<iframe allowfullscreen="" frameborder="0" height="270" src="http://www.youtube.com/embed/qInGXZjmXv8?fs=1" width="480"></iframe>
This can become a V-B interaction, V media companies team up to make copyright where information such as programs, songs, books, movies, etc are GB privately owned. There is also G public property like this, for example open source software or books out of copyright.
So a V computer like this confronts an underground B that works on deception and secrecy, they might share files on peer to peer and scatter if there is an attack by V on this sharing. With V-B the result is unstable, often B though weaker can win by being deceptive and hidden. For example B home buyers used liar loans to get money from V Wall Street, V thought they were ripping off the B home buyers.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.