|
From: <Jon.Paris@hal.it> > >> Much of *my* attitude is borne of sadness over this. > > Now _that_ I can understand. Frankly though I don't think attacking an > IBMer who (in his own time - not IBM's) provides a lot of valuable > information to this list is an appropriate response. Now if you want to > attack Lou ....... I was not really attacking Alexei. He is doing a fine job against all odds. My target was Rochester as such and their attitude of "we know best". A bit of peer review would help them there. Think of the extension of the library list as an example. Think of the times where a decision is made because it benefits IBM rather than their customers. Think of all the security holes that IBM claim do not exist until shown otherwise: passwords in clear, poor implementation of program validation values, poor password encryption (IBM blame Micro$oft who in turn blame IBM), etc... +--- | This is the MI Programmers Mailing List! | To submit a new message, send your mail to MI400@midrange.com. | To subscribe to this list send email to MI400-SUB@midrange.com. | To unsubscribe from this list send email to MI400-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: dr2@cssas400.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.