Letters To The Editor - InformationWeek
IoT
IoT
Business & Finance
Commentary
11/29/2003
11:52 AM
Commentary
Commentary
Commentary
50%
50%
RELATED EVENTS
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

Letters To The Editor

Safeguard Information
Gartner expects that the human-resources market will account for 39% of all business-process-outsourcing revenue in 2004 ("HR Outsourcing Ready To Catch A Big Wave"). That's a large volume of information about private individuals flowing out of the country. What safeguards are on this information once it's out of the country? If individual data from HR files is compromised, this can be used to create fraudulent identification to enter this country.

If we overlook the homeland security issues here, surely the personal abuses outweigh any benefits. Would the company that outsourced its HR functions even be held liable in any event?
Mark Kamerer
Network Engineer, BellSouth, Sunrise, Fla.



Downward Pressure
The vast majority of new engineering hires in the IT industry over the last three years have gone to H-1B and L-1 workers who work for less than new computer-science graduates were offered in 1999 and half of what experienced programmers typically have earned ("The Programmer's Future").

Companies that hire H-1Bs and use L-1 visa holders can't compete against the wage levels of firms in India, but they can destroy any U.S. firm that hires mainly U.S. citizens.
Harrison Picot
Principal Engineer, Alcyon Technologies, Haymarket, Va.



Memory Failure
A couple of years ago I put a lot of pictures on a rewriteable CD and went back about 12 to 15 times to change them ("Time To Check Your CDRs"). Then they all disappeared suddenly! The file allocation table had somehow been destroyed, and I lost everything. I made the mistake of doing the same thing again with another make a few months later. The same thing happened again after a few rewrites. I've never used rewriteable CDs again.
Bob Dutru
Niagara Falls, Canada



Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll