To determine if it's possible or probable for worms to affect our computers. (One famous bit of malicious code required the recipient to read the fake E-mail and physically follow the instructions to manually delete critical files.)
Because the abilities claimed are useful to a business and far superior to what our expensive commercial programs and computers are able to do (for example, to alter a form message so that multiple recipients get a slightly different personalized version).
Only through knowledge can we seriously understand the threat.
James F. Boylan
General Freight Agent, Tyburn Railroad Co., Fairless, Pa.
If Wal-Mart, General Motors, etc., decide on six different standards, can we afford to implement all six? Can we afford not to? There is the potential for a horrible mess.
Perhaps we will have to decide whom we can afford to do business with.
Richard B. Gilbert
VMS System Manager, RapidForms, Thorofare, N.J.
"A system that works" is the most appropriate definition of a legacy system ("Taming The Beast," June 9, 2003). How will many of today's systems ever work, let alone keep working well enough to run companies for years?
Robin F. Goldsmith
Go Pro Management, Needham, Mass.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.