While ubiquitous Internet access is extremely convenient and enables marvelous new applications for mobile users, it also creates a major security vulnerability—by placing a passive receiver in the vicinity of the wireless transmitter, that receiver can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages. A passive receiver that records a copy of…
He says that Western companies think they can avoid political risk by spelling out every detail in a contract, but "in Asia, there is no shortcut for managing the relationship."88 In other words, the contract is in the relationship, not on the paper, and the way to ensure the reliability of the agreement is to nurture the relationship. Even a deal that has been implemented for some time may start to get watered down at a time when you cannot do anything about it. A Japanese-led consortium…