Letters To The Editor - InformationWeek
IoT
IoT
Other
Commentary
2/11/2005
02:10 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

Letters To The Editor

Linux Challenges

One can measure the results of different development environments in a number of ways, such as lines of code, function points, and show-stopping bugs ("Torvalds And Linux Heavyweights Sound Off At Open-Source Summit," Feb. 1).

Many, including myself, wish to move to the Linux development mode but are limited by the reduced productivity of C-based languages. The Mono project is looming large as one key solution to this problem.

Use of patents as a weapon against Linux, however, is a very different and serious problem that may jeopardize the future security of the United States. Having a single system vendor (Microsoft) is a guarantee of extinction, as any student of genetics should be able to explain.

Robert W. Carter Senior System Developer
U.S. Army, Darnall Hospital
Fort Hood, Texas


Browser Watch

I develop Web sites and applications, and keeping tabs on browser market share is critical ("Browser Wars," Jan. 31). It tells us what customers are using and affects all development and testing because whatever technologies are used must be cross-checked between each browser's implementation.

Understanding market share tells you what browsers you need to internally test before considering an application ready for a production environment.

Ken Hekking Senior Systems Analyst
AvMed Health Plans
Gainesville, Fla.


Paper Trail

Just wondering why the Georgia court didn't go with document imaging and get rid of paper altogether ("Court Puts RFID On The Docket," Jan. 31)? Did it do a cost analysis between the two approaches? Seems to me that it's automating a problem instead of developing a viable solution. Unless, of course, Georgia doesn't recognize digital images as being legal.

Richard Staron Information Systems Manager
Hartford, Conn., Public Library

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll