Comment Re:Meanwhile OS/2 and Xenix existed (Score 1) 387
Now OS/2 I'll grant you, IBM fumbled hard on that one...
People wanted backwards compatibility.
Now OS/2 I'll grant you, IBM fumbled hard on that one...
People wanted backwards compatibility.
So why was all the intelligence about Iraq wrong? That is an unanswered question. The Republican controlled Congress never stepped up to the plate to ask any hard questions. Gosh, I wonder why? Of course, there is a clue: PNAC, or the Project for the New American Century [wikipedia.org]. PNAC released a Statement of Principles [wikipedia.org] in 1997 calling for the overthrow of Saddam Hussein [wikipedia.org]. It was signed by Dick Chaney, Donald Rumsfeld, Scooter Libby, Elliot Abrams, Eliot A. Cohen, Aaron Friedberg, Peter Rodman, Henry Rowen, and Paul Wolfowitz, who all ended up working for the Bush administration. One would almost think that they used 9/11 as an excuse and made up a bunch of crap to make it happen.
Sounds like you have the answer to your question.
Is there actually a way for US businesses to prevent themselves from hostile takeover?
Yes, the only reason hostile takeovers work is when the management doesn't own the company because they've sold the company through public stock. Then someone can buy all the stock (or, a controlling share) and they own the company.
In the case of Paradox Entertainment, the stock is not publicly traded, and the CEO owns a controlling share (of the private stock).
And in this climate, they've already eliminated pretty much every job they can,
Raise the minimum wage and you'll see even more go away. Raise it again and there will be even more.
Then lower it and new jobs will appear.
You need to look into the field of toppigenetics for the answers to those questions.
Wait..Is toppigenetics the study of the DNA of toppings on pizza?
“Vulnerability research is not controlled nor would the technology related to choosing, finding, targeting, studying and testing a vulnerability be controlled,” said Randy Wheeler, director of the BIS, today during a conference call. “The development, testing, evaluating and productizing of an exploit or intrusion software, or of course the development of zero-day exploits for sale, is controlled.”
After reading that several times, I'm still not sure what is allowed and what is not.
The question is, would he have done this even if not running for president? The answer is obviously yes, based on past behavior.
How can you tell? It seemed like he was running for president even before being elected Senator.
"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde