« Chrome Doesn't Work -- For Me | Main | What It Takes to be a Simulation Engineer »

Sep 03, 2008

Comments

KennethWong

High tech espionage or just clumsy handling of sensitive info? I'm waiting for the sequel to this mystery. :-)

Steve Johnson

Ah, a good old mud-slinging contest, what fun! I don't care who wins, but somebody pass me the popcorn. I have a couple of questions:

- How do you "return" a list that's presumably an electronic copy?

- How does Dassault know what's on Siemens' intranet?

Finally, I should point out that stating that an allegation "could not be confirmed" is not at all the same thing as a denial.

R. Paul Waddington

"High tech espionage or just clumsy handling of sensitive info?", it had to be one of these, a person showing some intent or,
was it simply that De'Salt use 'A Desk' product and Zeemans has managed to use CIP to mine and transmit the data? ;-)

Pass the popcorn indeeeeeed ;-)

Bash Outsourcing

Its interesting that no reader seems to have noticed the irony of (presumably) a Frenchman stealing proprietary customer info - far more lethal than source code -from a French company in France and giving (selling?) it to a German company. If the same had been done by an employee of a company in Asia that's doing outsourced software development for the same French company, all hell would have broken loose, dont you think? You would have heard all the 'smart' folks all over the western world talk about how 'outsourcing' is a huge threat for 'intellectual property'. No? Speak up, ladies & gentlemen.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

Comments are moderated, and will not appear until the author has approved them.

Your Information

(Name is required. Email address will not be displayed with the comment.)

Advertisements


Search This Blog


  •  

Translate

Thank you for visiting!