Letters To The Editor - InformationWeek
IoT
IoT
Business & Finance
Commentary
11/29/2003
11:52 AM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Threat Intelligence Overload?
Aug 23, 2017
A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to ...Read More>>

Letters To The Editor

Safeguard Information
Gartner expects that the human-resources market will account for 39% of all business-process-outsourcing revenue in 2004 ("HR Outsourcing Ready To Catch A Big Wave"). That's a large volume of information about private individuals flowing out of the country. What safeguards are on this information once it's out of the country? If individual data from HR files is compromised, this can be used to create fraudulent identification to enter this country.

If we overlook the homeland security issues here, surely the personal abuses outweigh any benefits. Would the company that outsourced its HR functions even be held liable in any event?
Mark Kamerer
Network Engineer, BellSouth, Sunrise, Fla.



Downward Pressure
The vast majority of new engineering hires in the IT industry over the last three years have gone to H-1B and L-1 workers who work for less than new computer-science graduates were offered in 1999 and half of what experienced programmers typically have earned ("The Programmer's Future").

Companies that hire H-1Bs and use L-1 visa holders can't compete against the wage levels of firms in India, but they can destroy any U.S. firm that hires mainly U.S. citizens.
Harrison Picot
Principal Engineer, Alcyon Technologies, Haymarket, Va.



Memory Failure
A couple of years ago I put a lot of pictures on a rewriteable CD and went back about 12 to 15 times to change them ("Time To Check Your CDRs"). Then they all disappeared suddenly! The file allocation table had somehow been destroyed, and I lost everything. I made the mistake of doing the same thing again with another make a few months later. The same thing happened again after a few rewrites. I've never used rewriteable CDs again.
Bob Dutru
Niagara Falls, Canada



Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll