We Energies, Milwaukee
Beware Backup Quick Fix
Business-continuity plans need to deal with all threats, but simply mirroring your data isn't the be-all-and-end-all solution to disaster recovery ("From Good To Great (Maybe)," Jan. 3). Beware the quick fix. Data mirroring also entails mirroring of viruses and corrupt data, since it tends to happen within a few seconds. Sometimes you just have to go back to the old tried-and-true--magnetic tape backup.
Senior Distributed Computing Analyst
Fidelity Information Services
A Different Approach
I agree with the anachronism of the code cowboy, which has led to much of the current junk in the IT industry ("Get That Team Spirit," Dec. 6).
The problems we face include worms, viruses, identity theft, and spam, which all rely on an ability to invade the code developed by the cowboys.
By using a numerical approach to application development that uses very little code, you can eliminate the above named problems. It also lends itself to on-demand applications.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
InformationWeek Tech Digest, Nov. 10, 2014Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?