Articles and Resources
Date Fairness.com Resource Read it at: Oct 04, 2011 Tracking factory slaves across Asia
QUOTE: We traveled to Cambodia planning to tell the story of an escape from modern-day slave labor but what we found were tales of more women trapped in debt-bondage in Malaysia. In Cambodia, we found the women who had escaped, but we also learned about dozens of other workers stuck in similar circumstances, unable to get home unless they paid off their "debt" to a recruitment agency.
CNN (Cable News Network) Sep 02, 2011 Group Says It Has New Evidence of Cisco’s Misdeeds in China
QUOTE: An advocacy group that accuses Cisco Systems of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong organization said Friday that it had new evidence to suggest that Cisco specifically tailored its technology for that purpose.
New York Times May 19, 2010 An Old Chip Cartel Case Is Brought to a Swift End
QUOTE: The European Union fined a group of computer chip makers 331.3 million euros ($409 million) on Wednesday for price fixing in the first use of a new procedure that allows settlement of cartel cases in Europe.
New York Times Oct 07, 2009 U.S. Begins Inquiry of I.B.M. in Mainframe Market
QUOTE: The Department of Justice has started a preliminary investigation into whether I.B.M. abused its monopoly position in the market for the mainframe computers...
New York Times Aug 04, 2009 New petition demands an end to Kindle DRM, faces long odds
QUOTE: It was that decision [by Amazon] to link the Kindle hardware and store with a new DRM scheme that led the Free Software Foundation (FSF) to add the Kindle to its "Defective by Design" anti-DRM campaign.
Ars Technica Sep 17, 2008 EPA Lets Electronic Waste Flow Freely, GAO Report Says
QUOTE: The Environmental Protection Agency has done little to curb the export of discarded electronic products containing hazardous waste, much of which ends up in poorly regulated countries and harms the environment and public health, the Government Accountability Office concluded in a report being released today.
Washington Post Mar 27, 2007 Invasion of the Data Snatchers: Data theft via removable storage devices is a big problem. Are you prepared to prevent podslurping?
QUOTE: Podslurping (a neologism for the illicit copying of data to a portable storage device, such as an iPod) came about with the widespread availability of tiny gadgets with massive storage capabilities and high-speed connections—specifically, USB and FireWire. Endpoint security products, which protect against this kind of misappropriation, tend to be targeted at large enterprises that want to protect sensitive corporate data. Small businesses and individuals are also likely to have data they don't want slurped. Now they, too, can get protection, thanks to the apps reviewed here.
PC Magazine Sep 21, 2006 HP CEO Allowed 'Sting' of Reporter: HP CEO Allowed 'Sting' of Reporter
QUOTE: Hewlett-Packard Co. chief executive Mark V. Hurd approved an elaborate "sting" operation on a reporter in February in an attempt to plug leaks to the media, according to an e-mail message sent by HP Chairman Patricia C. Dunn.
Washington Post Aug 08, 2006 Thompson's Medicaid Reforms Could Benefit His Employers
QUOTE: Tommy G. Thompson, the former secretary of health and human services, proposed overhauling Medicaid in ways that he says would be good for the country. Critics contend that some of Thompson's recommendations also could be good for companies that he works for.
Washington Post Aug 03, 2006 FTC says Rambus monopolized chip market
QUOTE: Federal regulators ruled Wednesday that technology developer Rambus (RMBS) illegally monopolized the worldwide market for computer memory chips, driving its stock down more than 25%.
USA TODAY May 01, 2006 The RFID Hacking Underground: They can steal your smartcard, lift your passport, jack your car, even clone the chip in your arm. And you won't feel a thing. 5 tales from the RFID-hacking underground.
QUOTE: most commercial RFID tags don't include security...It's just not cost-effective for your average office building to invest in secure chips. This leaves most RFIDs vulnerable to cloning or - if the chip has a writable memory area, as many do - data tampering.
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!