I'm afraid the SUV does make the college student safer. There was a good Consumer Reports article on it:
Until the fifth year, at which time they'd better have the papers ready for the performance review and any discussion of tenure track. So I'm afraid that's not a really meaningful exemption unless that professor has no plans for tenure track. It can even be worse. I've seen very gifted professors rejected for tenure, not because their research was not meaningful, but because their teaching was _so good_ that it frightened the existing staff into thinking that they'd have more expected of them. In one case, an intern at work asked me to help. I read the research papers: they were solid work, and far more clear than most other papers I'd seen in the field. Helping was politically awkward, and disenchanted me with a great deal of tenure evaluations. I do believe I did manage to help: partly by discussing the technical implications of the work with several of his reviewers, and partly by introducing him socially to the secretaries of the most recalcitrant professors. It's _amazing_ how much those secretaries control the information flow to and from their employers.
The apportionment of credit for academic papers is rife with both confusion and abuse. The need for citable publications is so large that people who had no meaningful involvement with a project are being listed as authors, to protect their academic careers. Other students or technical staff who collaborate extensively are ignored in favor of tenure track staff, to help reach their required number of publications. I'm afraid that the result is often "co-authors" who have no idea what the original research established, or how. I've even seen listing someone as a "co-author" used to prevent them from publicly disagreeing with the results. The "co-author" status is, I'm afraid, may never have been a reasonable way to measure research publication due to frequent abuses.
4 scientific papers in 5 years is a tremendous rate for more physical sciences. It's possible, in my observation, to have have a few basically "filler" papers in progress while the genuinely interesting or illuminating paper is published. But effectively publishing one significant paper a year, accepted to reputable journals, is a tremendous amount of work in most fields such as chemistry, physics, or engineering. Social science papers can publish analyses of analyses of analyses as "new" publichations, and have been doing so for decades. But in sciences where you have to actually collect raw data, it's very frequent publication.
I must say, sir or madam: that the idea of never doing genuine software updates is nonsensical. I deal weekly with the extensive pain of supporting newer versions of software in older operating systems, typically in Linux. Newer features of core components often rely on newer features of other components, while other installed components rely specifically on the _older_ versions of the core components. Resolving that dependency hell is a a very time time consuming, and expensive process, It helps pay my salary, but often it's simpler to do a forklift upgrade of the while system and forward port any critical missing components.
Is the upgrade path abused and over-used? Often, yes. But that doesn't mean it's automatically useless or meaningless.
Many of the asylums were horrible and without hope, due to longstanding medical orders for which there was no effective treatment. The advent of effective psychopharmacology changed that: people with bipolar depression, for example, devastating post-traumatic stress based depression,, devastating post-trautmatic stress, and numerous other problems became treatable and could be treated as outpatients or with short stays to stabilize their medication, then released. Care really did improve in the 1960's and early 1970's, when the psychoactive medications were better understood and seized upon with great joy by doctors and patients who'd before felt quite hopeless. Unfortunately, this became coupled with cost-saving "return to the community" programs and policies, and we wound up with _enormous_ numbers of ill people who could not safely live on their own, turned out without structure to remember to take their medication by themselves.
The results have been predictable: numerous confused, somewhat insane people were left without the help they needed because their smaller, modern, fragmented families could not possibly fill in the gap of providing residential care. When coupled with the strain on the prison systems from the "war on drugs", the threshold for providing residential care has been raised so high that facilities willing to work with modest mental disorders have been overwhelmed by even more profound cases, an. And the quality of care for both has dropped, harshly.
I'm afraid that I'm old enough to know relatives and colleagues with such members. When their need for treatment leads them to self-medicate with illegal drugs, they then wind up snared in the "war on drugs" and "zero tolerance" policies, and become even more difficult to help.
They're not very expensive, you can get a workable one for $10. But looking at the insides of a few readers for hacking reviews, the cheap antenna is fairly bulky. It's typically a coil of wire, several inches wide. Finding space for that inside a normal laptop is feasible, I'd assume it can be built into the case itself, for example. But every time you introduce bulky components in a laptop, you introduce additional expense. Also, like wifi, they consume some power, so a contact sensor to read only when the device is present is additional work and expense.
It does raise the interesting idea of having an RFID reader built into your laptop for security scanning of _other_ people's RFID keys. Coupled with the very poor security of these devices, it raises the possibility of using the RFID reader in my laptop to scan the RFID keys on your person, such as your laptop RFID key or your passport key, and do relatively easy identity theft. Examine some of the articles on cracking, or cloning, RFID passport keys to learn more about the vulnerabilities.
Many security projects have also been deliberately crippled by cooperation with US export encryption regulations, and by the laws concerning suveillance capability for audio communications. These laws require "law enforcement" access to the communications. While Tor might skirt these regulations as not serving text, many fundamental encryption and anonymization technologies would directly block such monitoring.
I can confirm that "valid work permit" includes verifiable citizens. There's a particular federal form, the I-9, available at http://www.uscis.gov/sites/default/files/files/form/i-9.pdf, that details the identification needed to verify legal employability. Proof of citizenship is one of the acceptable types of proof.
> Back when Unix was first becoming broadly used in private companies, want ads were filled with job offers for low-level unix sysadmin positions - all requiring experience with Unix and its tools that could only be met - if at all - by Ken Thompson, Dennis Ritchie, M. D. McIlroy, and J. F. Ossanna. B-)
And later, this occurred with Linux, NT, C++, Java, PHP,
I'm afraid there's far more concrete evidence. Take a look at the video of the presentation by a law firm on how to hire H1B visa holders while skirting the edge of US law.: it's quite an infamous seminar.
I've dealt with employers who used such tactics. it's not the only reason to have an extremely specific resume: I've helped create job descriptions that were "wish lists" of job skills, lists that we knew we could not possibly afford if one candidate had them all. But we'd accept 3 out of 5 with demonstrated flexibility.
Where no one reports it, or prosecutes it, it's already being done. I've recently worked with educational facilities whose compliance with basic security practices for student and staff data is in "compliance" with EU law because they passed an audit, but the audit was basically a checklist they filled out. I refused to sign the parts of it that came to my crew, because the answers were lies, and submitted my concerns to their company and my company's lawyers and security managers. The education company was very, very careful to keep the auditors away from _me_.
They have changed their approaches to a number of the security issues I raised, but their own leaders did not know the security violations performed as a matter of common practice by their own staff, especially concerning student private data.
I'm afraid that you've already been trapped by starting out with a flawed assumption, that such a device would require explosives. Self-destruct drives already exist, from a company called RunCore, at http://www.runcore.co/en/ Their site seems to have been slashdotted, but it's an interesting approach for high seurity data.
I believe that the age discrimination you are referring to is described at http://www.law.cornell.edu/cfr/text/29/1625.5, and the actual code for federal employees is at http://www.law.cornell.edu/uscode/text/29/631. There is nothing in it that prohibits asking for date of graduation. Asking for it without need may cause "scrutiny", but the simple claim that "we verify academic credentials as a matter of course" works very well to cover that, and I've not heard of any company being scrutinized for asking in the last 10 years.
I've certainly met managers and hiring personnel in the last 10 years who discriminate on illegal bases. It's extremely difficult to prosecute, and such discrimination is actually _taught_ in legal seminars how to avoid prosecution for such discrimination. The most outstanding example was the "how to hire H1B applicants only" presentation at http://www.youtube.com/watch?v=TCbFEgFajGU&list=PL126DD55E0E6CD89B.
And working on projects that help people, or let you have a real life as well as program, or medical issues that limit your mobility. That can also be a reason for telecommuting. And one disastrous marriage or start-up company can take a 10 year bite out of your career path without difficulty. Also, expertise can be seriously obsoleted: how many "DOS" or "BeOS" or "Lotus Notes" experts have watched their expertise obsoleted?
> Age on a C.V?! Who does that
This is one reason that they personnel departments ask for your college graduation date. Calculating age from that is pretty easy. Similar questions can be, and are, used to collect race, gender, religion, nationality, visa status, or medical issues that may affect your workplace behavior. This is true even in places that claim not to discriminate on these bases:, or where such discrimination is used illegally. Subconscious bias exists, even without directly citing it in the applicant review process.