''amount'' of time before one specific moment where everything falls apart, and when seconds start appearing, it implies that the recollection is within a few minutes of the disaster. Normally the increased level of precision reflects close monitoring capabilities of the affected systems, reviewing monitoring equipment, such as surveillance camera and microphone recordings, and/or detailed analysis by incident investigators. It may have been sufficient for the resulting inquiry to merely note the prior arrival of the original package, and possibly then read off (whatever remains of) the signing-in logs for the approximate times each member of staff arrives on the scene. At some point, though, the investigation will refer to fully timestamped security recordings, perhaps even eventually frame-by-frame with particular interest in exactly which things touched exactly what other things, in sequence, in order to hopefully learn all the necessary lessons about the incident.
 
This suggests that the ''clock'' time is really a proxy for the ''amount'' of time before one specific moment where everything falls apart, and when seconds start appearing, it implies that the recollection is within a few minutes of the disaster. Normally the increased level of precision reflects close monitoring capabilities of the affected systems, reviewing monitoring equipment, such as surveillance camera and microphone recordings, and/or detailed analysis by incident investigators. It may have been sufficient for the resulting inquiry to merely note the prior arrival of the original package, and possibly then read off (whatever remains of) the signing-in logs for the approximate times each member of staff arrives on the scene. At some point, though, the investigation will refer to fully timestamped security recordings, perhaps even eventually frame-by-frame with particular interest in exactly which things touched exactly what other things, in sequence, in order to hopefully learn all the necessary lessons about the incident.
  
βˆ’
Synchronization of events is important in [https://www.ntsb.gov/investigations/process/Pages/default.aspx incident investigations], so often systems are required to take input from common, relatively precise time references, such as {{w|GPS_disciplined_oscillator|GPS}}, {{w|WWV_(radio_station)|WWV broadcast}}, or cellular telephone systems. For example, an aircraft crash needs {{w|Airport_surveillance_radar|radar}} positioning data synced with [https://www.faa.gov/air_traffic/publications/atpubs/foa_html/chap3_section_4.html voice communications] and {{w|Flight_recorder|flight recorder data}}.  Lack of correlation between these is a potential source of conspiracy theories, for example one of the {{w|United Airlines Flight 93#Crash 9-11|hijacked planes on 9/11}} crashed into Pennsylvania either at 10:03 or 10:06 depending on two different information sources.
+
Synchronization of events is important in [https://www.ntsb.gov/investigations/process/Pages/default.aspx incident investigations], so often systems are required to take input from common, relatively precise time references, such as {{w|GPS_disciplined_oscillator|GPS}}, {{w|WWV_(radio_station)|WWV broadcast}}, or cellular telephone systems. For example, an aircraft crash needs {{w|Airport_surveillance_radar|radar}} positioning data synced with [https://www.faa.gov/air_traffic/publications/atpubs/foa_html/chap3_section_4.html voice communications] and {{w|Flight_recorder|flight recorder data}}.  Lack of correlation between these is a potential source of conspiracy theories, for example one of the {{w|United Airlines Flight 93#Crash 9-11|hijacked planes}} crashed into Pennsylvania either at 10:03 or 10:06 depending on two different information sources.
  
 
In many situations, incident reports are anonymized as shown to protect the identities of those people involved in the incidents. This is often done to prevent unnecessary blaming of certain individuals, particularly when it hasn't yet been determined whether the incident was negligence or just an accident.  
 
In many situations, incident reports are anonymized as shown to protect the identities of those people involved in the incidents. This is often done to prevent unnecessary blaming of certain individuals, particularly when it hasn't yet been determined whether the incident was negligence or just an accident.  

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)