On 27 May 2008 07:28:24 -0700, [EMAIL PROTECTED] (Hal Merritt)
wrote:

>Some potential good news is that auditors may be (finally) starting to apply 
>the same rules to the tinkertoys as the MF. 

The security solutions that need to protect data on a stolen laptop
are not the same security solutions that we have developed for a
mainframe.    But some of those solutions may be applicable to all
sizes of computers.  

When the auditor's rules are implemented for all sizes of computers,
then the cost-benefit analysis will be more straightforward.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to