To determine if it's possible or probable for worms to affect our computers. (One famous bit of malicious code required the recipient to read the fake E-mail and physically follow the instructions to manually delete critical files.)
Because the abilities claimed are useful to a business and far superior to what our expensive commercial programs and computers are able to do (for example, to alter a form message so that multiple recipients get a slightly different personalized version).
Only through knowledge can we seriously understand the threat.
James F. Boylan
General Freight Agent, Tyburn Railroad Co., Fairless, Pa.
If Wal-Mart, General Motors, etc., decide on six different standards, can we afford to implement all six? Can we afford not to? There is the potential for a horrible mess.
Perhaps we will have to decide whom we can afford to do business with.
Richard B. Gilbert
VMS System Manager, RapidForms, Thorofare, N.J.
"A system that works" is the most appropriate definition of a legacy system ("Taming The Beast," June 9, 2003). How will many of today's systems ever work, let alone keep working well enough to run companies for years?
Robin F. Goldsmith
Go Pro Management, Needham, Mass.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.