Agree. They'll just put him in prison with a bunk mate that is a total psychopath and let him torture/murder Snowden - plausible deniability!
This is why such services that let users store data in their "cloud" should enable user-specific encryption keys - the user's public key encrypts the data, and ONLY the user's private key can decrypt it. Then if "authorities" want access to the data, they would have to ask each and every user for their key. Sure, as in I'm convinced I would do that!
Classic guerrilla theater! Kewl!
You might be lucky to get a position in a research institute and/or university, but without at least a masters degree that will be very difficult. My advice? Apply for a graduate program in your chosen field. With a doctorate, or at the least a masters degree, your chances are much higher to achieve your goals, though success is never guaranteed!
If you have old copies time-stamped by the operating system that pre-date the versions of the usurper, then have your attorney threaten them with theft of copyright. They can put your name back as originating author, and themselves as enhancers/updaters, but failure to do so should be accompanied by legal sanction. FWIW, always have a good attorney as a personal friend. I do, and it has served me well in such cases. I do his tech support pro-bono. He does my legal work pro-bono as well. A good quid-pro-quo situation.
I think that Oracle has just killed their golden goose! Gee, I wonder just how long before some one else addresses this issue? 10...9...8...
There are two faults here. One is yours in that you left your equipment connected to the network such that external access was allowed. The other is the supplier/vendor of the equipment who performed a modification of the equipment without your explicit approval. IMO, the supplier is fully responsible/liable for ALL of your costs and/or losses caused by this action on their part. I think an attorney would agree, unless there is a clause in your support or purchase/license agreements that allows for this, in which case, caveat emptor! As for a network connection timeout, this is not really feasible. However, proper configuration of your network firewalls (I assume you have such?) should mitigate this sort of unauthorized access. If the equipment doesn't need local network access for management/monitoring purposes, then simply disconnect it. If it does, then the firewall rules have to be adequate to block remote access without your permission and intervention.
If you read my message, this level of math is NOT required for most programming jobs (though formal logic is helpful). However, for a job as software engineer or computer scientist, then I stick with my opinions about that! Engineer/Scientist == math...
How neat is this!?
:-) Physics at its best. My late father, an astro-geo-physicist (and director of the National Science Foundation), would have been delighted to see this work!
On a modern OS, such as Windows or Linux (preferable), you can use a virtual machine to run older DOS and such operating systems, passing the RS-232 ports of the host though to the virtual machine. Works great for me, and I use that for dealing with similar embedded systems all the time. FWIW, my preferred host OS is a clone of Red Hat Enterprise Linux (RHEL) 6, Scientific Linux (SL). CentOS is another such clone, and widely used in industry. I use SL because I personally know the maintainers of SL at Fermi National Laboratory in Illinois (my wife is a staff scientist/physicist there), so if I have an issue, I can contact them directly. My preferred virtual machine manager tool is currently VirtualBox (open source, from Oracle/Sun), but KVM will also work very well for this. That said, I prefer the GUI and configuration tools provided by VirtualBox.
If you want a degree in either software engineering or computer science, then the math is part of the (pardon the pun) equation! I do performance engineering (actual job title is Senior Systems Engineer) for a tier-one Fortune 50 company. Without the math (3rd order differential equations at the least), I could not do my job. No, I don't need that on a daily basis, but I DO need it from time to time, such as when developing predictive analytics algorithms to properly analyze system performance and time-to-failure (Kalman filters anyone?). FWIW, my previous job was developing risk analysis (real-time) software for the options trading industry - keeping the portfolios of traders and market makers properly balanced, using (primarily) the Black-Scholes risk algorithms - again, 3rd order differential equations.
So, want a position that is just something more than being a code monkey? Then math is your best friend!
Now the banks have an inkling of how we feel about them stealing us blind in the mortgage fiasco! I only wish these hoods got away with about $4.5B instead of a paltry $45M. Then, the results would have been more equitable...
Yeah. Definitely a possibility!
My best guess is that a bunch of our "brilliant" legislators have been burned by this (unlockable phones) and are now going to do something about it!
RH was a force of nature, and we who grew up on his wizardry will miss him!