Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.


Forgot your password?

+ - 19 Ways to Know The Job Interview is Over

Submitted by
Esther Schindler
Esther Schindler writes "There's a moment when you know that, however hard you worked to get to this interview for a programming job or contract, the rest of the meeting is a waste of time. Here's 19 real-world examples of the moment when suspicion that "this isn't a fit" reaches certainty. It's for both the interviewer ("When the interviewee explains that a non-functional requirement is a situation where the software is not working and he needs help to fix the issue") and the candidate ("After discussing techniques for rolling over SharePoint servers to maintain high availability, the interviewer prompts, 'Say something technical.'")."

Comment: Re:Ya well (Score 1) 113

by HoustonB (#27198423) Attached to: Court Demands Private Facebook Data
I agree that one cannot switch course midway and as per the Oliver North case, it is best to adopt the 5th from the get go.

My reply to the original post was aimed at: "If something is private, keep it off websites and other such things. If something is really private, keep in encrypted and/or stored in a secure location (like a good safe)."

Keeping things encrypted or in a safe location (like a safe) is inadequate.

I agree with only the final sentence: "If something is really, really private, don't have a record of it at all, keep it just in your head."

The United States Supreme Court has squarely held that the Fifth Amendment privilege deflects any official compulsion to answer incriminating questions until after immunity has been granted.

In the case of a private key, the immunity is extended only to the content of the key itself. So if the key is comprised only of digits then the immunity is not worth much. On the other hand if the key is "iKilledMyMother01.12.1972", then that is what the immunity covers, it does not also include the content of any incriminating files that one has possession, custody or control over.

Comment: Re:Ya well (Score 1) 113

by HoustonB (#27197841) Attached to: Court Demands Private Facebook Data
You are ignoring p2p networks like FreeNet, where files are encrypted and highly fragmented with the intention of guaranteeing anonymity - to facilitate free speech in oppressive regimes like China and to a lesser extent the USA.

In the USA for example a court can compel you to provide a decryption key, failure to do so resulting in contempt of court charges. There is little plausible deniability for something the authorities pull from your safe.

"Well hello there Charlie Brown, you blockhead." -- Lucy Van Pelt