12.18

software mistakenly restricted the size of shims to a maximum thickness of 0.061 in.

But very few startups do this, because their investors won’t let them. That brings me to the other dirty not-so-secret of the startup world: when a startup fails, investors try to make back some of their losses by selling the company’s assets to any buyer, no matter how sleazy.

The classification process is determined inside the Intelligence Branch, all by themselves. The Intelligence Branch has full control over what is considered classified information and what is not. The Intelligence Branch defines what is a “national security interest” and what is not. A great technique for hiding fingerprints of corrupt and illegal activity. The Intelligence Branch does all redactions.

Dow is just one of a fast-growing number of companies, nonprofit groups and countries transforming publicly available data into intelligence for strategic and economic advantage. China has the largest, most focused effort, while U.S. spy agencies, with deeply ingrained habits of operating in the shadows, have been slow to adapt to a world in which much of what is important isn’t secret, according to dozens of officials and many studies.

“Companies moving to inland states are doing a much better job of getting new talent, keeping people, and not having to pay hundreds of thousands of dollars to keep someone happy,” Kesteven said. While states previously focused on luring companies to help build a tech hub, they now recognize it’s a multi-pronged strategy that includes attracting human capital, according to the Milken report.

So how have Page and Brin used their newfound freedom? A look inside their worlds reveals two strikingly different empires, each stamped by the interests and inclinations of the man who oversees it. Brin is an inquisitive philanthropist pursuing intellectual curiosities and humanitarian-minded projects; Page has leveraged his vast wealth to retreat from the public eye, ceding day-to-day oversight of his ventures to a small circle of trusted lieutenants. But at their core, the former partners — who still retain control of Alphabet, the $1.2 trillion parent company of Google — share a single overriding similarity: Both rely on a tangled web of corporate entities and family offices that serve to minimize their tax obligations, protect them from liability, and shield their wealth from public view. Their business ventures and personal styles may differ, but their ultimate goal is the same: the freedom to pursue their interests without oversight or restraint. 

Former Twitter employee Ahmad Abouammo was found guilty of spying for the government of Saudi Arabia, according to a report from Bloomberg. The jury handed down its judgment in a San Francisco federal court on Tuesday, where Abouammo was also convicted of conspiracy to commit wire fraud, money laundering, and falsifying records.

EatStreet has also been looking for buyers or new investors, but the search has proven unsuccessful.  “Throughout August, September, and October of 2022, EatStreet continued to engage in discussions with a national entity that expressed interest in purchasing or funding EatStreet,” the company wrote, explaining that fulfilling the settlement agreement would be part of any such deal. 

The Overture Maps Foundation, as the new effort is called, is officially hosted by the Linux Foundation, but the program is driven by Amazon Web Services (AWS), Facebook’s parent company Meta, Microsoft and Dutch mapping company TomTom.

But the original Queen of the Skies was the creation of a very different Boeing, a very different Seattle. The company was headquartered here, and it was by far the most important employer in Jet City and the entire region. Not only that, but the 747 entered service amid the Boeing Bust, as the company was cutting jobs after years of rapid growth slammed into low gear. More than 60% of the workforce was laid off, and the company was close to seeking bankruptcy protection.

According to Mudge, Twitter’s information security was essentially nil. In his report, he alleges that many employees installed spyware on work computers at the behest of external organizations. And because Twitter didn’t actively monitor employee devices, it mostly discovered such spyware by accident. This spyware—essentially a malicious program that logs user activity and steals data—could have been used by rival social media firms or foreign governments to access sensitive information on users, including their addresses, phone numbers, physical location of their last login, and financial information. And the spyware’s access to Twitter’s systems, Mudge says, could have been exacerbated by the fact that many employees had disabled security updates, firewalls, and settings that would have prevented unauthorized users from remotely controlling their computers.

The Great Barrington Plan: Would Focused Protection Have Worked?

And there you have it, Ms. Sosa: twenty of the Texanist’s favorite Christmas songs by Texans. He knows it’s more than what you requested, but, like so many Christmas-minded Texas musicians, the Texanist is a generous sort. Happy holidays!