More than that, being oversold means you need to charge more. It's a win-win!
thricenightly writes "After more than 20 years in IT I've learned that the most valuable people in a team are frequently the old timers. Young pups straight out of college might (think they) know all the latest buzzwords and techniques, but in the real world, where getting working products delivered on time and on budget is of paramount importance, people who have been doing the job for a decade or two tend to be the people I'd rather be working alongside. I've recently been elevated to a position where I get to interview and choose those who get hired in my department. Although I'm very much focused on choosing the right person for the role regardless of age, experience or whatever, it's probably fair to say the more mature applicants will get a more sympathetic hearing from me than they might from most other interviewers for IT roles. The question is, what do I ask older applicants to get them to demonstrate the value of their experience? My current gambit is something like 'IT is seen as a young man's game. My next applicant after you is 23 years old. What do you know that he doesn't?' This gets responses ranging from the vague to the truly enlightened. All next week I'm interviewing for a number of senior software designer and developer roles. What should I be asking of the more experienced applicants, and what responses should I be looking out for?"
Slashdot has one of the best discussion systems there is. It's grown and adapted over the years to meet various challenges and suit the needs of our users. A lot of time and effort has gone into it and we are always open to user input to help make it better. Some of our best ideas start as user suggestions and we appreciate the feedback. Of course they can't all be gems and sometimes the suggestions we get are unworkable or just bizarre. Here are a few of my favorite unhelpful, helpful suggestions.
theodp writes "You probably saw media coverage of Bill Gates showing off touch-screen technology to his CEO play group last week. With the introduction of the iPhone and iPod Touch, touch (and multi-touch) technology — which folks like Ray Ozzie enjoyed as undergrads way back in the early '70s — has finally gone mainstream. The only question is: Why did it take four decades for its overnight success? Some suggest the expiration of significant patents filed during '70s and '80s may have had something to do with it — anything else?"
Roland Piquepaille writes "Why are diamonds so shiny and beautiful? A Japanese mathematician says it's because of their unique crystal structure and two key properties, called 'maximal symmetry' and 'strong isotropic property.' According to the American Mathematical Society (AMS), he found that out of all the crystals that are possible to construct mathematically, just one shares these two properties with the diamond. So far, his K4 crystal exists only as a mathematical object. And nobody knows if it exists — or if it can be synthesized."
The time-honored tradition of code scavanging has long been a way for new programmers to "break in" to a new language or task that they may not want to build from the ground up. The re-use of old code, cleaned up and tweaked to a new purpose can help developers learn many useful skills and accomplish tasks quickly, especially for small tasks that aren't of vital importance. One blogger wondered if this process could be formalized and tools could be built to help foster and enable code scavanging on a mass level. Is this a viable option, or are there just too many things to consider?
wattrlz writes "Apparently the current champion of v1*gr4 spamming solicited some of the wrong email boxes. Alexy Tolstokozhev was recently found murdered in his palatial spam-bought estate near Moscow. The implications of this hands on method of system administration are staggering." Update: 10/12 15:28 GMT by Z : Good story. Unfortunately, probably a fake.
Fantastic Lad writes to tell us that journalist Michael Hanlon recently got the opportunity to experience the Army's new not-so-secret weapon, dubbed "Silent Guardian". The Silent Guardian is essentially (even though the creators prefer you not refer to it as such) a ray gun, emitting a focused beam of radiation similar to your microwave tuned to a specific frequency to stimulate human nerve endings. "It can throw a wave of agony nearly half a mile. Because the beam penetrates skin only to a depth of 1/64th of an inch, it cannot, says Raytheon, cause visible, permanent injury. But anyone in the beam's path will feel, over their entire body, the agonizing sensation I've just felt on my fingertip. The prospect doesn't bear thinking about. "
Roland Piquepaille writes "Physicists from the University of Illinois at Urbana-Champaign (UIUC) say they have improved the performance of solar cells by 60 percent. And they obtained this spectacular result by using a very simple trick. They've coated the solar cells with a film of 1-nanometer thick silicon fluorescing nanoparticles. The researchers also said that this process could be easily incorporated into the manufacturing process of solar cells with very little additional cost. Read more for additional references and a photo of a researcher holding a silicon solar cell coated with a film of silicon nanoparticles."
lisah writes "After keeping users waiting for nearly six years, Emacs 22 has been released and includes a bunch of updates and some new modes as well. In addition to support for GTK+ and a graphical interface to the GNU Debugger, 'this release includes build support for Linux on AMD64, S/390, and Tensilica Xtensa machines, FreeBSD/Alpha, Cygwin, Mac OS X, and Mac OS 9 with Carbon support. The Leim package is now part of GNU Emacs, so users will be able to get input support for Chinese, Tibetan, Vietnamese, Thai, Korean, and other languages without downloading a separate package. New translations of the Emacs tutorial are also available in Brasilian Portuguese, Bulgarian, simplified and traditional Chinese, Italian, French, and Russian.'"
Apple tells iPod and iTunes users to hold off upgrading their computers to Windows Vista, citing compatibility issues. By the Associated Press.
Link to Original Source
Link to Original Source
GoCanes writes "Salon's Scott Rosenberg explains why even small-scale programming projects can take years to complete, one programmer is often better than two, and the meaning of "Rosenberg's Law." After almost 50 years, the state of the art is still pretty darn bad. His point is that as long as you're trying to do something that has already been done, then you have an adequate frame of reference to estimate how long it will take/cost. But if software is at all interesting, it's because no one else has done it before. http://www.salon.com/books/int/2007/02/03/leonard
An anonymous reader writes "This week marks the sixteenth anniversary of the launch of Hubble Space Telescope. 'To celebrate [...] NASA and the European Space Agency (ESA), are releasing this image of the magnificent starburst galaxy, Messier 82 (M82). This mosaic image is the sharpest wide-angle view ever obtained of M82. The galaxy is remarkable for its bright blue disk, webs of shredded clouds, and fiery-looking plumes of glowing hydrogen blasting out of its central regions.' Wired News also has some nice additional images."
ellem asks: "The upper management team of my company has made a decision that the IT department will work with employee's home computers and laptops. Despite every possible explanation of liability and the loss of proprietary information, the decision was made in order to satisfy a 'need' that the employees have expressed. Many of our employees are, in fact, independent contractors and could go elsewhere with little impact to themselves. Upper management feels offering this service to our employees will separate us from our competitors, and is so committed to this that they have allocated a special budget for tools, software and new hires to handle this particular segment of IT. However, I am still rather worried about general liabilities. While I can keep the network relatively safe and guard against certain types of file transfers, the fear I have is a tech wrecking an employee's home machine/laptop - whether they actually do or the employee perceives that they did. Are any of your shops offering this type of extra service? Do you have any policies in place to protect your company from liabilities that could spring up?"