I hope as the future politicians build a gvmnt/cabinet (or whatever else they build) they understand and follow the following software development saying:<br><br>"Software is complete not when you cannot add anything more to it but when you cannot subtract anything away from it".<br><br><b><i>John Walubengo <jwalu@yahoo.com></i></b> wrote:<blockquote class="replbq" style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"> Amazing similarity b/w Computer Software and Political <br>Deadlocks....<br><br>I was struck by the similarities between what is<br>transpiring in our political arena and what happens in<br>software engineering (in particular Operating System<br>Software design) Wikepedia defines a deadlock as <br><<...a situation wherein two or more competing actions are<br>waiting for the other to finish, and thus neither ever<br>does. It is often seen in a paradox like 'the chicken or<br>the egg'>>.
http://en.wikipedia.org/wiki/Deadlocks.<br><br>The same wikipedia page goes on to say that in Operating<br>Systems, a deadlock occurs only when all of the following<br>four conditions prevail:<br> 1. Mutual Exclusion condition: a resource is either<br>assigned to one process or it is available<br> 2. Hold and Wait condition: processes already holding<br>resources may request new resources<br> 3. No Pre-emption condition: only a process holding a<br>resource may release it<br> 4. Circular Wait condition: two or more processes form a<br>circular chain where each process waits for a resource that<br>the next process in the chain holds. <br><br>This transposes perfectly onto our political deadlock as<br>described below (I just replaced the items 'Resource' with<br>Ministry and 'Process' with Politician to understand<br>prevailing conditions within the political context). So<br>rephrasing the above:- Political deadlocks will occur when<br>all of the following four
conditions prevail:<br><br>1. Mutual Exclusion:-a Ministry can only be occupied by one<br>Politician. The occupant automatically excludes the<br>others.<br>2. Hold and Wait: -a Politician/Party holding some<br>ministries may want to request for more.<br>3. No Preemption:-only the Politician holding the ministry<br>can release it. (No external force can pre-empt or release<br>that ministry).<br>4. Circular Wait: Politician-1 may release a Ministry 'A' -<br>BUT only after recieving a Ministry 'B' from the other<br>Politician-2. Unfortunately Politician-2 cannot realease<br>Ministry 'B' because (s)he is awaiting for Politician-1 to<br>release his Ministry 'A' first.<br><br>So how do computers or Operating systems deal or resolve<br>deadlocks? Three approaches have existed since 1960s and<br>are described on the same wikipedia page. Basically they<br>include: <br>Option1: Deadlock Prevention, <br>Option 2: Deadlock Avoidance and <br>Option 3: Deadlock Detection.<br><br>In
more simplistic terms, Deadlock Prevention simply aims<br>at ensuring that one or more of the above four conditions<br>for deadlocks DO NOT hold. E.g most Operating Systems<br>would therefore be pre-emptive (thus addressing condition<br>3) by retaining and exercising the right to terminate the<br>offending processes (Politicians?). Operating Systems are<br>careful not to allow one process to hoard resources at the<br>expense of the other Processes.<br><br>In the Deadlock Avoidance approach, Operating Systems try<br>to make sure that they do not enter into a state that can<br>lead to deadlocks. Basically, the competing processes are<br>expected to declare in advance their maximum request levels<br>for resources. Thereafter the Operating System polices<br>their subsequent request granting or denying them<br>accordingly. (All cards must be on the table in advance?)<br><br>Finally, in Deadlock Detection, the Operating System may<br>opt for the lazier but more expensive
option- institute<br>mechanisms that inform it that a deadlock has occured e.g.<br>when the computer freezes (or the country?). Thereafter,<br>it would need a manual reboot. Switch off and restart the<br>machine, losing all your data (life?) in the process. I<br>just hope we are not headed for Option 3.<br><br>walu.<br><br><br><br>--- Michuki Mwangi <michuki@swiftkenya.com> wrote:<br><br>> <br>> <br>> Willem de Groot wrote:<br>> > <br>> > * Remove some of the URLs in the footer<br>> > * Run the mailinglist on another server to see whether<br>> my.co.ke IPs<br>> > are somehow blacklisted/penalized<br>> > <br>> > <br>> <br>> The my.co.ke mx IP is clean and not blacklisted unless<br>> someone wants to <br>> verify that with other spots.<br>> <br>> Am monitoring the emails still and so far i dont seem to<br>> any landing <br>> into the spam folder since the very first one.<br>> <br>> I have no
problem with my normal mail and using a mail<br>> client which has <br>> flags to read spamassassain spam counts and flag as spam.<br>> No problems <br>> with that so far. Considering that it goes through<br>> spamassassin and a <br>> barracuda box :)<br>> <br>> Regards,<br>> <br>> Michuki<br>> _______________________________________________<br>> skunkworks mailing list<br>> skunkworks@my.co.ke<br>> http://ole.kenic.or.ke/mailman/listinfo/skunkworks<br>> Blog http://skunkworks-ke.blogspot.com<br>> Beta Blog http://blog.my.co.ke<br>> <br><br><br>__________________________________________________<br>Do You Yahoo!?<br>Tired of spam? Yahoo! Mail has the best spam protection around <br>http://mail.yahoo.com <br><br>_______________________________________________<br>kictanet mailing list<br>kictanet@lists.kictanet.or.ke<br>http://lists.kictanet.or.ke/mailman/listinfo/kictanet<br><br>This message was sent to:
kiriinya2000@yahoo.com<br>Unsubscribe or change your options at http://lists.kictanet.or.ke/mailman/options/kictanet/kiriinya2000%40yahoo.com<br></michuki@swiftkenya.com></blockquote><br><p>