Forgot your password?
typodupeerror

Comment: Re:Emma Watson is full of it (Score 1) 590

by the_B0fh (#47988211) Attached to: Emma Watson Leaked Photo Threat Was a Plot To Attack 4chan

Uh. Help me out here. You wrote:

The classic "wage gap" complaint has always been based on ignoring the "hours worked" gap.

and as evidence you pointed me to: http://online.wsj.com/articles...

which does not discuss this at all. How does the article back up your argument again? Would you like to find another article from a reputable source or a peer reviewed journal?

Also, you claim:

It's comparing equal pay for equal work and education.

and the article you are using as evidence says:

At every education level, from high-school dropouts to Ph.D.s, women continue to earn less than their male peers.

I am unable comprehend how you managed to read "equal pay for equal work and education" from "At every education level, from high-school dropouts to Ph.D.s, women continue to earn less than their male peers."

Thanks.

Comment: Re:Emma Watson is full of it (Score 2, Informative) 590

by the_B0fh (#47985329) Attached to: Emma Watson Leaked Photo Threat Was a Plot To Attack 4chan

So, did you read just one paragraph and miss out the rest of the article? A 33% gap does not appear to be "equal" in my dictionary.

While these particular women earn more than their male peers, women on the whole haven't reached equal status in any particular job or education level. For instance, women with a bachelor's degree had median earnings of $39,571 between 2006 and 2008, compared with $59,079 for men at the same education level, according to the Census.

At every education level, from high-school dropouts to Ph.D.s, women continue to earn less than their male peers.

Comment: Re:Smells like a troll! (Score 1) 504

by the_B0fh (#47969425) Attached to: Ask Slashdot: Is iOS 8 a Pig?

Pray tell, how do you secure a personal phone? The following scenarios:

Confidential information on phone. Phone is stolen.
Malware through side loading.
Controlling how data can be shared/forwarded.

Personal phones can be as secure as company-issued iPhones. I won't educate you, because, you know, GFE.

WTF is GFE? Girl Friend Experience? Good Faith Estimate? Government Furnished Equipment?

Also loved the hand wavy "oh yeah it can be done, but I won't tell you how." I bet most, if not all, your solutions would be full of holes. But of course, since you won't tell us how you plan to do it, it's easy to claim that IT is too stupid to do it.

System checkpoint complete.

Working...