From Our Blog - InformationWeek
IoT
IoT
Other
Commentary
5/26/2006
03:50 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

From Our Blog

Terrorist Connections: Find Them Yourself
informationweek.com/1091/blog_terrorist.htm

I note with displeasure that data mining, in all the instances J. Nicholas Hoover cites in his article, seems to be best at predicting things that have already happened. One could say the same for the predictions of Nostradamus.

I'm not convinced that whatever government is in power wouldn't use data mining to keep track of its political enemies and work to discredit and undermine them. The link between this noxious narking and public safety isn't merely tenuous--it's conspicuously absent.

It's a disservice to America to promote the use of data mining to justify intensifying the witch-hunt that has become American politics. For this, Mr. Hoover must be censured. We do not need to make an IT business out of the secret political police. --Peter Rogan

Microsoft's Not The Only Game In Town
informationweek.com/1091/blog_game.htm

I don't share your obsession with ridding the world of what you in the press have monikered the "Evil Empire." For what purpose should I make my life more difficult? As a general rule, Microsoft's claim to fame is they get it done, and it all works together with less effort and pain. Use non-Microsoft operating systems and other software when it makes sense, but don't make your life harder just to prove a dubious point.

Security? That mostly requires common sense, using knowledge and Internet Explorer 7. Only fools think they get total security with Apple, Linux, or another browser. In the long run, there's no secure operating system or browser without some knowledge and common sense in setup and usage.

I really try to not get involved with anti-Microsoft prejudice, hate-speak, and agenda. I'm too busy trying to earn a living. Let's just get back to work. --David T. Bauman

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll