Trustbusting
Richard Radcliffe thinks that times may be changing for Microsoft, thanks to credible competition from Linux systems.
July 16, 2004
Teach the Coders
Regarding Mike Lee's column "Software With Security in Mind" (April 1, 2004), I agree that most programmers aren't adequately trained to write secure software. But rather than bash the coders, why not refer them to appropriate training programs? For example, they could be taught the Personal Software Process and the Team Software Process, methodologies aimed at helping developers produce higher-quality code more quickly.
True, someone will have to pay for the training. But if we get the word out, more organizations will be amenable to providing it.
Let's teach programmers to write clean code the first time around. Patch management can be left for enhancements and changes in post-delivery requirements.Suzanna J. Springer
CMMI Coordinator
AnviCom
No Bones About It
I loved Hunter Metatek's column "Our Own Worst Enemy" (July 8, 2004). He's done a great service for those of us who keep advising, "No unannounced/ unplanned exercises."
Boneyards are littered with the skeletons of executives who didn't listen.John Laye
Managing Partner
Contingency Management Consultants
[email protected]
Bravo, Barracuda
Thanks for the great review of spam filters ("Taking a Bite out of Spam," May 13, 2004). We went with your Editor's Choice and bought Barracuda Networks' Spam Firewall 300 after examining other products that offered fewer features for triple the price.
It didn't take us long to discover that 70 percent of the e-mail we get is junk.Phil Brossman
LAN/WAN Manager
The Health Plan
[email protected]
Correction
Adtran's NetVanta 1224STR switch-router ("Adtran Extends Its Reach to the LAN," June 24, 2004) supports OSPF routing if configured to do so from the command line.
Tell us how you really feel. Send e-mail to us at [email protected], fax to (516) 562-7293 or mail letters to Network Computing, 600 Community Drive, Manhasset, NY 11030. Include your name, title, company name, e-mail address and phone number. All correspondence becomes the property of Network Computing.
You May Also Like