Feeds

HP's Fiorina calls for governments to change policies

Describes a new renaissance caused by IT

  • alert
  • submit to reddit

High performance access to file storage

WCIT 2000 Carly Fiorina, CEO of Hewlett Packard, today described changes caused by the Internet as creating a new renaissance, but said that world governments needed to change their policies to create "boundary-less and "border-less" states.

Fiorina said, quoting Charles Darwin, that survivors in this new renaissance would not necessarily be either the strongest or the most intelligent, but those who could adapt the quickest.

"I do believe that governments have recognised the benefits of IT," she said. "but they do not yet truly understand about the need to re-invent their own institutions. It is not because governments are obstinate, but because government power is rooted in things that IT now makes increasingly irrelevant."

She said that boundaries of time, space and geography are less and less relevant to both government and to industry. "Governments must now think about policies being compatible across the world," she said. "This is a problem that government has only just begun to recognise. There should be a recognition that public policy is more boundary-less and that industry and government must collaborate together in new and inventive ways.

"That is easier said than done because industry and government have traditionally regarded each other with suspicion," she said.

"I believe that we are entering the renaissance," she said. "Technology is now entering its transformational phase. It can touch human lives and transform everyone and everything. Internet infrastructure must be as available as oxygen and as reliable as the sun and the moon. This world is bringing forth a torrent of new creativity."

Fiorina said that HP had promoted efforts to admit both mainland China and Taiwan to the World Trade Organisation (WTO), and that would ultimately promote better relations between the two countries, as well as fostering the welfare of their respective populations.

She declined to be drawn on the issue between Microsoft and the US government, saying: "I think what should guide policy with Microsoft is always that it should benefit consumers." ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.