Security goes to the movies: Iron Man
Film geek and security nerd square off in a cinematic smackdown
Computerworld - Time once again for "Security Goes to the Movies," a leisurely look at the inevitable bleeding from the eyes that security folk experience when Hollywood takes liberties with technology, the laws of physics and other aspects of reality. Our shiny and metallic subject today is Iron Man. Our movie reviewer is associate editor Ken Gagne, writing in black; our privacy/surveillance nerd is security channel editor Angela Gunn, commenting in red.
Angela here. If you don't like spoilers, this would be a good time to click over to Shark Tank or something. (Come on, no whining; you've had two whole weekends to get to the theater. And it's not like you were so busy going to Speed Racer, either.) Thanks for dropping by. Everyone else? Onward.
Some heroes are born great (Superman). Others have radioactive greatness thrust upon them (Spider-Man, Hulk). Still others are forged, with strength coming not from their genes but from their drive and ambition to do what's right, and so they rise to the occasion. That's Batman's MO, but it also describes the genesis of Iron Man.
The film starts with a brief, gory flash-forward before backtracking 36 hours to explain how Tony Stark, a boy genius turned arms manufacturer/international playboy, got himself injured and captured by an al-Qaeda-type terrorist group in an Afghanistan-like locale. Charged with building a new weapon for his captors, Stark instead forges a rocket-powered suit out of older munitions and stuff one finds laying around the average Afghan cave -- MacGyver, phone your agent, and the rest of us can contemplate metallurgy and machining tolerances -- with which to conduct his own escape.
I was suspending my disbelief with some pretty sturdy cables at this point, and not over the in-cave fabrication facilities. I know it's a fantasy flick, but who the heck tells the boss how to fabricate stuff like this and then lets him go to the battlefront for a song-and-dance routine? I'm pretty sure the Make magazine geeks in the row ahead of me actually peed themselves during this sequence, but I'm equally sure that risk management nerds would have been having a coronary. Trade secrets and C-level execs are both sensitive company assets, and you don't let them just bounce around in a war zone for teh lulz. Also, and this is tiny in comparison -- a geek who actually gambles in Vegas? Our boy Stark went to MIT; don't tell me he doesn't understand math (even if, as a colleague points out, he's playing the game most suited to superior intelligence). Any Vegas cabbie will tell you that most nerds don't spend in the casinos. This is why they hate us in Vegas.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Future Focus: What's Coming in Enterprise Mobility Management (EMM) Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more.
- The CIO's Guide to Enterprise Mobility Management (EMM) This guide will help those making an EMM platform decision make the best choice for their organization.
- Yankee Group: BlackBerry Results Refute Rumors of its Demise Yankee Group: BlackBerry® is stronger than the press makes it out to be.
- Your New EMM Platform: How to Streamline the Migration Smartphone migration can be resource-intensive and challenging. Find out how outsourcing the process can save significant time and money.
- Live Webcast Increasing the Value of Your Reports and Dashboards Learn how incorporating other analytical capabilities such as predictive modeling and visualization can increase the value of your reports and dashboards by providing...
- Testimonial: Cystic Fibrosis Trust Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault's Simpana software platform plays in improving the company's information...
- Increasing the Value of Your Reports and Dashboards Learn how incorporating other analytical capabilities such as predictive modeling and visualization can increase the value of your reports and dashboards by providing... All Management White Papers | Webcasts