Letters To The Editor - InformationWeek
IoT
IoT
Hardware & Infrastructure
Commentary
2/25/2005
06:20 PM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

Letters To The Editor

RFID's Bright Future

All technology, whether gunpowder or RFID, is benign without the hand of mankind using or abusing them ("RFID: Time To Take A Stand," Feb. 21). Our job is to anticipate the abuses and make provisions to control them.

RFID will be put to use in many wonderful and helpful ways. I'll leave the dark uses of RFID for those minds that are better suited to such thoughts. I choose to focus on the bright potential.

Thomas J. Kraft
Fishmonger, Norpac Fisheries Export
Honolulu


Open To Abuse

Forget government surveillance, what about the potential private-sector abuses of RFID?

Some companies are already firing employees, or not hiring applicants, who smoke only at home. If the courts allow this, is it unreasonable to suspect that insurance companies or employers, given access to consumer-purchase histories via RFID technology, might also target other private behaviors perceived as increasing health risks, such as excessive fat or calorie consumption?

Gregory E. Senko
Enola, Pa.


Less Than Trustworthy?

It's interesting that John Foley chose to quote Kyle Ohme of Freeze.com ("You Call This Trustworthy Computing?" Feb. 14). He was eager to slam Microsoft's vulnerabilities, while quoting an individual whose site provides a haven of downloadable adware programs. Mr. Ohme's site is responsible for hundreds of hours of spyware and antivirus cleanup at our organization. We now block access to his site and his products.

Scott Larsen
Aurora, Colo.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll