I can't speak for GS but, in my own industry, this type of email must be encrypted by law.
You made the switch by switching jobs. That isn't the answer to the original question.
You can run SAS in pretty much any backend too.
Without a list of the installed SAS components this is pretty much impossible to answer.
If you have the full eBI/eDI suite and a host of "solutions", then you're going to be spending a lot of time in R/Python trying to replicate the years that SAS has spent on developing that environment.
If you have core modules - BASE, STAT, ETL etc, then you can "program" at a relatively low level to your heart's content.
More info please.
Ok. I'll bite. "Pays"
As someone currently paddling through a large IT project at the moment, I wish I had mod points today. Every single one of your points are totally correct.
I discovered an unexpected bonus to the keychain yesterday that may have sysadmins a little worried.
I take my MacBook Air to work and, each month, a friendly Systems Support person, secretly types the company SSID password into it so that I can use the corporate wifi.
Imagine my joy then when, as if by magic, my iPhone connected and authenticated to the same wifi. Seems that keychain is sharing a whole lot more than folks realised."
Link to Original Source
On teh upstart none will byable to hunderstand nethig publishd in their neway
What you're describing there is the Internet equivalent of living on dollar bags of fried food and complaining that you're fat.
The IRA used to do this so that they could target the security forces dealing with facilitating the evacuation and then the medical services coming to attend the blown to pieces security services.
For what it's worth (and it's totally pointless unless you're a fan of Microsoft's Solitaire), you can already run (http://atomicvindaloo.com/?p=324) Windows 3.1 on the N95 8GB