One more thing that has to be commented on, even without a direct security lesson: Spock getting freaky with Uhura is just wrong, and on so many different levels that it is hard to figure out where to start. From a military perspective, Spock is guilty of improper fraternization and could be court-martialed. Then, in defiance of logic, Spock gives in to Uhura's pleading and reverses his decision to assign her to another ship and so avoid the impression of favoritism. Of course, there's also basic Vulcan physiology, which the half-human Spock always adhered to -- specifically, Amok Time, which is the Vulcan seven-year mating cycle.
But Star Trek is, after all, a movie, and a great movie at that. It definitely has revived the franchise. There will be a sequel, as well there should -- although I still won't accept the Spock getting freaky with Uhura thing. Let's just hope it doesn't turn into a long episode that tries to be thought-provoking. Personally, I also hope that there is no Picard in the new Trek timeline.
Tech at the movies
- Security goes to the movies: Iron Man
- Security goes to the movies: Live Free or Die Hard
- Security goes to the movies: The Bourne Ultimatum
- Opinion: Do sci-fi films get advanced tech right?
- Q&A: John Knoll on CGI, Tron and 25 years of change
- Elgan: You can be Batman, too
- Teleportation: The leap from fact to fiction in Jumper
- SJVN: If it's animation or special effects, it's Linux
- Ken Gagne: Do androids dream of electric Apples?
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Topic Center White Papers | Webcasts