<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article10_02_22_1355238</id>
	<title>75\% of Enterprises Have Suffered Cyber Attacks, Costing $2M+ On Average</title>
	<author>CmdrTaco</author>
	<datestamp>1266849240000</datestamp>
	<htmltext>coomaria writes <i>"OK, even allowing for the fact this comes from a <a href="http://www.symantec.com/content/en/us/about/presskits/SES\_report\_Feb2010.pdf">newly published study</a> (PDF) from a security company, that's still one heck of a statistic. The fact that it's Symantec, and so has access to perhaps more enterprises than most, makes it a double-heck with knobs on. Or how about this one for size: 'every enterprise, yes, 100 percent, <a href="http://www.daniweb.com/news/story262199.html">experienced cyber losses in 2009</a>.'"</i></htmltext>
<tokenext>coomaria writes " OK , even allowing for the fact this comes from a newly published study ( PDF ) from a security company , that 's still one heck of a statistic .
The fact that it 's Symantec , and so has access to perhaps more enterprises than most , makes it a double-heck with knobs on .
Or how about this one for size : 'every enterprise , yes , 100 percent , experienced cyber losses in 2009 .
' "</tokentext>
<sentencetext>coomaria writes "OK, even allowing for the fact this comes from a newly published study (PDF) from a security company, that's still one heck of a statistic.
The fact that it's Symantec, and so has access to perhaps more enterprises than most, makes it a double-heck with knobs on.
Or how about this one for size: 'every enterprise, yes, 100 percent, experienced cyber losses in 2009.
'"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233224</id>
	<title>Re:I'd be surprised if it's anything less than 100</title>
	<author>Moheeheeko</author>
	<datestamp>1266868620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I agree in every way with you.  What people who dont work in the industry dont understand, is that most users are stupid.  I work at a university where some professors dont know how to get to their email unless there is an icon on the desktop.  Im sure a few of them thought they had a long lost relative die and leave them money somewhere a few times.  In short, why do so many companies get attacked? PEBKAC.</htmltext>
<tokenext>I agree in every way with you .
What people who dont work in the industry dont understand , is that most users are stupid .
I work at a university where some professors dont know how to get to their email unless there is an icon on the desktop .
Im sure a few of them thought they had a long lost relative die and leave them money somewhere a few times .
In short , why do so many companies get attacked ?
PEBKAC .</tokentext>
<sentencetext>I agree in every way with you.
What people who dont work in the industry dont understand, is that most users are stupid.
I work at a university where some professors dont know how to get to their email unless there is an icon on the desktop.
Im sure a few of them thought they had a long lost relative die and leave them money somewhere a few times.
In short, why do so many companies get attacked?
PEBKAC.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229410</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229846</id>
	<title>Actually Only 25\%</title>
	<author>Anonymous</author>
	<datestamp>1266857160000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>This article severely overestimates the impact of cybernetic attacks.  According to my count, the borg only invaded 25\% of starship enterprises, excluding those existing in alternate timelines/realities.</p></htmltext>
<tokenext>This article severely overestimates the impact of cybernetic attacks .
According to my count , the borg only invaded 25 \ % of starship enterprises , excluding those existing in alternate timelines/realities .</tokentext>
<sentencetext>This article severely overestimates the impact of cybernetic attacks.
According to my count, the borg only invaded 25\% of starship enterprises, excluding those existing in alternate timelines/realities.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229704</id>
	<title>statistics</title>
	<author>binaryseraph</author>
	<datestamp>1266856500000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext>75\% of statistics are made up 48\% of the time.



--
time to troll me!</htmltext>
<tokenext>75 \ % of statistics are made up 48 \ % of the time .
-- time to troll me !</tokentext>
<sentencetext>75\% of statistics are made up 48\% of the time.
--
time to troll me!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229820</id>
	<title>Re:Full Text</title>
	<author>Comboman</author>
	<datestamp>1266857040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Maybe that is not so surprising when you consider that the report states that every enterprise, yes 100 percent, experienced cyber losses in 2009. The top three losses being intellectual property theft, customer credit card data theft and the theft of other personally identifiable customer data. These losses translated into a financial cost 92 percent of the time mainly in terms of productivity, revenue, and tanking customer trust.</p></div></blockquote><p>
I wonder what percentage of these "cyber" losses were the result of an employee losing a laptop/USB key rather than an actual internet-based cyber attack.  Not that losing a laptop isn't still a problem; it just isn't a "cyber" problem (they could just as easily have lost a briefcase full of paper files with customer data on them).</p></div>
	</htmltext>
<tokenext>Maybe that is not so surprising when you consider that the report states that every enterprise , yes 100 percent , experienced cyber losses in 2009 .
The top three losses being intellectual property theft , customer credit card data theft and the theft of other personally identifiable customer data .
These losses translated into a financial cost 92 percent of the time mainly in terms of productivity , revenue , and tanking customer trust .
I wonder what percentage of these " cyber " losses were the result of an employee losing a laptop/USB key rather than an actual internet-based cyber attack .
Not that losing a laptop is n't still a problem ; it just is n't a " cyber " problem ( they could just as easily have lost a briefcase full of paper files with customer data on them ) .</tokentext>
<sentencetext>Maybe that is not so surprising when you consider that the report states that every enterprise, yes 100 percent, experienced cyber losses in 2009.
The top three losses being intellectual property theft, customer credit card data theft and the theft of other personally identifiable customer data.
These losses translated into a financial cost 92 percent of the time mainly in terms of productivity, revenue, and tanking customer trust.
I wonder what percentage of these "cyber" losses were the result of an employee losing a laptop/USB key rather than an actual internet-based cyber attack.
Not that losing a laptop isn't still a problem; it just isn't a "cyber" problem (they could just as easily have lost a briefcase full of paper files with customer data on them).
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229088</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31232158</id>
	<title>Makes you realize</title>
	<author>hesaigo999ca</author>
	<datestamp>1266864900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Makes you see just how much of a problem we do have, when we know that 100\% of companies that are attacked, suffer serious losses, you would think the DoD or what not would try to implicate themselves a little more, or which org. would need to be so?</p></htmltext>
<tokenext>Makes you see just how much of a problem we do have , when we know that 100 \ % of companies that are attacked , suffer serious losses , you would think the DoD or what not would try to implicate themselves a little more , or which org .
would need to be so ?</tokentext>
<sentencetext>Makes you see just how much of a problem we do have, when we know that 100\% of companies that are attacked, suffer serious losses, you would think the DoD or what not would try to implicate themselves a little more, or which org.
would need to be so?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31239890</id>
	<title>Sysmantec is bad luck</title>
	<author>clint999</author>
	<datestamp>1266852600000</datestamp>
	<modclass>None</modclass>
	<modscore>-1</modscore>
	<htmltext><strong>My point exactly. Welcome to the perfect world.</strong></htmltext>
<tokenext>My point exactly .
Welcome to the perfect world .</tokentext>
<sentencetext>My point exactly.
Welcome to the perfect world.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229562</id>
	<title>Which Enterprises are being counted?</title>
	<author>Colonel Korn</author>
	<datestamp>1266855900000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext><p>By my count (of Wikipedia), there are 2 Enterprises from the Continental Navy, 6 from the US Navy, 1 balloon, 1 space shuttle, 1 training ship, and 8 starships that are worth counting, for a total of 19 Enterprises.  If 75\% have suffered major cyber attacks and we round down, we have 14 cyber-victims.</p><p>Here's where it gets weird.  Clearly the 8 starships are attackable in the computerized sense.  That leaves us with 6 other hackable Enterprises.  Most likely 1 is the space shuttle, 1 is the training vessel, and 1 is the contemporary air craft carrier.  But that means 3 more Enterprises were cyber-violated out of a pool containing a balloon used during the Civil War and 5 US Navy ships decommissioned between 1823 and 1947.</p><p>This seems to be proof of a pre-modern technological underground.  Or time travel.</p></htmltext>
<tokenext>By my count ( of Wikipedia ) , there are 2 Enterprises from the Continental Navy , 6 from the US Navy , 1 balloon , 1 space shuttle , 1 training ship , and 8 starships that are worth counting , for a total of 19 Enterprises .
If 75 \ % have suffered major cyber attacks and we round down , we have 14 cyber-victims.Here 's where it gets weird .
Clearly the 8 starships are attackable in the computerized sense .
That leaves us with 6 other hackable Enterprises .
Most likely 1 is the space shuttle , 1 is the training vessel , and 1 is the contemporary air craft carrier .
But that means 3 more Enterprises were cyber-violated out of a pool containing a balloon used during the Civil War and 5 US Navy ships decommissioned between 1823 and 1947.This seems to be proof of a pre-modern technological underground .
Or time travel .</tokentext>
<sentencetext>By my count (of Wikipedia), there are 2 Enterprises from the Continental Navy, 6 from the US Navy, 1 balloon, 1 space shuttle, 1 training ship, and 8 starships that are worth counting, for a total of 19 Enterprises.
If 75\% have suffered major cyber attacks and we round down, we have 14 cyber-victims.Here's where it gets weird.
Clearly the 8 starships are attackable in the computerized sense.
That leaves us with 6 other hackable Enterprises.
Most likely 1 is the space shuttle, 1 is the training vessel, and 1 is the contemporary air craft carrier.
But that means 3 more Enterprises were cyber-violated out of a pool containing a balloon used during the Civil War and 5 US Navy ships decommissioned between 1823 and 1947.This seems to be proof of a pre-modern technological underground.
Or time travel.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31232216</id>
	<title>ships named Enterprise</title>
	<author>tverbeek</author>
	<datestamp>1266865080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>How much is that in Federation Credits?</p></htmltext>
<tokenext>How much is that in Federation Credits ?</tokentext>
<sentencetext>How much is that in Federation Credits?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229844</id>
	<title>Sysmantec is bad luck</title>
	<author>OMFG it's Rici</author>
	<datestamp>1266857160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I think that sysmantec might be bad luck.

Hell if every company they interview has been victim to some kind of cyber attack I don't want to be interviewed by them.

I mean they look like the Jessica Fletcher of IT.</htmltext>
<tokenext>I think that sysmantec might be bad luck .
Hell if every company they interview has been victim to some kind of cyber attack I do n't want to be interviewed by them .
I mean they look like the Jessica Fletcher of IT .</tokentext>
<sentencetext>I think that sysmantec might be bad luck.
Hell if every company they interview has been victim to some kind of cyber attack I don't want to be interviewed by them.
I mean they look like the Jessica Fletcher of IT.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31232996</id>
	<title>Wrong. My company with a few people didn't</title>
	<author>Anonymous</author>
	<datestamp>1266867720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Wrong. My company (a small enterprise) didn't have any loses due to hacking or viruses in 2009. ZERO. We do know of VERY LARGE Facebook game studios who had loses and a laptop with unencrypted data stolen, however.</p><p>We do expect to be hacked at some point know matter how cautious we are. That is the nature of being on the internet. All our plans include how to recover from a hacked web presence. Further, we've clearly told the Board of Directors that we will be hacked at some point, there's really no 100\% complete defense that is acceptable based on web service requirements today.</p><p>Simple. Plan to be hacked, have a plan when it happens.</p><p>We have had minor loses due to hardware failures. Basically, just a few hours of lost work for 1 person between daily backups. Eh, the solution to that problem isn't worth the trouble for us.</p></htmltext>
<tokenext>Wrong .
My company ( a small enterprise ) did n't have any loses due to hacking or viruses in 2009 .
ZERO. We do know of VERY LARGE Facebook game studios who had loses and a laptop with unencrypted data stolen , however.We do expect to be hacked at some point know matter how cautious we are .
That is the nature of being on the internet .
All our plans include how to recover from a hacked web presence .
Further , we 've clearly told the Board of Directors that we will be hacked at some point , there 's really no 100 \ % complete defense that is acceptable based on web service requirements today.Simple .
Plan to be hacked , have a plan when it happens.We have had minor loses due to hardware failures .
Basically , just a few hours of lost work for 1 person between daily backups .
Eh , the solution to that problem is n't worth the trouble for us .</tokentext>
<sentencetext>Wrong.
My company (a small enterprise) didn't have any loses due to hacking or viruses in 2009.
ZERO. We do know of VERY LARGE Facebook game studios who had loses and a laptop with unencrypted data stolen, however.We do expect to be hacked at some point know matter how cautious we are.
That is the nature of being on the internet.
All our plans include how to recover from a hacked web presence.
Further, we've clearly told the Board of Directors that we will be hacked at some point, there's really no 100\% complete defense that is acceptable based on web service requirements today.Simple.
Plan to be hacked, have a plan when it happens.We have had minor loses due to hardware failures.
Basically, just a few hours of lost work for 1 person between daily backups.
Eh, the solution to that problem isn't worth the trouble for us.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31231720</id>
	<title>Not new</title>
	<author>jellomizer</author>
	<datestamp>1266863640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Well we have...<br>NX-01  (I am sure some alian has gotten into their computer)<br>NCC-1701 (I am sure some alian has gotten into their computer)<br>NCC-1701-A (Hacked by a Rogue Volcan)<br>NCC-1701-B<br>NCC-1701-C<br>NCC-1701-D (Hacked by the Borg)<br>NCC-1701-E  (Hacked by the Borg)<br>So I have 71.5\% However I haven't read any expanded universe stuff...</p></htmltext>
<tokenext>Well we have...NX-01 ( I am sure some alian has gotten into their computer ) NCC-1701 ( I am sure some alian has gotten into their computer ) NCC-1701-A ( Hacked by a Rogue Volcan ) NCC-1701-BNCC-1701-CNCC-1701-D ( Hacked by the Borg ) NCC-1701-E ( Hacked by the Borg ) So I have 71.5 \ % However I have n't read any expanded universe stuff.. .</tokentext>
<sentencetext>Well we have...NX-01  (I am sure some alian has gotten into their computer)NCC-1701 (I am sure some alian has gotten into their computer)NCC-1701-A (Hacked by a Rogue Volcan)NCC-1701-BNCC-1701-CNCC-1701-D (Hacked by the Borg)NCC-1701-E  (Hacked by the Borg)So I have 71.5\% However I haven't read any expanded universe stuff...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229342</id>
	<title>Re:symantec</title>
	<author>Coopjust</author>
	<datestamp>1266854400000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext>I think Symantec should detect their own product as Trojan.Symantec.
<br> <br>Seriously, Symantec and McAfee applications are more ill behaved with system resources than most viruses.</htmltext>
<tokenext>I think Symantec should detect their own product as Trojan.Symantec .
Seriously , Symantec and McAfee applications are more ill behaved with system resources than most viruses .</tokentext>
<sentencetext>I think Symantec should detect their own product as Trojan.Symantec.
Seriously, Symantec and McAfee applications are more ill behaved with system resources than most viruses.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229100</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230474</id>
	<title>It American Marketing only, not reality</title>
	<author>Anonymous</author>
	<datestamp>1266860340000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It's only maketing, they never go to the true causes and solutions that dont include them, they dont even mention virus,  etc. the poorest study i had read</p></htmltext>
<tokenext>It 's only maketing , they never go to the true causes and solutions that dont include them , they dont even mention virus , etc .
the poorest study i had read</tokentext>
<sentencetext>It's only maketing, they never go to the true causes and solutions that dont include them, they dont even mention virus,  etc.
the poorest study i had read</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229296</id>
	<title>Define "cyber attack".  And don't use average</title>
	<author>Anonymous</author>
	<datestamp>1266854160000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>Connect any web server to the internet and you'll see tons of connections from botnets trying randomly to exploit various old vulnerabilities.  Technically, these are attacks, though you don't need to worry about them if you're patched up.</p><p>So is this saying anything more than 75\% of enterprises have a web server?</p><p>And the average cost is a meaningless number, since averages are swayed by outliers.  If you wanted a good statistic for this, you'd use the median.  Alternatively, compute the average of (cost of attack / yearly revenue).</p></htmltext>
<tokenext>Connect any web server to the internet and you 'll see tons of connections from botnets trying randomly to exploit various old vulnerabilities .
Technically , these are attacks , though you do n't need to worry about them if you 're patched up.So is this saying anything more than 75 \ % of enterprises have a web server ? And the average cost is a meaningless number , since averages are swayed by outliers .
If you wanted a good statistic for this , you 'd use the median .
Alternatively , compute the average of ( cost of attack / yearly revenue ) .</tokentext>
<sentencetext>Connect any web server to the internet and you'll see tons of connections from botnets trying randomly to exploit various old vulnerabilities.
Technically, these are attacks, though you don't need to worry about them if you're patched up.So is this saying anything more than 75\% of enterprises have a web server?And the average cost is a meaningless number, since averages are swayed by outliers.
If you wanted a good statistic for this, you'd use the median.
Alternatively, compute the average of (cost of attack / yearly revenue).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230464</id>
	<title>Strange...</title>
	<author>Yaa 101</author>
	<datestamp>1266860340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I did not suffer 1 dime because of this, maybe they come to 100\% because they only asked their own clients.</p><p>It shows 2 things, first they asked very selective (they didn't asked me for instance), and second, it shows how inherently insecure their products are (I am not their client and suffer none problems).<br>Not that Norton or any other so called security solution can safe people from making bad security decisions, if you make the right decisions then you don't need their products in the first place.</p><p>My opinion is that managers who connect critical infra to internet instead of private networks should at least be jailed for 5-10 years.</p></htmltext>
<tokenext>I did not suffer 1 dime because of this , maybe they come to 100 \ % because they only asked their own clients.It shows 2 things , first they asked very selective ( they did n't asked me for instance ) , and second , it shows how inherently insecure their products are ( I am not their client and suffer none problems ) .Not that Norton or any other so called security solution can safe people from making bad security decisions , if you make the right decisions then you do n't need their products in the first place.My opinion is that managers who connect critical infra to internet instead of private networks should at least be jailed for 5-10 years .</tokentext>
<sentencetext>I did not suffer 1 dime because of this, maybe they come to 100\% because they only asked their own clients.It shows 2 things, first they asked very selective (they didn't asked me for instance), and second, it shows how inherently insecure their products are (I am not their client and suffer none problems).Not that Norton or any other so called security solution can safe people from making bad security decisions, if you make the right decisions then you don't need their products in the first place.My opinion is that managers who connect critical infra to internet instead of private networks should at least be jailed for 5-10 years.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230062</id>
	<title>Re:I'm shocked</title>
	<author>Anonymous</author>
	<datestamp>1266858600000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>so Symantec compiles a report from the business' which use it's product and claim 100\% have had a cyber loss, how is this a good thing for symantec? Reading it makes me realize and affirms how useless of a product they make. They will blame it on users but then I would ask what use is their product? Or any other security product currently being marketed out there, if user education is the best prevention, I wonder why we would still need them.</p></htmltext>
<tokenext>so Symantec compiles a report from the business ' which use it 's product and claim 100 \ % have had a cyber loss , how is this a good thing for symantec ?
Reading it makes me realize and affirms how useless of a product they make .
They will blame it on users but then I would ask what use is their product ?
Or any other security product currently being marketed out there , if user education is the best prevention , I wonder why we would still need them .</tokentext>
<sentencetext>so Symantec compiles a report from the business' which use it's product and claim 100\% have had a cyber loss, how is this a good thing for symantec?
Reading it makes me realize and affirms how useless of a product they make.
They will blame it on users but then I would ask what use is their product?
Or any other security product currently being marketed out there, if user education is the best prevention, I wonder why we would still need them.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229472</id>
	<title>Re:I'm shocked</title>
	<author>Lumpy</author>
	<datestamp>1266855420000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>They claimed it hard enough that analog HD is dead at the end of this year.</p><p>Because they scream louder than everyone else they get all the attention.</p><p>This screaming about how EVERYONE has suffered losses will be used to force through more draconian laws.... because nobody in the tech field is screaming back.</p></htmltext>
<tokenext>They claimed it hard enough that analog HD is dead at the end of this year.Because they scream louder than everyone else they get all the attention.This screaming about how EVERYONE has suffered losses will be used to force through more draconian laws.... because nobody in the tech field is screaming back .</tokentext>
<sentencetext>They claimed it hard enough that analog HD is dead at the end of this year.Because they scream louder than everyone else they get all the attention.This screaming about how EVERYONE has suffered losses will be used to force through more draconian laws.... because nobody in the tech field is screaming back.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</id>
	<title>I'm shocked</title>
	<author>Anonymous</author>
	<datestamp>1266852960000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>This is like the MPAA/RIAA claiming that "piracy" is costing their respective industries "billions" of dollars. Seriously - if you can't spot the conflict of interest you need to turn in your critical thinking hat.</p><p>This is just marketing to increase sales of their "security" products. In fact if you go to the actual PDF linked to in the article it looks suspiciously like a sales brochure, presenting the "problem" and at the end showing how Symantec is the "solution".</p></htmltext>
<tokenext>This is like the MPAA/RIAA claiming that " piracy " is costing their respective industries " billions " of dollars .
Seriously - if you ca n't spot the conflict of interest you need to turn in your critical thinking hat.This is just marketing to increase sales of their " security " products .
In fact if you go to the actual PDF linked to in the article it looks suspiciously like a sales brochure , presenting the " problem " and at the end showing how Symantec is the " solution " .</tokentext>
<sentencetext>This is like the MPAA/RIAA claiming that "piracy" is costing their respective industries "billions" of dollars.
Seriously - if you can't spot the conflict of interest you need to turn in your critical thinking hat.This is just marketing to increase sales of their "security" products.
In fact if you go to the actual PDF linked to in the article it looks suspiciously like a sales brochure, presenting the "problem" and at the end showing how Symantec is the "solution".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229426</id>
	<title>Cyber</title>
	<author>Anonymous</author>
	<datestamp>1266855120000</datestamp>
	<modclass>Funny</modclass>
	<modscore>1</modscore>
	<htmltext><p>I must verify the claims made in the summary: my workplace suffered severe cyber losses during 2009.</p><p>Thankfully, we'd prepared for this, and had ordered in cyber ahead of time so the supply of cyber was not interrupted. (Sadly, we were not as quick to deal with the Y2K bug and, as a result, we incurred almost complete loss of all our cyber.)</p></htmltext>
<tokenext>I must verify the claims made in the summary : my workplace suffered severe cyber losses during 2009.Thankfully , we 'd prepared for this , and had ordered in cyber ahead of time so the supply of cyber was not interrupted .
( Sadly , we were not as quick to deal with the Y2K bug and , as a result , we incurred almost complete loss of all our cyber .
)</tokentext>
<sentencetext>I must verify the claims made in the summary: my workplace suffered severe cyber losses during 2009.Thankfully, we'd prepared for this, and had ordered in cyber ahead of time so the supply of cyber was not interrupted.
(Sadly, we were not as quick to deal with the Y2K bug and, as a result, we incurred almost complete loss of all our cyber.
)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229370</id>
	<title>Spam</title>
	<author>Alcimedes</author>
	<datestamp>1266854640000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>Sweet, the first article that was so bad I just tagged it as spam.  I'd worry about the future but the filters on the<nobr> <wbr></nobr>/. editors have been crap for years, surprised there aren't more of these.</p></htmltext>
<tokenext>Sweet , the first article that was so bad I just tagged it as spam .
I 'd worry about the future but the filters on the / .
editors have been crap for years , surprised there are n't more of these .</tokentext>
<sentencetext>Sweet, the first article that was so bad I just tagged it as spam.
I'd worry about the future but the filters on the /.
editors have been crap for years, surprised there aren't more of these.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31234872</id>
	<title>Even in Symantec Shops?</title>
	<author>Anonymous</author>
	<datestamp>1266830520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>So 100\% were affected, even those using Symantec software?</p></htmltext>
<tokenext>So 100 \ % were affected , even those using Symantec software ?</tokentext>
<sentencetext>So 100\% were affected, even those using Symantec software?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229082</id>
	<title>What's cheaper?</title>
	<author>Anonymous</author>
	<datestamp>1266853140000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>A proper security auditing team or a loss here and there?</p><p>Business as usual - avoiding costs because their financial losses are smaller and/or deductable.</p></htmltext>
<tokenext>A proper security auditing team or a loss here and there ? Business as usual - avoiding costs because their financial losses are smaller and/or deductable .</tokentext>
<sentencetext>A proper security auditing team or a loss here and there?Business as usual - avoiding costs because their financial losses are smaller and/or deductable.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230724</id>
	<title>2 mill avg</title>
	<author>Anonymous</author>
	<datestamp>1266861180000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>just who are they paying to fix shit<nobr> <wbr></nobr>...ballmer or gates in the flesh?<br>no back ups?<br>no images for the box</p><p>STUPID ADMINS AND COMPANIES ON NOTICE YOU DESERVE IT THEN</p></htmltext>
<tokenext>just who are they paying to fix shit ...ballmer or gates in the flesh ? no back ups ? no images for the boxSTUPID ADMINS AND COMPANIES ON NOTICE YOU DESERVE IT THEN</tokentext>
<sentencetext>just who are they paying to fix shit ...ballmer or gates in the flesh?no back ups?no images for the boxSTUPID ADMINS AND COMPANIES ON NOTICE YOU DESERVE IT THEN</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233612</id>
	<title>Re:I'm shocked</title>
	<author>dave562</author>
	<datestamp>1266869820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The problem is real.   Windows boxes are inherently insecure and are frequently being exploited.  Symantec is one of the many vendors selling mitigation tools.  We use Symantec here, both Endpoint Protection and the Exchange scanning component.  It's surprising how many viruses make it through Postini/Google but end up getting caught by Symantec when they come through the front-end server.</p><p>Everyone knows that anti-virus is last line of defense, and often an only sometimes effective one.  Most of the malicious code is coming in through the web these days, so a product like Websense is a better investment than client AV.  In a perfect world you want both, plus some sort of IPS/IDS and gateway AV built into the firewall.</p><p>To say that Symantec is scare mongering to create a market that wouldn't otherwise be there is just FUD.  There isn't a conflict of interest there.  They are selling a product that addresses a real problem.</p><p>Now if they were selling Symantec AV for Ubuntu desktop, they might be blowing smoke.  That isn't what they are doing.  Windows = Big Fat Target for malware.</p></htmltext>
<tokenext>The problem is real .
Windows boxes are inherently insecure and are frequently being exploited .
Symantec is one of the many vendors selling mitigation tools .
We use Symantec here , both Endpoint Protection and the Exchange scanning component .
It 's surprising how many viruses make it through Postini/Google but end up getting caught by Symantec when they come through the front-end server.Everyone knows that anti-virus is last line of defense , and often an only sometimes effective one .
Most of the malicious code is coming in through the web these days , so a product like Websense is a better investment than client AV .
In a perfect world you want both , plus some sort of IPS/IDS and gateway AV built into the firewall.To say that Symantec is scare mongering to create a market that would n't otherwise be there is just FUD .
There is n't a conflict of interest there .
They are selling a product that addresses a real problem.Now if they were selling Symantec AV for Ubuntu desktop , they might be blowing smoke .
That is n't what they are doing .
Windows = Big Fat Target for malware .</tokentext>
<sentencetext>The problem is real.
Windows boxes are inherently insecure and are frequently being exploited.
Symantec is one of the many vendors selling mitigation tools.
We use Symantec here, both Endpoint Protection and the Exchange scanning component.
It's surprising how many viruses make it through Postini/Google but end up getting caught by Symantec when they come through the front-end server.Everyone knows that anti-virus is last line of defense, and often an only sometimes effective one.
Most of the malicious code is coming in through the web these days, so a product like Websense is a better investment than client AV.
In a perfect world you want both, plus some sort of IPS/IDS and gateway AV built into the firewall.To say that Symantec is scare mongering to create a market that wouldn't otherwise be there is just FUD.
There isn't a conflict of interest there.
They are selling a product that addresses a real problem.Now if they were selling Symantec AV for Ubuntu desktop, they might be blowing smoke.
That isn't what they are doing.
Windows = Big Fat Target for malware.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230050</id>
	<title>gentlemen</title>
	<author>nimbius</author>
	<datestamp>1266858480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I renew my call to action.  now is not the time to debate better security through "operating systems" or "best practices" but instead to focus on the matter at hand:  we have not purchased enough symantec products this year.
<br> <br>
seriously.  a security company that finds a hellatious influx of cyber attacks is not news, its advertisement.  its only sixteen pages long, page 1 is a pretty girl, and the last page is a summary of...oh imagine that, links to the product the company is selling and not independent citations.</htmltext>
<tokenext>I renew my call to action .
now is not the time to debate better security through " operating systems " or " best practices " but instead to focus on the matter at hand : we have not purchased enough symantec products this year .
seriously. a security company that finds a hellatious influx of cyber attacks is not news , its advertisement .
its only sixteen pages long , page 1 is a pretty girl , and the last page is a summary of...oh imagine that , links to the product the company is selling and not independent citations .</tokentext>
<sentencetext>I renew my call to action.
now is not the time to debate better security through "operating systems" or "best practices" but instead to focus on the matter at hand:  we have not purchased enough symantec products this year.
seriously.  a security company that finds a hellatious influx of cyber attacks is not news, its advertisement.
its only sixteen pages long, page 1 is a pretty girl, and the last page is a summary of...oh imagine that, links to the product the company is selling and not independent citations.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229106</id>
	<title>Hardly</title>
	<author>RMH101</author>
	<datestamp>1266853260000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext>Aw, c'mon.  We've not spent nearly $2M on Symantec licences here, and I'd hardly call their sales pitch a cyber attack.<br> <br>
I'm here all week, try the veal</htmltext>
<tokenext>Aw , c'mon .
We 've not spent nearly $ 2M on Symantec licences here , and I 'd hardly call their sales pitch a cyber attack .
I 'm here all week , try the veal</tokentext>
<sentencetext>Aw, c'mon.
We've not spent nearly $2M on Symantec licences here, and I'd hardly call their sales pitch a cyber attack.
I'm here all week, try the veal</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233382</id>
	<title>WTF?</title>
	<author>butlerdi</author>
	<datestamp>1266869160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Utter Bullshit...........</htmltext>
<tokenext>Utter Bullshit.......... .</tokentext>
<sentencetext>Utter Bullshit...........</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31235882</id>
	<title>FvUCK?!</title>
	<author>Anonymous</author>
	<datestamp>1266833460000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext><A HREF="http://goat.cx/" title="goat.cx" rel="nofollow">If I rEmain maggot, vomit, shit want them there. sadness And it was 1. Therefore there</a> [goat.cx]</htmltext>
<tokenext>If I rEmain maggot , vomit , shit want them there .
sadness And it was 1 .
Therefore there [ goat.cx ]</tokentext>
<sentencetext>If I rEmain maggot, vomit, shit want them there.
sadness And it was 1.
Therefore there [goat.cx]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31238610</id>
	<title>Largest Segment of Cyber Losses?</title>
	<author>warncke</author>
	<datestamp>1266844620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I doubt it is "attacks."  I bet that the losses from wasted employee time and incompetent expenditures on useless hard/software exceed the costs of attacks by a couple orders of magnitude.</htmltext>
<tokenext>I doubt it is " attacks .
" I bet that the losses from wasted employee time and incompetent expenditures on useless hard/software exceed the costs of attacks by a couple orders of magnitude .</tokentext>
<sentencetext>I doubt it is "attacks.
"  I bet that the losses from wasted employee time and incompetent expenditures on useless hard/software exceed the costs of attacks by a couple orders of magnitude.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229058</id>
	<title>Original report...</title>
	<author>Anonymusing</author>
	<datestamp>1266853020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>...is <a href="http://www.symantec.com/about/news/resources/press\_kits/detail.jsp?pkid=sesreport2010&amp;om\_ext\_cid=biz\_socmed\_twitter\_2010Feb\_ESRreport" title="symantec.com">here</a> [symantec.com].</htmltext>
<tokenext>...is here [ symantec.com ] .</tokentext>
<sentencetext>...is here [symantec.com].</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229634</id>
	<title>Re:I'm shocked</title>
	<author>flyneye</author>
	<datestamp>1266856200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The analogy that came to my mind was an insurance salesperson citing , lies<nobr> <wbr></nobr>,damned lies and statistics as part of their pitch.<br>
&nbsp; If it sounds too rich to be true, it likely is, further,I wouldn't put it past A.V. and computer security companies to have closet employees actually writing malicious code.   Google "mud farming".</p></htmltext>
<tokenext>The analogy that came to my mind was an insurance salesperson citing , lies ,damned lies and statistics as part of their pitch .
  If it sounds too rich to be true , it likely is , further,I would n't put it past A.V .
and computer security companies to have closet employees actually writing malicious code .
Google " mud farming " .</tokentext>
<sentencetext>The analogy that came to my mind was an insurance salesperson citing , lies ,damned lies and statistics as part of their pitch.
  If it sounds too rich to be true, it likely is, further,I wouldn't put it past A.V.
and computer security companies to have closet employees actually writing malicious code.
Google "mud farming".</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31240314</id>
	<title>What?</title>
	<author>clint999</author>
	<datestamp>1266856200000</datestamp>
	<modclass>None</modclass>
	<modscore>-1</modscore>
	<htmltext><p><div class="quote"><p>"Examples might be defacing the website, or stealing customer information. A more subtle attack may be to change the price in a database indicating a sale that doesn't really exist.
I understand your explanation (and it's a good one) but wouldn't your examples fall under the "cyber attacks" category on that same chart?</p></div></div>
	</htmltext>
<tokenext>" Examples might be defacing the website , or stealing customer information .
A more subtle attack may be to change the price in a database indicating a sale that does n't really exist .
I understand your explanation ( and it 's a good one ) but would n't your examples fall under the " cyber attacks " category on that same chart ?</tokentext>
<sentencetext>"Examples might be defacing the website, or stealing customer information.
A more subtle attack may be to change the price in a database indicating a sale that doesn't really exist.
I understand your explanation (and it's a good one) but wouldn't your examples fall under the "cyber attacks" category on that same chart?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229110</id>
	<title>"a double-heck with knobs on"</title>
	<author>circletimessquare</author>
	<datestamp>1266853260000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>i'm not familiar with that metric. could you convert that into libraries of congress?</p></htmltext>
<tokenext>i 'm not familiar with that metric .
could you convert that into libraries of congress ?</tokentext>
<sentencetext>i'm not familiar with that metric.
could you convert that into libraries of congress?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229192</id>
	<title>Advertising as journalism, on slashdot</title>
	<author>Anonymous</author>
	<datestamp>1266853680000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext>Sorry guys, but this crap is a complete waste of my time.</htmltext>
<tokenext>Sorry guys , but this crap is a complete waste of my time .</tokentext>
<sentencetext>Sorry guys, but this crap is a complete waste of my time.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31234066</id>
	<title>Re:Define "cyber attack". And don't use average</title>
	<author>Quantumstate</author>
	<datestamp>1266871380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The mean average is strongly affected by outliers but the median average is not.  Generally the median average is the most useful for these kind of figures.  I would guess the mean has been used but it seems to be very rare that you are told which average was taken.</p></htmltext>
<tokenext>The mean average is strongly affected by outliers but the median average is not .
Generally the median average is the most useful for these kind of figures .
I would guess the mean has been used but it seems to be very rare that you are told which average was taken .</tokentext>
<sentencetext>The mean average is strongly affected by outliers but the median average is not.
Generally the median average is the most useful for these kind of figures.
I would guess the mean has been used but it seems to be very rare that you are told which average was taken.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229296</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230128</id>
	<title>Definitions</title>
	<author>iateyourcookies</author>
	<datestamp>1266858900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If you insist on the definitions and choices used in the report then no, I'm afraid this is not really a very exciting statistic at all.<br>
<br>
From page 5:<br>
"Security risks" ranked by importance, by <i>IT Managers</i>:<br>
<br>
Cyber Attacks - 42\%<br>
Traditional Criminal Activity - 17\%<br>
Brand related events - 17\%<br>
Natural Distasters - 14\%<br>
Terrorism - 10\%<br>
<br>
So IT Managers are mostly concerned with threats to computers? Colour me surprised.</htmltext>
<tokenext>If you insist on the definitions and choices used in the report then no , I 'm afraid this is not really a very exciting statistic at all .
From page 5 : " Security risks " ranked by importance , by IT Managers : Cyber Attacks - 42 \ % Traditional Criminal Activity - 17 \ % Brand related events - 17 \ % Natural Distasters - 14 \ % Terrorism - 10 \ % So IT Managers are mostly concerned with threats to computers ?
Colour me surprised .</tokentext>
<sentencetext>If you insist on the definitions and choices used in the report then no, I'm afraid this is not really a very exciting statistic at all.
From page 5:
"Security risks" ranked by importance, by IT Managers:

Cyber Attacks - 42\%
Traditional Criminal Activity - 17\%
Brand related events - 17\%
Natural Distasters - 14\%
Terrorism - 10\%

So IT Managers are mostly concerned with threats to computers?
Colour me surprised.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31231974</id>
	<title>Wessels</title>
	<author>etherlad</author>
	<datestamp>1266864360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I think the more alarming statistic is that 75\% of Enterprises have suffered Klingon attacks.</p></htmltext>
<tokenext>I think the more alarming statistic is that 75 \ % of Enterprises have suffered Klingon attacks .</tokentext>
<sentencetext>I think the more alarming statistic is that 75\% of Enterprises have suffered Klingon attacks.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229100</id>
	<title>symantec</title>
	<author>the\_Bionic\_lemming</author>
	<datestamp>1266853200000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>Just having and paying for symantec is a cyberloss, and that's before a cyber attack!</p></htmltext>
<tokenext>Just having and paying for symantec is a cyberloss , and that 's before a cyber attack !</tokentext>
<sentencetext>Just having and paying for symantec is a cyberloss, and that's before a cyber attack!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233328</id>
	<title>I can confirm this!</title>
	<author>Tetsujin</author>
	<datestamp>1266869040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Really, the cyber attacks on Enterprises are well known.  First there was Dr. Daystrom, who "upgraded" an Enterprise with his M-5 computer...  Later, another Enterprise was subject ot cyber attack on numerous occasions: the attack by the Iconians was one of the earlier examples.  This Enterprise was ultimately destroyed as a result of a cyber attack by Klingons.  The next Enterprise was invaded from within by the Borg.  So it's actually a pretty common occurrence, it seems.</p></htmltext>
<tokenext>Really , the cyber attacks on Enterprises are well known .
First there was Dr. Daystrom , who " upgraded " an Enterprise with his M-5 computer... Later , another Enterprise was subject ot cyber attack on numerous occasions : the attack by the Iconians was one of the earlier examples .
This Enterprise was ultimately destroyed as a result of a cyber attack by Klingons .
The next Enterprise was invaded from within by the Borg .
So it 's actually a pretty common occurrence , it seems .</tokentext>
<sentencetext>Really, the cyber attacks on Enterprises are well known.
First there was Dr. Daystrom, who "upgraded" an Enterprise with his M-5 computer...  Later, another Enterprise was subject ot cyber attack on numerous occasions: the attack by the Iconians was one of the earlier examples.
This Enterprise was ultimately destroyed as a result of a cyber attack by Klingons.
The next Enterprise was invaded from within by the Borg.
So it's actually a pretty common occurrence, it seems.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229940</id>
	<title>Internal attacks</title>
	<author>jbeaupre</author>
	<datestamp>1266857760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>We've suffered from several internally launched attacks.  Weird stuff too.  Raid arrays reporting bad disks, server DOS, server files altered preventing reboot.  Under linux too.</p><p>Oh wait, that would be me using a cheap raid card, forgetting I'd set the firewall to deny any network access (did it during pre-production testing), and plain vanilla upgrading.</p><p>Sorry.  Sometimes it's hard to distinguish attacks from f$\%#-ups.</p></htmltext>
<tokenext>We 've suffered from several internally launched attacks .
Weird stuff too .
Raid arrays reporting bad disks , server DOS , server files altered preventing reboot .
Under linux too.Oh wait , that would be me using a cheap raid card , forgetting I 'd set the firewall to deny any network access ( did it during pre-production testing ) , and plain vanilla upgrading.Sorry .
Sometimes it 's hard to distinguish attacks from f $ \ % # -ups .</tokentext>
<sentencetext>We've suffered from several internally launched attacks.
Weird stuff too.
Raid arrays reporting bad disks, server DOS, server files altered preventing reboot.
Under linux too.Oh wait, that would be me using a cheap raid card, forgetting I'd set the firewall to deny any network access (did it during pre-production testing), and plain vanilla upgrading.Sorry.
Sometimes it's hard to distinguish attacks from f$\%#-ups.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230068</id>
	<title>I call BS</title>
	<author>pooh666</author>
	<datestamp>1266858600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>100\% and no big surprise it is that high. I am sure they defined "attack" as something with some level of sophistication, but the only level it takes is the level that gets in. Which isn't often very high.</htmltext>
<tokenext>100 \ % and no big surprise it is that high .
I am sure they defined " attack " as something with some level of sophistication , but the only level it takes is the level that gets in .
Which is n't often very high .</tokentext>
<sentencetext>100\% and no big surprise it is that high.
I am sure they defined "attack" as something with some level of sophistication, but the only level it takes is the level that gets in.
Which isn't often very high.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31232756</id>
	<title>I should say "see? told you!"</title>
	<author>Opportunist</author>
	<datestamp>1266866760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It would certainly be in my best interest, being basically in the same biz as Symantec. But I guess I couldn't keep up a straight face and repeat that. I can see that 75\% of enterprises were attacked. That is quite possible. Of course, most of those attacks consisted of little more than a few kids trying to guess passwords (can you see a LOT of "attacks" like that against facebook and the like?). When you strip all the attacks the average router and a sensibly configured server defeat by default, we're probably down at a single digit number.</p><p>What strikes me as odd is the claimed 2M loss. That sounds like it came from the same source the RIAA gets their damage claims from. And I'm NOT going there, nono, no way...</p></htmltext>
<tokenext>It would certainly be in my best interest , being basically in the same biz as Symantec .
But I guess I could n't keep up a straight face and repeat that .
I can see that 75 \ % of enterprises were attacked .
That is quite possible .
Of course , most of those attacks consisted of little more than a few kids trying to guess passwords ( can you see a LOT of " attacks " like that against facebook and the like ? ) .
When you strip all the attacks the average router and a sensibly configured server defeat by default , we 're probably down at a single digit number.What strikes me as odd is the claimed 2M loss .
That sounds like it came from the same source the RIAA gets their damage claims from .
And I 'm NOT going there , nono , no way.. .</tokentext>
<sentencetext>It would certainly be in my best interest, being basically in the same biz as Symantec.
But I guess I couldn't keep up a straight face and repeat that.
I can see that 75\% of enterprises were attacked.
That is quite possible.
Of course, most of those attacks consisted of little more than a few kids trying to guess passwords (can you see a LOT of "attacks" like that against facebook and the like?).
When you strip all the attacks the average router and a sensibly configured server defeat by default, we're probably down at a single digit number.What strikes me as odd is the claimed 2M loss.
That sounds like it came from the same source the RIAA gets their damage claims from.
And I'm NOT going there, nono, no way...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229408</id>
	<title>Re:Full Text</title>
	<author>tomhudson</author>
	<datestamp>1266855000000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>And of course security is not something you can buy, any more than trust.
</p><p>
With that in mind, here's a stat that Symantec doesn't want you to know:
</p><p>
<b>100\% of the companies that depend on Symantec to make them secure are vulnerable.</b></p></htmltext>
<tokenext>And of course security is not something you can buy , any more than trust .
With that in mind , here 's a stat that Symantec does n't want you to know : 100 \ % of the companies that depend on Symantec to make them secure are vulnerable .</tokentext>
<sentencetext>And of course security is not something you can buy, any more than trust.
With that in mind, here's a stat that Symantec doesn't want you to know:

100\% of the companies that depend on Symantec to make them secure are vulnerable.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229088</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229420</id>
	<title>robbIE may not be a(n) astro/geo physicist....</title>
	<author>Anonymous</author>
	<datestamp>1266855120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>butt he remains handy with the delete button.</p><p>it makes no sense to delete the stuff we posted today,,, rob? carry on.</p></htmltext>
<tokenext>butt he remains handy with the delete button.it makes no sense to delete the stuff we posted today,, , rob ?
carry on .</tokentext>
<sentencetext>butt he remains handy with the delete button.it makes no sense to delete the stuff we posted today,,, rob?
carry on.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230142</id>
	<title>Re:I'm shocked</title>
	<author>TheLink</author>
	<datestamp>1266858960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Their product can be very useful indeed:</p><p><a href="http://search.securityfocus.com/swsearch?query=symantec&amp;sbm=bid&amp;submit=Search!&amp;metaname=alldoc&amp;sort=swishlastmodified" title="securityfocus.com">http://search.securityfocus.com/swsearch?query=symantec&amp;sbm=bid&amp;submit=Search!&amp;metaname=alldoc&amp;sort=swishlastmodified</a> [securityfocus.com]</p><p>To attackers aka hackers<nobr> <wbr></nobr>;).</p></htmltext>
<tokenext>Their product can be very useful indeed : http : //search.securityfocus.com/swsearch ? query = symantec&amp;sbm = bid&amp;submit = Search ! &amp;metaname = alldoc&amp;sort = swishlastmodified [ securityfocus.com ] To attackers aka hackers ; ) .</tokentext>
<sentencetext>Their product can be very useful indeed:http://search.securityfocus.com/swsearch?query=symantec&amp;sbm=bid&amp;submit=Search!&amp;metaname=alldoc&amp;sort=swishlastmodified [securityfocus.com]To attackers aka hackers ;).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230062</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229410</id>
	<title>I'd be surprised if it's anything less than 100\%</title>
	<author>jimicus</author>
	<datestamp>1266855000000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p>I seriously doubt Symantec are only counting "concerted attacks from a single original with a specific target in mind".  More likely they mean "opportunistic attacks".</p><p>So, to<nobr> <wbr></nobr>/., I say:</p><ul><li>Raise your hand if your company consists of more than a handful of people.</li><li>Keep your hand up if your company has an internet connection.</li><li>Keep your hand up if you roll out managed AV software to all desktops and monitor it religiously (including checking for PCs which haven't been seen in a while).</li><li>Keep your hand up if every PC and every server has a full-blown firewall running locally which blocks all incoming traffic except for what you know for a fact you need.</li><li>Keep your hand up if you filter spam (either yourself or through a third-party service).</li><li>Keep your hand up if your filter successfully excluded 100\% of all phishing and trojan-link-spreading emails over the last year.</li><li>Keep your hand up if your web access is filtered on a default-deny basis (ie. staff can only access pre-approved sites).</li><li>Keep your hand up if your web access is through a proxy which blocks the download of executables, ActiveX, Adobe PDFs, encrypted files (who knows what's in them?) and JavaScript.</li><li>Keep your hand up if you update all your PCs (including laptops, even if offsite) within 24 hours of the discovery of any security flaws in client software.</li><li>Keep your hand up if your switches only allow connections from pre-allowed MAC addresses.</li><li>Keep your hand up if you have done all of the above and still your staff are happy with the service you provide and don't try and work around you at every opportunity.</li></ul><p>Those of you who still have your hand up, well done.  You've done just about all that is possible to secure your network short of giving everyone dumb terminals and your internal customers are delighted with everything you do.</p><p>Everyone else <b>will</b> see an attack from time to time.  The whole point of a of security is you have several layers so any attack won't get far.</p></htmltext>
<tokenext>I seriously doubt Symantec are only counting " concerted attacks from a single original with a specific target in mind " .
More likely they mean " opportunistic attacks " .So , to /. , I say : Raise your hand if your company consists of more than a handful of people.Keep your hand up if your company has an internet connection.Keep your hand up if you roll out managed AV software to all desktops and monitor it religiously ( including checking for PCs which have n't been seen in a while ) .Keep your hand up if every PC and every server has a full-blown firewall running locally which blocks all incoming traffic except for what you know for a fact you need.Keep your hand up if you filter spam ( either yourself or through a third-party service ) .Keep your hand up if your filter successfully excluded 100 \ % of all phishing and trojan-link-spreading emails over the last year.Keep your hand up if your web access is filtered on a default-deny basis ( ie .
staff can only access pre-approved sites ) .Keep your hand up if your web access is through a proxy which blocks the download of executables , ActiveX , Adobe PDFs , encrypted files ( who knows what 's in them ?
) and JavaScript.Keep your hand up if you update all your PCs ( including laptops , even if offsite ) within 24 hours of the discovery of any security flaws in client software.Keep your hand up if your switches only allow connections from pre-allowed MAC addresses.Keep your hand up if you have done all of the above and still your staff are happy with the service you provide and do n't try and work around you at every opportunity.Those of you who still have your hand up , well done .
You 've done just about all that is possible to secure your network short of giving everyone dumb terminals and your internal customers are delighted with everything you do.Everyone else will see an attack from time to time .
The whole point of a of security is you have several layers so any attack wo n't get far .</tokentext>
<sentencetext>I seriously doubt Symantec are only counting "concerted attacks from a single original with a specific target in mind".
More likely they mean "opportunistic attacks".So, to /., I say:Raise your hand if your company consists of more than a handful of people.Keep your hand up if your company has an internet connection.Keep your hand up if you roll out managed AV software to all desktops and monitor it religiously (including checking for PCs which haven't been seen in a while).Keep your hand up if every PC and every server has a full-blown firewall running locally which blocks all incoming traffic except for what you know for a fact you need.Keep your hand up if you filter spam (either yourself or through a third-party service).Keep your hand up if your filter successfully excluded 100\% of all phishing and trojan-link-spreading emails over the last year.Keep your hand up if your web access is filtered on a default-deny basis (ie.
staff can only access pre-approved sites).Keep your hand up if your web access is through a proxy which blocks the download of executables, ActiveX, Adobe PDFs, encrypted files (who knows what's in them?
) and JavaScript.Keep your hand up if you update all your PCs (including laptops, even if offsite) within 24 hours of the discovery of any security flaws in client software.Keep your hand up if your switches only allow connections from pre-allowed MAC addresses.Keep your hand up if you have done all of the above and still your staff are happy with the service you provide and don't try and work around you at every opportunity.Those of you who still have your hand up, well done.
You've done just about all that is possible to secure your network short of giving everyone dumb terminals and your internal customers are delighted with everything you do.Everyone else will see an attack from time to time.
The whole point of a of security is you have several layers so any attack won't get far.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229628</id>
	<title>you insensitive wclod!</title>
	<author>Anonymous</author>
	<datestamp>1266856200000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><A HREF="http://goat.cx/" title="goat.cx" rel="nofollow">very own s4itter, Mistake of electing</a> [goat.cx]</htmltext>
<tokenext>very own s4itter , Mistake of electing [ goat.cx ]</tokentext>
<sentencetext>very own s4itter, Mistake of electing [goat.cx]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229088</id>
	<title>Full Text</title>
	<author>Anonymous</author>
	<datestamp>1266853140000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p>'Article' is at best 3 paragraphs, poorly written, with advert popups.<br>For those who are interested, original text below.</p><blockquote><div><p>Wow. That's quite a statistic, but there it is in front of me jumping off the pages of the latest global State of Enterprise Security study from Symantec. The two lines shining so brightly and grabbing my attention read "75 percent of organizations experienced cyber attacks in the past 12 months" and "these attacks cost enterprise businesses an average of $2 million per year". I'll say it again, wow!</p><p>Maybe that is not so surprising when you consider that the report states that every enterprise, yes 100 percent, experienced cyber losses in 2009. The top three losses being intellectual property theft, customer credit card data theft and the theft of other personally identifiable customer data. These losses translated into a financial cost 92 percent of the time mainly in terms of productivity, revenue, and tanking customer trust.</p><p>Of course, as I have said before the math is always hard on the brain when you read these reports. That 75 percent figure is revealed immediately after we are informed that apparently 42 percent of organisation consider that security is the number one consideration for their business, beating off competition from such things as natural disaster and terrorism and traditional crime. In fact, it is a bigger concern than all three of those things combined. The disparity between the two could, of course, be partly down to another revelation in the report: enterprise security is becoming more difficult due to understaffing, new IT initiatives that intensify security issues and IT compliance issues.</p><p>When it comes to understaffing, network security is the biggest problem for 44 percent of those responding, with endpoint security sharing the honours also on 44 percent. There there are the initiatives that IT rated as most problematic from a security standpoint include infrastructure-as-a-service, platform-as-a service, server virtualisation, endpoint virtualisation, and software-as-a-service. And not forgetting compliance, with your typical enterprise having to explore no less than 19 separate IT standards or frameworks and employ around eight of them.</p><p>"Protecting information today is more challenging than ever" said Francis deSouza, senior vice president, Enterprise Security, Symantec Corp. "By putting in place a security blueprint that protects their infrastructure and information, enforces IT policies, and manages systems more efficiently, businesses can increase their competitive edge in today's information-driven world."</p></div></blockquote></div>
	</htmltext>
<tokenext>'Article ' is at best 3 paragraphs , poorly written , with advert popups.For those who are interested , original text below.Wow .
That 's quite a statistic , but there it is in front of me jumping off the pages of the latest global State of Enterprise Security study from Symantec .
The two lines shining so brightly and grabbing my attention read " 75 percent of organizations experienced cyber attacks in the past 12 months " and " these attacks cost enterprise businesses an average of $ 2 million per year " .
I 'll say it again , wow ! Maybe that is not so surprising when you consider that the report states that every enterprise , yes 100 percent , experienced cyber losses in 2009 .
The top three losses being intellectual property theft , customer credit card data theft and the theft of other personally identifiable customer data .
These losses translated into a financial cost 92 percent of the time mainly in terms of productivity , revenue , and tanking customer trust.Of course , as I have said before the math is always hard on the brain when you read these reports .
That 75 percent figure is revealed immediately after we are informed that apparently 42 percent of organisation consider that security is the number one consideration for their business , beating off competition from such things as natural disaster and terrorism and traditional crime .
In fact , it is a bigger concern than all three of those things combined .
The disparity between the two could , of course , be partly down to another revelation in the report : enterprise security is becoming more difficult due to understaffing , new IT initiatives that intensify security issues and IT compliance issues.When it comes to understaffing , network security is the biggest problem for 44 percent of those responding , with endpoint security sharing the honours also on 44 percent .
There there are the initiatives that IT rated as most problematic from a security standpoint include infrastructure-as-a-service , platform-as-a service , server virtualisation , endpoint virtualisation , and software-as-a-service .
And not forgetting compliance , with your typical enterprise having to explore no less than 19 separate IT standards or frameworks and employ around eight of them .
" Protecting information today is more challenging than ever " said Francis deSouza , senior vice president , Enterprise Security , Symantec Corp. " By putting in place a security blueprint that protects their infrastructure and information , enforces IT policies , and manages systems more efficiently , businesses can increase their competitive edge in today 's information-driven world .
"</tokentext>
<sentencetext>'Article' is at best 3 paragraphs, poorly written, with advert popups.For those who are interested, original text below.Wow.
That's quite a statistic, but there it is in front of me jumping off the pages of the latest global State of Enterprise Security study from Symantec.
The two lines shining so brightly and grabbing my attention read "75 percent of organizations experienced cyber attacks in the past 12 months" and "these attacks cost enterprise businesses an average of $2 million per year".
I'll say it again, wow!Maybe that is not so surprising when you consider that the report states that every enterprise, yes 100 percent, experienced cyber losses in 2009.
The top three losses being intellectual property theft, customer credit card data theft and the theft of other personally identifiable customer data.
These losses translated into a financial cost 92 percent of the time mainly in terms of productivity, revenue, and tanking customer trust.Of course, as I have said before the math is always hard on the brain when you read these reports.
That 75 percent figure is revealed immediately after we are informed that apparently 42 percent of organisation consider that security is the number one consideration for their business, beating off competition from such things as natural disaster and terrorism and traditional crime.
In fact, it is a bigger concern than all three of those things combined.
The disparity between the two could, of course, be partly down to another revelation in the report: enterprise security is becoming more difficult due to understaffing, new IT initiatives that intensify security issues and IT compliance issues.When it comes to understaffing, network security is the biggest problem for 44 percent of those responding, with endpoint security sharing the honours also on 44 percent.
There there are the initiatives that IT rated as most problematic from a security standpoint include infrastructure-as-a-service, platform-as-a service, server virtualisation, endpoint virtualisation, and software-as-a-service.
And not forgetting compliance, with your typical enterprise having to explore no less than 19 separate IT standards or frameworks and employ around eight of them.
"Protecting information today is more challenging than ever" said Francis deSouza, senior vice president, Enterprise Security, Symantec Corp. "By putting in place a security blueprint that protects their infrastructure and information, enforces IT policies, and manages systems more efficiently, businesses can increase their competitive edge in today's information-driven world.
"
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229686</id>
	<title>Re:I'm shocked</title>
	<author>L4t3r4lu5</author>
	<datestamp>1266856440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>if you can't spot the conflict of interest you need to turn in your critical thinking hat.</p></div><p>That would be the <a href="http://en.wikipedia.org/wiki/Six\_Thinking\_Hats" title="wikipedia.org">Black hat</a> [wikipedia.org] Ironically, those are the perpetrators of the cyber attacks!</p></div>
	</htmltext>
<tokenext>if you ca n't spot the conflict of interest you need to turn in your critical thinking hat.That would be the Black hat [ wikipedia.org ] Ironically , those are the perpetrators of the cyber attacks !</tokentext>
<sentencetext>if you can't spot the conflict of interest you need to turn in your critical thinking hat.That would be the Black hat [wikipedia.org] Ironically, those are the perpetrators of the cyber attacks!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230268</id>
	<title>Confused</title>
	<author>Anonymous</author>
	<datestamp>1266859500000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>So, let me see, this is an enterprise (Symantec) responsible for enterprise security saying that enterprise security is crap.......which means that they (Symantec) are not doing too good a job which is something that everyone already knows. Hmmm, nothing to see here, move along.</p></htmltext>
<tokenext>So , let me see , this is an enterprise ( Symantec ) responsible for enterprise security saying that enterprise security is crap.......which means that they ( Symantec ) are not doing too good a job which is something that everyone already knows .
Hmmm , nothing to see here , move along .</tokentext>
<sentencetext>So, let me see, this is an enterprise (Symantec) responsible for enterprise security saying that enterprise security is crap.......which means that they (Symantec) are not doing too good a job which is something that everyone already knows.
Hmmm, nothing to see here, move along.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229654</id>
	<title>sysmantec is bad luck</title>
	<author>Anonymous</author>
	<datestamp>1266856320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>me thinks that maybe sysmantec is bad luck</p></htmltext>
<tokenext>me thinks that maybe sysmantec is bad luck</tokentext>
<sentencetext>me thinks that maybe sysmantec is bad luck</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229550</id>
	<title>Re:I'm shocked</title>
	<author>suomynonAyletamitlU</author>
	<datestamp>1266855840000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>This is just marketing to increase sales of their "security" products.</p></div><p>The reason conflict of interest is a problem is because we don't know whether it <b>is</b> "just" marketing or not.</p><p>It's clearly marketing; whether it's true or not is a completely independent matter.  Unless you have data which shows something to the contrary, don't dismiss it out of hand, just like you (clearly) don't accept it on their word.</p></div>
	</htmltext>
<tokenext>This is just marketing to increase sales of their " security " products.The reason conflict of interest is a problem is because we do n't know whether it is " just " marketing or not.It 's clearly marketing ; whether it 's true or not is a completely independent matter .
Unless you have data which shows something to the contrary , do n't dismiss it out of hand , just like you ( clearly ) do n't accept it on their word .</tokentext>
<sentencetext>This is just marketing to increase sales of their "security" products.The reason conflict of interest is a problem is because we don't know whether it is "just" marketing or not.It's clearly marketing; whether it's true or not is a completely independent matter.
Unless you have data which shows something to the contrary, don't dismiss it out of hand, just like you (clearly) don't accept it on their word.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230142
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230062
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233224
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229410
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230724
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229820
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229088
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229472
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229550
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229408
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229088
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229686
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229342
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229100
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233612
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_02_22_1355238_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31234066
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229296
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229088
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229820
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229408
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229192
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230464
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229100
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229342
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229296
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31234066
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229110
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229058
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229410
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233224
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229050
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229686
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229550
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229472
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230724
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230062
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31230142
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229634
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31233612
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31229562
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_02_22_1355238.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_02_22_1355238.31231720
</commentlist>
</conversation>
