On 31 May 2012 09:40, Viesturs Lācis <viesturs.la...@gmail.com> wrote:
>> "Rule 34" by Charlie Stross. > I could agree to that, except that with all the internet and other > technologies design is so much more easy to > "borrow without a permission", Pirate Hardware is pretty much the subject of the novel. -- atp If you can't fix it, you don't own it. http://www.ifixit.com/Manifesto ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-users mailing list Emc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-users