Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:40.1 hours is too much (Score 0) 582

You're right, it can be tiring over the long run, and I think that many of us experience that burn out. But I find that I have a healthy amount of enthusiasm for my work when I'm allowed a certain amount of freedom to pursue good solutions on my own & implement them, or work on a team & pull off a project that is technically elegant or especially efficient.

The one feeds the other I think, you build up that confidence from management, and they continue to give you those degrees of freedom that keep you motivated. Then again, all it takes is one overbearing PHB to derail that :( You learn to watch out for those types though, as you see different environments over the years.

The best thing is that if it is going right, no matter how challenging the work is, it feeds into other parts of your life & has positive impacts there.

Comment Re:40.1 hours is too much (Score 0) 582

I'm with you, I liked being a contractor also. I felt like I owed a higher degree of professionalism & rapidity, though. Pull that off, and it'll make you shine, and they'll bend over backward to stay out of your way and let you get the work done.

Now, having moved to a full-time position, which I thought I would never do again, I keep the same attitude of 100% heads down, no slacking whatsoever, and man, do they ever show the appreciation for that. I work more than 40, never outwardly show any negative emotion regarding unpleasant maintenance windows or working conditions, and help out my peers.

So maybe how they treat IT folks also has something to do with the attitude you bring to the job. Act like a paid-by-the-hour, high-dollar pro, even if you're 'fulltime', and you'll be treated as such.

Businesses

Working Off the Clock, How Much Is Too Much? 582

The Wall Street Journal has word of yet another suit against an employer who required an "always on" mentality to persist because of easily available communications. Most of us working in some sort of tech related job are working more than 40 hours per week (or at least lead the lifestyle of always working), but how much is too much? What methods have others used in the past to help an employer see the line between work and personal life without resorting to a legal attack? "Greg Rasin, a partner at Proskauer Rose LLP, a New York business law firm, said the recession may spawn wage-and-hour disputes as employers try to do the same amount of work with fewer people. The federal Fair Labor Standards Act says employees must be paid for work performed off the clock, even if the work was voluntary. When the law was passed in 1938, 'work' was easy to define for hourly employees, said Mr. McCoy. As the workplace changed, so did the rules for when workers should be paid."
Businesses

Submission + - SPAM: Humans lose $21 billion to computer traders

destinyland writes: ""We are just mice dancing" between the supercomputers of Wall Street giants, complains one trading executive, and an investment manager notes computers are making 73% of all stock trades on U.S. exchanges. One former NYSE chairman admitted "This is where all the money is getting made." (Between April and June, Goldman Sachs earned $100 million in one day — on 46 different days.) High-speed algorithms use 30-millisecond trades to probe market conditions, and can buy and sell with a nearly omniscient knowledge of every other investor's price point. The New York Times notes that already these algorithms "execute millions of orders a second and scan dozens of public and private marketplaces simultaneously...""
Link to Original Source
Medicine

Submission + - Next-gen Approach To Drug-resistant Infections (weinterrupt.com)

Art Vanderlay writes: "A dynamic presentation made by Nobel Prize winning chemist, Dr. Kary Mullis sums up a breakthrough new treatment for killer infections in less than five minutes.Dr. Mullis' presentation earned him a standing ovation, as much for the treatment method as for the presentation in which he described the process as being similar to a cop throwing a bag of marijuana into a suspect's car to allow them to get them off the street. His presentation describes how you can provide immediate immunity to any desired antigen. To test out his theory, a bunch of mice were given anthrax and were treated with a drug that was made that to attack anthrax in particular, and direct your immune system to it. Those mice had a 100 percent survival rate."
Google

Submission + - How Apple Will Lose App Developers To Google (bnet.com)

Michael_Curator writes: "Apple is about to repeat the same mistake with the iPhone that it committed with the Mac twenty-five years ago, and Google is going to end up with the lion's share of application sales. Even the forthcoming Jesus Tablet will be better served by Web apps than by a proprietary app store. Google is busily developing those apps, and the FCC will under no circumstances allow Apple to dictate what customers can download to their devices. Where does that leave Apple?"
Linux Business

Submission + - GPL2 Libraries - Is there a point ?

PiSkyHi writes: I understand that if I build an application that links with a library that is licensed under GPL2, I must also make my application GPL2. I can see that value in this for an application, but for a library, what's to stop me separating my program into a GPL2 compliant client app that talks to the rest of my (choose my own license) application ?

Comment Re:its not good enough for google (Score 0) 166

Okay, lots of fans for Finland here. Sure, they have some tech industry there. But they are still rural. Name three major metros in Finland, anyone ?? Helsinki, um, um....

Let's compare with Arkansas for instance, shall we ? Anyone want to debate that it is rural ? Anyone want to debate there is tech industry there ? Walmart, UoA RFID research center, Acxiom, Tyson Foods, Arkansas Best Freight -- all major tech consumers & employers.

Cell phone coverage everywhere ? Sure. Running water everywhere ? Probably.

Paper mills ? Yep, got them too. I don't know who designed them, but a paper mill is a big ugly smelly thing that unless otherwised purpposed, will remain a hulking ghost if decommissioned.

Finland is definitely remote relative to the core of Europe, is sparsely populated, and in fact refers to itself as a 'rural European nation' (google "rural finland").

So, I don't undertand what your argument is. Are you just punking on the fact that the guy was making a joke and I tried to turn it serious ? If that's it, then grow up and join the adult table.

If you believe that Finland is the premier urban oasis of Western Europe, maybe you ought to go there & look around for yourself. Then tell me what you think.

Comment Re:its not good enough for google (Score 0) 166

Change is inevitable. I'm pretty surprised to see anyone here taking the luddite stance.

Think of it this way though. Finland is basically rural Europe. Investing in information industry in rural Europe, Google is leading the envelope is spurring information technology job growth in rural areas, where unemployment is highest (definitely true in the U.S. anyway).

Bringing IT workers in usually will raise the general technology if not education level in a given rural setting (see datacenters in South Carolina and Alabama for instance). That will tend to improve school systems and other services to a certain degree. Granted a datacenter isn't a massive employer, but it can start or contribute to a positive trend.

So, converting a mammoth eyesore that can't be profitable in hard industry space to a net job producer ? How can you argue against that ?

Security

Submission + - Social engineering: Are your ID badges showing? (csoonline.com)

SarahS writes: "Johnny Long (of Google Hacking fame, interviewed here) claims that the easiest way to "hack" into a company isn't with a computer — it's by putting on a fake ID badge and walking in the door like you mean it. If no one at your company is actually verifying badges, then too bad for you, the social engineer just got inside. In this excerpt on CSOonline.com from Long's book, No Tech Hacking, the author explains — with photo proof — why it's so easy for social engineers to create fake ID cards. "Traveling in tech circles, I've seen my share of lanyard clutter, but this nice lady took the prize for most neck-flair toted by a female. As I drew closer, I realized that her badge was decidedly governmental in appearance. ... As she continued chatting into the phone, I swung around to the other side of her and stepped in as close as I could without triggering her (admittedly impaired) stalker detection system. Less than a foot away from her, I snapped the photo below. This particular badge is issued to government employees stationed at the Pentagon. The Post-It note reminds her to "bring a copy of yesterday's all hands to DSS H.Q.'""
Security

Submission + - FTC says 8.3 million hit with identity theft (networkworld.com)

coondoggie writes: "The Federal Trade Commission today released a survey showing that 8.3 million American adults, or almost 4% of all American adults, were victims of identity theft in 2005. A Gartner study in 2006 said ID theft victims numbered 15 million victims. Of the 2005 victims, the FTC said 3.2 million experienced misuse of their existing credit card accounts; 3.3 million experienced misuse of non-credit card accounts; and 1.8 million victims found that new accounts were opened or other frauds were committed using their personal identifying information.The survey found that the costs associated with identity theft varied widely. In at least half of all incidents, thieves obtained goods or services worth $500 or less. In 10 percent of cases, however, thieves got at least $6,000 worth of goods or services. http://www.networkworld.com/community/node/22306"
Security

Submission + - Israel to Test Hijacking Warning System

Iphtashu Fitz writes: Starting next year, Israel will be requiring all airlines flying into its airports to use a new system to identify hijacked planes. The system is meant to specifically protect against 9/11 style attacks but can also identify "classic" hijackings as well. Although details are sketchy, pilots will apparently be required to use a Security Code System device that would require a PIN to be entered, and possibly a voice print as well. The device is the size of a credit card and not tied to a specific aircraft. Pilots that fail to input the proper PIN and/or voice print would be denied entry into Israeli airspace, and if they continue would be considered hostile. If a hijacker were to incapacitate the flight crew he would likely not know the PIN and also not have a voice print of the pilot. If the hijacker forces the pilot at gunpoint to enter the PIN and voice print the pilot could simply enter an alternate PIN that would notify air traffic controllers of the hijacking. In either case the device would notify controllers of a dangerous situation much sooner.

Slashdot Top Deals

"Sometimes insanity is the only alternative" -- button at a Science Fiction convention.

Working...