We should have zero tolerance toward anyone making unauthorized attempts to access our networks ("To Catch A Hacker," May 15). An unauthorized port scan can be compared to a stranger going up to your house in the middle of the night and checking to see if your windows are locked. If the stranger is successful in gaining access, he's not an activist, he's a criminal.
Bradley G. Ouimette
Security Network Engineer
I came to the United States five years ago under an H-1B visa ("Job No. 1 For The U.S.: Build A Tech Workforce," May 8, p. 68; informationweek.com/1088/preston.htm). While I've been here working full time, I went after the top certifications in the industry, and I finished a master's degree. My salary is only expected to go up, and the future should look OK, however, ... H-1B workers are subject to a ridiculously long process to gain resident rights. Meanwhile, their spouses aren't allowed to work or study.
My wife and I could move to a country with lower per capita income and make more money. And we will.
Those of us who are the most brilliant can choose any place in the world. And the choice is not the United States anymore.
Juan B. Gutierrez
Information Systems of Florida
The Price Of Security
I appreciate a reasonable perspective on phone call monitoring ("Consider The Known Facts Before Skewering The Feds," May 22). I'm very worried about terrorist activity, and the only way to deter this activity is to use all available tools, including telephone monitoring. Though we citizens don't like to yield some of our privacy, at some point reasonable people will understand that extraordinary measures must be taken to deal with extraordinary crime.
Purchasing Agent, Austin AECOM
The question about who's in control is key. Humans control technology, and that's where moral uncertainty creeps in. The creation of knives was clearly a good advance even though some people subvert this good for their own evil intentions. Others simply suffer from accidental misuse.
David A.E. Wall
In "New Analysts On The Block," Burton Group's Inflection Point offers free podcasts to both clients and nonclients (May 22).
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.