A letter from IBM

by Volker Weber

It has come to our attention that internal IBM information is available on your blog sites. Apparently, you have acquired a draft document from an internal IBM repository that is clearly a breach of internal security. We ask that you replace it with the final PDF that we made available externally, the contents of which are also on our Web site at http://www.lotus.com/products/product4.nsf/wdocs/hannoverfaq. As valued Business Partners, we trust that you will comply with this request.
  1. I did not even know that I am a valued Business Partner.
  2. I don't have the document on my site and never had.
  3. I don't think it was a draft.
  4. The cat seems to be out of the bag.

Update: Chris Miller explains:

I received the Word Document from our regional IBM Business Partner rep in announcement of the Hannover Project the same day the IBM site went live. This was sent to all business partners in the region. I am unaware of any internal security breach as I received this directly from our IBM channel representative.

Verdict: Clueless cover-up.

Comments

It sounds like its really worth reading the red strikethrough lines.

Marius Neumann, 2005-06-20 17:46

To 2.: Isn't linking a document the same as providing it on the own site?

Martin Hiegl, 2005-06-20 18:12

Most amusing, do you suppose they stopped for breath between a) shooting themslves in one foot the first time and b) reloading both barrels in readiness for the other?

FWIW Marius - I read it - it wasn't worth it.

Chris Linfoot, 2005-06-20 21:58

Yes, I finally checked email today to find the same letter. I responded with the exact location I got it. An IBM business partner channel rep that sent that document to everyone in the entire midwest region of the US. Ahh well. I am being assimilated and posting the pdf instead of the doc file.

Chris Miller, 2005-06-20 23:33

Received the same Word-Document. Seems they mailed it out to everybody.

Alexander Kluge, 2005-06-21 14:58

Recent comments

Bernd Schuster on Sophisticated, persistent mobile attack against high-value targets on iOS at 08:55
Stephan H. Wissel on What comes after the firetruck? at 10:45
Stephan H. Wissel on Wohin steuert IBM bei Domino und Notes? at 10:32
Horia Stanescu on Signal :: Private Messaging and Calling at 07:27
Arthur Fontaine on How ad platforms learn your real social graph at 02:38
Sven Hasselbach on That "App Modernization" story at 00:25
Volker Weber on How ad platforms learn your real social graph at 23:35
Horia STANESCU on How ad platforms learn your real social graph at 23:30
Henning Heinz on That "App Modernization" story at 23:08
Paul Mooney on Domino 9.0.1 and beyond at 23:06
Tim Pistor on That "App Modernization" story at 22:51
Volker Weber on How ad platforms learn your real social graph at 22:39
Volker Weber on That "App Modernization" story at 22:25
Erik Schwalb on That "App Modernization" story at 22:21
Richard Schwartz on That "App Modernization" story at 22:18
Bill Greenberg on Domino 9.0.1 and beyond at 22:09
Arthur Fontaine on How ad platforms learn your real social graph at 21:53
Volker Weber on That "App Modernization" story at 21:41
Ralf M Petter on That "App Modernization" story at 21:27
Volker Weber on Domino 9.0.1 and beyond at 21:22
Volker Weber on Sophisticated, persistent mobile attack against high-value targets on iOS at 21:21
Patrick Kwinten on Domino 9.0.1 and beyond at 21:19
Steffen Siebert on Sophisticated, persistent mobile attack against high-value targets on iOS at 21:04
Volker Weber on That "App Modernization" story at 20:28
Erik Schwalb on That "App Modernization" story at 20:23

Ceci n'est pas un blog

I explain difficult concepts in simple ways. For free, and for money. Clue procurement and bullshit detection.

vowe

Contact
Publications
Amazon Wish List
Frequently Asked Questions

rss feed  twitter ello  instagram

Local time is 10:36

visitors.gif