From Our Blog - InformationWeek
IoT
IoT
Other
Commentary
5/26/2006
03:50 PM
Commentary
Commentary
Commentary
50%
50%

From Our Blog

Terrorist Connections: Find Them Yourself
informationweek.com/1091/blog_terrorist.htm

I note with displeasure that data mining, in all the instances J. Nicholas Hoover cites in his article, seems to be best at predicting things that have already happened. One could say the same for the predictions of Nostradamus.

I'm not convinced that whatever government is in power wouldn't use data mining to keep track of its political enemies and work to discredit and undermine them. The link between this noxious narking and public safety isn't merely tenuous--it's conspicuously absent.

It's a disservice to America to promote the use of data mining to justify intensifying the witch-hunt that has become American politics. For this, Mr. Hoover must be censured. We do not need to make an IT business out of the secret political police. --Peter Rogan

Microsoft's Not The Only Game In Town
informationweek.com/1091/blog_game.htm

I don't share your obsession with ridding the world of what you in the press have monikered the "Evil Empire." For what purpose should I make my life more difficult? As a general rule, Microsoft's claim to fame is they get it done, and it all works together with less effort and pain. Use non-Microsoft operating systems and other software when it makes sense, but don't make your life harder just to prove a dubious point.

Security? That mostly requires common sense, using knowledge and Internet Explorer 7. Only fools think they get total security with Apple, Linux, or another browser. In the long run, there's no secure operating system or browser without some knowledge and common sense in setup and usage.

I really try to not get involved with anti-Microsoft prejudice, hate-speak, and agenda. I'm too busy trying to earn a living. Let's just get back to work. --David T. Bauman

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll