>There's also the question of being able to check the credentials of the
outsourcing provider's employees. 

>I wonder how hard it would be for someone to slip into the outsourcing
organisation intent on a little commercial terrorism relating to
application 
>development for major financial institutions who maybe clients? Hasn't
happened yet but more damage could probably be done with a little bit of
coding 
>compared to a bombing.

Ok, I know I should be more serious but this statement made me think
.... Judging by some of the code I've seen from application developers
... How could we tell?  

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to