If you want a feature in Open Office, fund it. Better yet, considering the cost of Microsoft Office, put the funding of Open Office in the annual budget. Rather than giving $100 million a year to Microsoft, give $10 million a year to Open Office. With a programming / total-expenditures ratio of 1, open source funding is efficient.
A few years ago, Kansas sued Nebraska, whose 100,000 plus wells left some Kansas towns with zero water, especially near the Republican River (named after a Pawnee subtribe of Indians known as the Republicans). A Nebraska agricultural economist investigated, publishing a research paper that revealed over several years that Nebraska's increasing wells decreased water before it reached Nebraska. With his defense ruined, the Nebraska attorney general denounced the economist to his department head in Lincoln, Nebraska. The attorney general valued loyalty to himself more than honesty to truth, while the economist valued loyalty to honesty.
Continuing revelations about U.S. security agencies (torture, forbidding free speech, spying on their citizens, promoting specific denominations of Christianity) blemishes all other government agencies (Commerce, Agriculture, Education). We envision these other benign government agencies' surveys spying on us, maybe even sharing information with government security agencies. Does U.S. extensive security represent a new necessity, obsessive employees, employees seeking promotions, or a cowardly and impotent population.
In 1988, Jonathan Pollard's (America's more prolific spy) father defended his son by claiming members of the U.S. military were proliferating swasticas against his son. I'm surprised when those who went over-the-top whine.
I have now actually checked this.
I switched an SDHC to read-only, wrote a file to it on Linux, took the SDHC to another computer, and the file was indeed written.
So, the SDHC lock is no guarantee against writing, and is apparently useless.
I stand corrected, and thank Carnildo for ending my misadventure.
I prefer using read-only hardware to "chattr -i" immutability plus a Linux kernel enforcing this,
since the software approach is cumbersome and changes files' ctime attribute.
What is available?
The following in the alternate model AEPDDESUWP will not write to any memory it can read,
and outputs to either eSATA or USB computer ports,
I still need to put my operating system on flash memory before I insert it into such a read-only device.
People are either Christian, or headed for hell and of Satan.
Most American goods come from China, so American Christians prefer to buy the goods of Satan.
So with science and engineering -- of Satan.
Yet virtually everything around us came through science and engineering's magic touch
-- blended shirts (banned in the bible), invisible electromagnetic waves everywhere to be interpreted, risen people in airplanes, medical prosthetics getting even amputees to walk.
In the last hundred years, name one "good" thing religion has given us.
Now name something good science has given us.
The operating system often seems to write to a lock-switched memory card, and "ls" indicates it has.
But removing the card reveals data has not been written.
I'll keep an eye out for actually writing when actually lock-switched.
No matter what an intruder tries, if you put your operating system on read-only media, intrusion becomes limited.
Of course, installation and changes become more difficult because you must reboot with your media set to read-write, then reboot again to read-only. SDHC memory works well for this, since it has a read-write switch like the old floppy drives. Put the memory in a
USB "card reader" for SD
(microSD doesn't appear to have a read-write switch).
You can insert the SDHC in something that looks like a flash drive, then insert the whole in a USB slot.
Or, you can use something like the Adonics eSATA/USB Digidrive
to connect to your computer's eSATA port (if you have such a port on the back of your computer),
which is probably more efficient (fewer waits) than a USB 3.0 connection.
In Linux, you might choose to put most of your operating system on SDHC switched to read-only,
then put a variable area on a regular disk drive for logs, although you can put logs into a memory area that disappears on reboot.
Or you might put your webpages on a separate SDHC,
so your webpages get no intrusion changes.
You could then unmount your webpage SDHC, switch to read-write, make changes, unmount, switch to read-only.
In Debian Linux, the foundation for most Linuxes (eg, Ubuntu), you can look at the "Securing Debian Manual",
Debian has a highly tailored Aide (like tripwire) that uses checksums to detect any file changes.
In Debian, "dar" Disk Archiver (like tar) makes backups on external disk drives, but dar probably requires some tailoring (I use dar).
For a firewall, you could use Debian's easily used Guarddog.
In some sense, Debian is the administrator's operating system -- for the serious.
Data arises from retrospective or prospective studies.
Retrospective data was created before a statistician could design an experiment.
Prospective data sees the statistician set various levels of a variable
to randomly selected experimental units (maybe people, maybe production machines).
In a (prospective) experiment, an observed correlation implies causation.
For example, in manufacturing plastic, keeping constant other variables (humidity and speed of production),
set the temperature sometimes at 100 degrees and sometimes at 200 degrees,
randomly choosing the order these temperatures get applied.
If the 200 degree temperature produces a stronger plastic (response or dependent variable),
then your positive correlation implies causation.
In the future, knowing that increased heat increases plastic strength, the manufacturer would raise the temperature.
But experiments consume time and money, so institutions not individuals usually perform them.
Million dollar clinical trials do determine whether a drug is effective.
While experimental economics can determine causation, most economics is retrospective, so conclusions become controversial.
GM and Department of Energy have been sponsoing a competition, providing the same model vehicle that universities then convert.
Mississippi State University appeared on the Smithsonian Mall (Washington, DC) in the Folk Festival, June-July 2012.
While the vehicle wasn't an SUV, GM provided the same vehicle model merely to avoid variable results arising from model used.
Programming plus math, statistics, legendary graphics -- that's R.
Just a programming language is a barren language for most people.
Use a programming language that eases and magnifies another field/course.
R dominates numerous statistics departments, biogenetics, and financial quants,
R originated from AT&T (as S) at the same time as Unix and C.
Many people start an R session whenever they login, since R can even do the trivial as a calculator with history and help.
With vectors x and y, the following creates a good graph.
R has associative arrays (hashes) and parallel programming, native to R since the programmer often uses vector objects.
Westinghouse Electric Company was bought in 2005 for $5 billion by the Japanese company TOSHIBA,
And the U.S. has the British company BP drilling much of the U.S. oil.
Why is the U.S. excited about its self-sufficiency?
Why does the U.S. push foreign company energy projects more than its own projects?
With China producing 30 percent of the world's engineers, Russia 7 percent, and the U.S. only 3 percent (see this week's Science article); and
with 8 out of 9 of China's political leaders engineers;
what part of the world's engineering curve does the U.S. think it sits?
In the past 6 months, USDA has made available past agriculture censuses,
now back to 1925.
However, while these are searcheable pdf's,
there appears to be no quality control so errors appear not in the image but in the underlying searcheable data.
In some sense, the searcheability is a mere bonus of the scanning software used;
although for such pdf's, your own OCR software could create this searcheability.
Since you can't import these into statistical or spreadsheet software,
such pdf's merely amount to putting a library's paper document on your desk.
With some Perl programming, they could be made into unusual csv (comma separated) files,
though those underlying errors would remain.
At least each such csv files could be created the same way for all 50 states,
and used in statistical software the same way for all 50 states.
I went to purchase socks today from
but its registrar,
failed to associate an IP address (failed to perform DNS service)
although SocksAppeal has paid for its domain into March, 2012.
I purchased from GoDaddy's customer SocksAppeal just 5 months ago,
and now GoDaddy might (other possible reasons) cause a commercial business to fail.
Two variables deceive us, but our simple minds handle one variable
shows how women (Class1) can be admitted (Class2) to every academic department at a higher rate
[essentially a percent, not a straight count] than men,
yet overall departments admit men at a higher rate (one large department accepts women at a higher rate but more men apply).
So too, Slashdot's problem perplexes the human with its two variables: day of week and male/female in flat-land.
Remove day-of-week, as one response mentioned,
then simple human intuition works in line-land.