A Quote by John W. Thompson

First, our focus on security is on the infrastructure itself. So it is all about how you protect the network, the device, and the application that is riding on the server.
It's always been government's role to protect the security of the nation. And cyber-attacks is a security issue, from our perspective. And it's a security issue of particular concern with respect to the nation's core critical infrastructure, the infrastructure everyone relies on, the energy sector, the telecommunications sector, the banking sector.
In addition to transitioning to the cloud, our customers continue to invest in premium versions of our on-prem server products like Window Server, System Center and SQL Server.
When we talk about computer network exploitation, computer network attack, we're not just talking about your home PC. We're talking about your cell phone, and we're also talking about internet routers themselves. The NSA is attacking the critical infrastructure of the internet to try to take ownership of it. They hack the routers that connect nations to the internet itself.
I think we will have to spend more on defense, for infrastructure, for extension of the broadband network and also for domestic security.
Good design is also an act of communication between the designer and the user, except that all the communication has to come about by the appearance of the device itself. The device must explain itself.
How do we address network neutrality when the whole world is connected? How do we ensure governments don't purloin this for political purposes? It's already happening. Look at Russia on the American election. How do we protect data security when everyone's connected? Look what happened with the ransomware. How do we deal with cybercrime and cyberterrorism and the disruptions of the system? And we're seeing this every week now.
If operating in a network environment, do not place public domain or shareware programs in a common file-server directory that could be accessible to any other PC on the network.
I saw lots of music devices. I loved playing with music devices. And like most of the world, I thought of a music device as a music device. Steve Jobs tends to look beyond that, and he doesn't see a music device as having any importance at all - how fast it is, how many songs it can hold, and all that - he sees music itself to a person as a being the important thing.
Often people, especially computer engineers, focus on the machines. But in fact we need to focus on humans, on how humans care about doing programming or operating the application of the machines.
Our efforts to preserve and protect the Alamo are first and foremost about preserving and protecting the story of the battle itself.
When people conceptualize a cyber-attack, they do tend to think about parts of the critical infrastructure like power plants, water supplies, and similar sort of heavy infrastructure, critical infrastructure areas. And they could be hit, as long as they're network connected, as long as they have some kind of systems that interact with them that could be manipulated from internet connection.
I believe that as a nation we must have a bipartisan discussion about how to best preserve and protect Social Security for our seniors and for future generations of Americans.
Finally, here at home, in one of her first decisions as Secretary of State, she set up a private e-mail server in her basement in violation of our national security. Let's face the facts: Hillary Clinton cared more about protecting her own secrets than she cared about protecting America's secrets.
Our country has laws to protect whistleblowers and to protect the security of our elections, both of which are fundamental to our democracy.
You are part of the first generation of officers to begin your service in a world where the effects of climate change are so clearly upon us. Climate change will shape how every one of our services plan, operate, train, equip, and protect their infrastructure, today and for the long-term.
It's sad to think right now, but probably the Russian and Chinese government know more about Hillary Clinton's e-mail server than do the members of the United States Congress. And - and that has put our national security at risk.
This site uses cookies to ensure you get the best experience. More info...
Got it!