Well, James Tiptree Jr would disagree with "never been exclusionary".
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
That, tons of acquisitions, and explicit attempts to destroy the HP culture as it was. I'd hate to see her string of damage attributed to a single mistake.
If they begin to become an existential threat to the US, we have a big nuclear arsenal to keep them off our shores.
But they aren't even close right now. The challenge is to defeat them without killing tons of people in "collateral damage" that ends up turning people into militants who weren't before.
In my Fortune 25 company, we have a department of people devoted to resolving issues of people who contact the CEO, President, or other members of senior staff. This method absolutely will light a fire under the IT staff to fix it. I don't know whether he reads every incoming letter or email, but I do know that each one is handled by the presidential escalation team, and tracked, and reported out regularly.
We also have a Chief Information Security Officer who will personally latch onto this like a bulldog and ensure that it's fixed. We had a breach a number of years ago and it's still used as a reminder that "That will NOT happen again."
"Companies that make products must show that their products work," Amaral said in the Northwestern release. "They must be certified."
This researcher is completely out of touch with what's sold in the marketplace. No wonder he doesn't understand that flawed solutions can still be useful.
Find a rusty railroad spike. Shove it through your eyeball over and over again. That's what IBM products are like.
It's one thing not to sell in China, but what if the government cracked down on production? Pretty much every hardware company could lose their production instantly.
No telecoms have a government-mandated monopoly. The FCC preempted exclusive franchise agreements in 2007.
The only barriers now are that it is a huge initial capital expense and large incumbents who will try every dirty trick to block new entrants.
These laws have been passed because certain municipalities have been able to successfully cover the cost and maintenance of their own networks.
Exclusive franchises for cable companies have been prohibited by the FCC..
The Communications Act authorizes local franchising authorities to grant one or more franchises within their jurisdiction. However, a local franchising authority may not grant an exclusive franchise, and may not unreasonably withhold its consent for new service.
Shame that Firefox does not have a good embedded PDF reader.
My email contains important technical information that I may need for years after I composed that email. When you delete it for me. You waste valuable company time as I recreate the exact same information I already "knew" which may have never made it into a formal document.
The counterargument is that it's cheaper for you or someone else to reinvent that wheel than it would be for lawyers to pour over terabytes or petabytes of data that have been stored forever in the event of a lawsuit discovery.
This is how adults resolve things. There were no lawsuits. There were no mass protests. There was a guy who said "Yeah, that picture the algorithm picked? It hurt." And Facebook said "Wow, we can see that would hurt, and we're sorry it did. We will try to do better."
WTF is wrong with this exchange?
That's still an order of magnitude cheaper than stuff like Teradata.
Powershell and CCNP are quite different than a compilers class or AI class that teaches Bayesian networks, or discrete mathematics. With the rise of functional languages and map reduce parallelism, set algebra becomes very handy. Mathematics classes cover matrix operations (used like crazy in 3d) and signal processing (used in audio & video compression). OS courses teach you things like how to implement synchronization operations using the instructions on a given processor. A network class that takes you from HTTP down to wire signaling on Ethernet gives you the background to understand in which situations DNS spoofing is successful and why TLS slows down connection establishment.