http://www.w3.org/ns/prov#value | - by bluefoxlucid (723572) writes: The article says every interaction an IT person has with a computer involves some sort of analysis and investigation into computer-based non-public data, i.e. examination of the state of your computer to see if it contains a virus infestation (the viruses YOU HAVE are computer-based, and not public; not to mention I am looking at the programs you have installed
|