Letters To The Editor - InformationWeek
IoT
IoT
Business & Finance
Commentary
11/24/2004
05:35 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

Letters To The Editor

Don't Wait Till It's Too Late

All too often we fail to keep our priorities straight ("A Thanksgiving Kiss To Our Reader-Partners," Nov. 15). Countless late nights, missed dinners, and precious moments in our kids' growing up. Too soon they're older, too late we're smarter. It's then that all too many of us realize what we missed.

Russ Sherrill Senior VP
Middlesex Savings Bank
Natick, Mass.


Beyond Cost Savings

This article gives the impression that IT-staff training costs offset the cost benefits of using open-source systems such as Linux ("In Search Of Open-Source Experts," Nov. 8). This may be true, but it's not a Linux or open-source deficiency. Judging open source simply on cost savings is looking at only one aspect. The freedom to choose and the opportunity to know what the code does is unparalleled in proprietary systems.

David Krings Software Support Engineer
Locknetics
Forestville, Conn.


Unfair Example

A free market means a marketplace with little state or governmental control, in which most businesses won't be state owned ("Outsourcing Has A Place In Business," Oct. 25). China isn't even close to a free market. It's a sham to try and defend outsourcing if the markets aren't on equal footing.

Richard Gonzales IT Director
Mountain States Employers Council
Denver


Corrections

  • In "Intel Grooms Itanium 2 For Unix Showdown," Madison's on-chip memory is 9 Mbytes (Nov. 15).

  • In "Embracing Storage," Microsoft Data Protection Server is a separate product that runs on top of Windows and will be available next year. Jeff Price is a senior director in the Windows Server Division (Nov. 15).

  • The graphic in "TV's Election Perk: 3-D Map" was created by CBS (Nov. 8).

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    How Enterprises Are Attacking the IT Security Enterprise
    How Enterprises Are Attacking the IT Security Enterprise
    To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
    Register for InformationWeek Newsletters
    White Papers
    Current Issue
    IT Strategies to Conquer the Cloud
    Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
    Video
    Slideshows
    Twitter Feed
    Sponsored Live Streaming Video
    Everything You've Been Told About Mobility Is Wrong
    Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
    Flash Poll