Letters To The Editor - InformationWeek
06:45 PM
[Dark Reading Crash Course] Finding & Fixing Application Security Vulnerabilitie
Sep 14, 2017
Hear from a top applications security expert as he discusses key practices for scanning and securi ...Read More>>

Letters To The Editor

Pricing Is Key

All that's mentioned in the article "Next-Gen Wireless Will Threaten Landline Broadband, Study Claims" could come true if, and only if, the wireless service offerings are competitively priced (Jan. 5). We all witnessed how slowly landline broadband entered into households because of its pricing.

Joe Piette
Multimedia Producer
We Energies, Milwaukee

Beware Backup Quick Fix

Business-continuity plans need to deal with all threats, but simply mirroring your data isn't the be-all-and-end-all solution to disaster recovery ("From Good To Great (Maybe)," Jan. 3). Beware the quick fix. Data mirroring also entails mirroring of viruses and corrupt data, since it tends to happen within a few seconds. Sometimes you just have to go back to the old tried-and-true--magnetic tape backup.

Chris Bryant
Senior Distributed Computing Analyst
Fidelity Information Services
Jacksonville, Fla.

A Different Approach

I agree with the anachronism of the code cowboy, which has led to much of the current junk in the IT industry ("Get That Team Spirit," Dec. 6).

The problems we face include worms, viruses, identity theft, and spam, which all rely on an ability to invade the code developed by the cowboys.

By using a numerical approach to application development that uses very little code, you can eliminate the above named problems. It also lends itself to on-demand applications.

Bernie Hodson
President, Genetix Software
Ottawa, Ontario


In "RFID: The Plot Thickens," Ace Hardware Corp. will begin testing RFID and by year's end hopes to pilot the technology at one of its 15 distribution centers (Jan. 3).

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll