In a Russian experiment in 2010 and 2011, six men agreed to be sealed up in a mock spaceship simulating a 17-month Mars mission. Four of the six developed disorders, and the crew became less active as the experiment progressed. 'I think that's just an example of what could potentially happen during a Mars mission, but with much greater consequence,' says Dr. Beven. 'Those subtle changes in group cohesion could cause major problems.'"
That happens on earth as well, it's why you have vacations or risk a burn-out.
The bigger question, though, is WHY THE FUCK can't we either disable whole-drive encryption, or at least set it to a key WE control, with some means to read the bits from even a drive that's totally nonfunctional SATA-wise (JTAG, SPI, whatever) and reconstruct it offline?
Can we do that with mechanical drives ? As someone who has to do quite a lot of data recovery recently (thank you WD 3TB Green)
I'm very interested in knowing how, also the WD Mybooks come with a hardware encryption PCB.
Has anyone had success of bypassing/cracking those, since they fail fairly often and the data on the disk is "scrambled" without them.
How do you really know what you need? Which specs are really relevant?
The easies method: You open a taskmanager and have the user recreate its troubled session.
Then you look at what is starved (memory, cpu, IO) and by whom and you upgrade hardware
and tweak/replace the software if possible.
Sometimes you need to do this over a longer period then it's time to write some scripts to poll
I've noticed several design suggestions in your code.