<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-2">
<META content="MSHTML 6.00.2900.2180" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2><IMG alt="drawing" hspace=0
src="cid:001b01c73e23$816cff10$c5633e45@uvoq" align=baseline
border=0></FONT></DIV>
<DIV><FONT face=Arial size=2>and Massive Data Sweep, albeit with a different
twist.</FONT></DIV>
<DIV><FONT face=Arial size=2>House Energy and Commerce Committee passed
legislation forcing data brokers to disclose security breaches to the
public.</FONT></DIV>
<DIV><FONT face=Arial size=2>in just over 15 months.</FONT></DIV>
<DIV><FONT face=Arial size=2>A new database security gadget that allows for
proactive hack blocking has hit the market, with Crossroads Systems announcing its
StrongBox SecurDB on Feb. We are forced to provide the IRS with information about
our salary and more because it is our civic duty to pay taxes that fund our
government and the social services that go along with them. When unstructured data
is added to the mix data management becomes more complicated because unstructured
data is usually large and unwieldy as compared to numeric and alphanumeric
data.</FONT></DIV>
<DIV><FONT face=Arial size=2>Sponsored by: Links to external sites are subject
to change; DBAzine.</FONT></DIV>
<DIV><FONT face=Arial size=2>What about other options?</FONT></DIV>
<DIV><FONT face=Arial size=2>Government operations, financial institutions, and
insurance and health companies usually are more conservative than other types of
companies.</FONT></DIV>
<DIV><FONT face=Arial size=2>Now these are issues that are near and dear to my
heart.</FONT></DIV>
<DIV><FONT face=Arial size=2>So what steps are you taking to become more
knowledgeable about business instead of just being a tech geek? I think we may need
a penalty wherein any company that has data stolen from it owes monetary damages to
anyone whose records were breached.</FONT></DIV>
<DIV><FONT face=Arial size=2>For example, an Excel Spreadsheet might use a
secure method to obtain data - but how is the spreadsheet itself to be controlled? A
SSWUG reader brought this site up and after reading it over I think it is a very
nice starting point for DBAs, as well. The article describes an effort called
ADVISE, which is an acronym for a little-known system called Analysis,
Dissemination, Visualization, Insight, and Semantic Enhancement.</FONT></DIV>
<DIV><FONT face=Arial size=2>I try to avoid making predictions about the future
of technology for many reasons.</FONT></DIV>
<DIV><FONT face=Arial size=2>The penalty may not be the same, but a stiff
penalty is needed.</FONT></DIV>
<DIV><FONT face=Arial size=2>Do you speak up and maybe lose your job? For
example, who among us feels comfortable scanning database log records to produce
database audit reports?</FONT></DIV>
<DIV><FONT face=Arial size=2>I delivered two DB2 presentations at SHARE this
week and I enjoyed speaking to different folks than I see at the regional DB2 user
groups and IDUG.</FONT></DIV>
<DIV><FONT face=Arial size=2>So what is being done about all of these data
breaches?</FONT></DIV></BODY></HTML>