Security goes to the movies: Iron Man
Film geek and security nerd square off in a cinematic smackdown
Computerworld - Time once again for "Security Goes to the Movies," a leisurely look at the inevitable bleeding from the eyes that security folk experience when Hollywood takes liberties with technology, the laws of physics and other aspects of reality. Our shiny and metallic subject today is Iron Man. Our movie reviewer is associate editor Ken Gagne, writing in black; our privacy/surveillance nerd is security channel editor Angela Gunn, commenting in red.
Angela here. If you don't like spoilers, this would be a good time to click over to Shark Tank or something. (Come on, no whining; you've had two whole weekends to get to the theater. And it's not like you were so busy going to Speed Racer, either.) Thanks for dropping by. Everyone else? Onward.
Some heroes are born great (Superman). Others have radioactive greatness thrust upon them (Spider-Man, Hulk). Still others are forged, with strength coming not from their genes but from their drive and ambition to do what's right, and so they rise to the occasion. That's Batman's MO, but it also describes the genesis of Iron Man.
The film starts with a brief, gory flash-forward before backtracking 36 hours to explain how Tony Stark, a boy genius turned arms manufacturer/international playboy, got himself injured and captured by an al-Qaeda-type terrorist group in an Afghanistan-like locale. Charged with building a new weapon for his captors, Stark instead forges a rocket-powered suit out of older munitions and stuff one finds laying around the average Afghan cave -- MacGyver, phone your agent, and the rest of us can contemplate metallurgy and machining tolerances -- with which to conduct his own escape.
I was suspending my disbelief with some pretty sturdy cables at this point, and not over the in-cave fabrication facilities. I know it's a fantasy flick, but who the heck tells the boss how to fabricate stuff like this and then lets him go to the battlefront for a song-and-dance routine? I'm pretty sure the Make magazine geeks in the row ahead of me actually peed themselves during this sequence, but I'm equally sure that risk management nerds would have been having a coronary. Trade secrets and C-level execs are both sensitive company assets, and you don't let them just bounce around in a war zone for teh lulz. Also, and this is tiny in comparison -- a geek who actually gambles in Vegas? Our boy Stark went to MIT; don't tell me he doesn't understand math (even if, as a colleague points out, he's playing the game most suited to superior intelligence). Any Vegas cabbie will tell you that most nerds don't spend in the casinos. This is why they hate us in Vegas.
- Study: Total Economic Impact of Google Apps Employees can work faster and IT spending can decrease when companies switch to Google Apps, says a commissioned study by Forrester Consulting. Going...
- Protecting Digitalized Assets in Healthcare Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is...
- Is a SaaS Deployment Right for You? Find out the answer and as well as the other deployment options.
- Discover How Mail Express Solves 2 of Your Biggest IT Headaches Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Live Webcast
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- Increasing the Value of Your Reports and Dashboards Learn how incorporating other analytical capabilities such as predictive modeling and visualization can increase the value of your reports and dashboards by providing...
- Video surveillance for IT: maximum image quality, minimum bandwidth Join us on Thursday, May 8th at 1 p.m. EST when Willem Ryan, Senior Product Marketing Manager at Avigilon, will discuss how IT... All Management White Papers | Webcasts