If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Bloomberg)   Next year, the military will finally let Jeff Goldblum put his PowerBook on their networks so he can blow up the alien mothership   (bloomberg.com) divider line 10
    More: Spiffy, Jeff Goldblum, PowerBook, Google, mobile computing, Apple iPad, positive feedback, wireless devices, General Dynamics  
•       •       •

2033 clicks; posted to Geek » on 27 Feb 2013 at 9:37 AM (1 year ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



10 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread
 
2013-02-27 09:42:20 AM
Um, um.... Ahhhh!
 
2013-02-27 09:42:33 AM
Maybe my company will do the same in the next decade, once we upgrade from XP.
 
2013-02-27 10:11:24 AM
Blackberry suffers yet another, of many defeats.
 
2013-02-27 10:13:51 AM
The Pentagon said it wants employees to have the flexibility to use commercial products on its systems, including its classified network for the first time.

Um, the military would be one sector where I'd like a closed network, despite the inefficiency.  Those mobile devices are manufactured in the runaway #1 source of cybersecurity threats.
 
2013-02-27 11:51:15 AM

dragonchild: The Pentagon said it wants employees to have the flexibility to use commercial products on its systems, including its classified network for the first time.

Um, the military would be one sector where I'd like a closed network, despite the inefficiency.  Those mobile devices are manufactured in the runaway #1 source of cybersecurity threats.


It depends on how they're managed.  Lets be honest, just because we're talking about them letting iOS & Android devices on their network(s) doesn't mean it's going to be stock iOS or Android or that management of them is left to the end users.
 
2013-02-27 11:55:42 AM

dragonchild: Um, the military would be one sector where I'd like a closed network, despite the inefficiency. Those mobile devices are manufactured in the runaway #1 source of cybersecurity threats.


Citation needed.  I would suspect the number one source of cybersecurity threats are the human beings who use the devices.
 
2013-02-27 12:28:42 PM

dragonchild: Those mobile devices are manufactured in the runaway #1 source of cybersecurity threats.


Yeah - what if their CPUs were modified, introducing security holes, by someone in the factory in the People's Republic of Austin?
 
2013-02-27 03:05:43 PM

labman: Citation needed.


I work for a CDN.  This isn't exactly a secret -- China hates us.

dbirchall: what if their CPUs were modified, introducing security holes, by someone in the factory in the People's Republic of Austin?


That would be a particularly dumb way to go about it.
 
2013-02-27 03:31:35 PM
, save Earf.
 
2013-02-27 08:32:41 PM

labman: dragonchild: Um, the military would be one sector where I'd like a closed network, despite the inefficiency. Those mobile devices are manufactured in the runaway #1 source of cybersecurity threats.

Citation needed.  I would suspect the number one source of cybersecurity threats are the human beings who use the devices.


Which is pretty much why mobile devices of any kind don't belong on the classified net.  They want them on the unclassified side, fine.
 
Displayed 10 of 10 comments

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »






Report