— Christian Grothoff, who co-wrote an article for the German online news site Heise, speaking in an interview about a British spy program.
Victory is mine!
"It is a frothy, hot market. I suspect if you participated in these projects and got code into it you'd be highly sought after by a large number of companies. There's just all upsides to participating in these projects, which is why you see so many people doing it."
- Jim Zemlin, executive director of The Linux Foundation, regarding advice from hiring managers that IT job seekers should contribute to open-source projects.
Cast into the Gorge of Eternal Peril
"Passwords are a complete waste of time. They are the equivalent of signing the back of a credit card."
- Mark Morrison, senior vice president and chief information security officer at financial service firm State Street Corporation, during a panel discussion on enterprise security.
We shall attack at once
"I don't think the FCC is serious about Title II. I think they're going through the motions of including it ... so they can tell the angry mob outside their gates that they considered this option."
- Berin Szoka, president of free-market think tank TechFreedom on the FCC reclassifying broadband as a regulated utility, which some net neutrality advocates have urged the agency to do.
And now for something completely different
"They explained that if men want to put a large phone into their jeans, it has to be able to fit their buttocks. This is a company ranked worldwide number 1, number 2 in displays, and their marketing says this."
- Foxconn CEO Terry Gou, mocking curved smartphones.
Run away! Run away! Parts 2 and 3
"Perhaps the most bone-chilling evidence we collected in this campaign was the targeting and compromise of transportation networks and systems such as airlines and airports in South Korea, Saudi Arabia and Pakistan. The level of access seemed ubiquitous: Active Directory domains were fully compromised, along with entire Cisco Edge switches, routers, and internal networking infrastructure."
- IT security firm Cylance in a detailed report about a campaign by Iranian hackers.
"The Operation Cleaver report documents how Iran is the first highly motivated Western world adversary poised to execute serious attacks against global infrastructure, not just targeting the United States, but the critical infrastructure of over a dozen different countries. They aren't looking for credit cards or microchip designs, they are fortifying their hold on dozens of networks that if crippled would affect the lives of billions of people."
- Cylance CEO and President Stuart McClure in a blog post about the hacking campaign, dubbed Operation Cleaver.
Sign up for Computerworld eNewsletters.