I really dislike this type of articles, because for any such statements to be true, they have to be replicated by different vendors on multiple occasions. When one vendor does one thing and gets a result once, it does not mean that this is a pattern than can be exploited.