Abstract
Computer security threats are omnipresent, dangerous and continuing to grow at an alarming rate; one leading virus protection vendor received more than 18,000 virus reports in the first week of 2006. Keeping ahead of these threats can be a daunting task. It requires managing complex time- and data-consuming activities. Unfortunately, many of us have limited resources of time, money, tools and training to deal with computer security needs. Users groups have products and services in place to disseminate vast amounts of technical knowledge and information to their members. These groups specialize in technical areas such as enterprise management, networking and security. A user group also has clout to address the problems of its members when dealing with computer vendors. Since the scientific community uses computers in a myriad of ways, from data collection, analyzing, modeling and publication of results, when scientists participate as members of user groups, both communities receive the benefit of cross-pollination. Everyone can save time, leverage money and reduce mistakes when combating computer security problems. SC.
Cite
CITATION STYLE
McDilda, W. (2006). A port in the storm. Scientific Computing, 23(5), 31–32. https://doi.org/10.1115/1.1999-nov-5
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.