... Computers had been in use for over 30 years at that time by the US governement. By the 80's computers were in wide use for many purposes. I would suggest that many records are in computers, but one issue we have seen is that the government has not be able to get the computers to work together.
Getting the wildly heterogeneous systems to talk together is the major sticking point. I have been REQUIRED to enter duplicate information into multiple database systems during the over 20 years I have worked in the federal government. The worst offender for this duplication is systems that track "mandatory" training requirements. A major cause of the smokestacks is that the people who pay for a system do not want to pay money so that "other groups" can use the data. Another driver is the mindset that not providing an interface makes for better security.
I wonder when will we learn that fighting the Nature is not the best path to survival.
What does that mean in practice in this context, should we just let the rootworms have the corn?
Before the genetic engineering the rootworms didn't "have" all the corn. The existing pesticides, used prudently, and other practices were working. The pesticides are not the only course for fighting the rootworms, crop rotation and other practices can work. The pesticides were the most common method. But pesticides are scary chemicals, and Jenny McBunny swears they cause "-insert disorder here-", so "think of the children" shenanigans happened.
As others have mentioned, there was very little altruism behind the sale of the modified corn.
*rimshot*
Do the math it IS two factor authentication.
1) something physical you have (card with chip)
2) something you know (PIN)
So, you might think, "aha, it will be THREE factors, woohoo!". However, chip, PIN, and signature, can't really be considered three factor authentication, unless the signature is checked in real (or near real) time.
"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde