Internal competition is common at great companies. It can be wisely encouraged to force ideas to compete. The problem comes when the competition becomes uncontrolled and destructive. At Microsoft, it has created a dysfunctional corporate culture in which the big established groups are allowed to prey upon emerging teams, belittle their efforts, compete unfairly against them for resources, and over time hector them out of existence.
Actually, even your negative synopsis of the piece flies in the face of conventional wisdom, which is that attacks of Chinese origin are all a carefully orchestrated by the ruthless and scheming Chinese government.
Security researchers have identified the attacks against Google to be largely from the Chinese government, as were the politically motivated attacks against the Dala Lama and other Tibetan exiles. There is almost no doubt that the majority of the hacking that goes on in China (and elsewhere) is of the sort that TFA reports on, but linking it to the recent attacks on Google and other US government contractors is disingenuous.
hhttp:latimesblogslatimescomentertainmentnewsbuzz201001avatar-pulled-from-2d-screens-by-chinese-governmenthtml
Now e-mail: encryption could be very nice but how am I going to get keys from my correspondents? Do I have to manually ask them to send me or so? It seems so. I am not aware of any automated method to get their public key. ssh is transparent in key exchange, https too. E-mail not (yet). Besides, is there any (formal) standard to encrypt mail? And if I cc: to several recipients that means the e-mail has to be split before encrypting already. Makes it quite expensive when you're on a slow uplink.
The problem with key exchange is that there is no central authority. Thinking about it in a TLS kind of way, every cert is a self signed cert.
While Google and Verizon disagree about the degree of authority the FCC has to oversee network management, they seem to concur about the agency's limited powers in other areas. Although Congress has given the Commission oversight over radio and television broadcasters, these mandates should not be transferred over to the Internet, the companies warn. There is "no sound reason to impose communications laws or regulations on the robust marketplace of Internet content, applications, and services."
This whole "Google will work it out with ISPs on a case by case basis" is probably the scariest development in net neutrality in a long time. The only reading I can have of it is that Verizon had something that Google wanted, and they said "not until you change your stance on net neutrality". Net neutrality advocates have lost a big partner here.
Right. Just so we're clear about this...
Democrat is to Republican as:
C) Pot is to Kettle
Careful! The answer is not always C!
BTW, I've heard of some diehard Mircosofties getting windows tats. Wonder if Linux coders have a Tux tat. (yuck).
I have a co worker that got a fedora tattoo a little while back.to add to his Red Hat tattoo. A quick google search shows that some people get Tux tattoos.
"This generation may be the one that will face Armageddon." -- Ronald Reagan, "People" magazine, December 26, 1985