Letters To The Editor - InformationWeek
IoT
IoT
Business & Finance
Commentary
3/4/2003
02:07 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
IP Intelligence: The Utility Player for Your Online Business
Aug 31, 2017
Join us as we explore the many benefits of IP Intelligence, and how you can use IPI to improve you ...Read More>>

Letters To The Editor

Where The Jobs Are
The editorial on technology careers couldn't have been more timely ("Technology Will Remain Vital," April 21, p. 8; informationweek.com/936/stahl.htm). Unfortunately, many graduates don't explore careers in the public sector, specifically in law enforcement.

Our "business" is information, and technology has made a significant difference as to how we do our jobs. Law enforcement's demand for technology graduates continues to grow. The work is both exciting and rewarding.
Carl R. Baker
Chief of Police, Chesterfield County, Va.



Things Have To Improve
As someone who has been in the programming and system field since 1969, it has never been this bad ("Critical Path," April 21, p. 36; informationweek.com/936/career.htm).

There are two main causes: the overhyped Y2K event and the perceived shortage of competent technical workers. The first caused a lot of misguided panic spending. The second caused companies to look overseas for help.

There is a sufficient number of good techies. Of course, many aren't good. In the Y2K panic, companies brought in a lot of underqualified, overpaid bodies. We're all suffering the backlash.

I was laid off in 2001. I'm working as a part-time instructor. My students can't find summer internships in the field. The campus placement office can't find homes for graduates. I tell my students that things have to get better.
Michael Klaene
Instructor, Cabrini College, Downingtown, Pa.



Separate, Secure System
We keep reading these articles on security in InformationWeek and other publications. Surely we're not the first company to set up (years ago) a separate system for company records and tax accounting, with controlled access separate from our online systems, rather than set up elaborate protection on a totally networked system that can be hit from the outside.

So far, so good.
J. Pat Geis
Principal, Energy Design Group, Santa Rosa, Calif.



Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll