Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Discriminated against vs entitled (Score 2) 429

by NothingWasAvailable (#49639389) Attached to: Why Companies Should Hire Older Developers

I think you're confusing two very different things.

Asking to be judged based upon your actual skills, and asking to have your experience valued, is not the same thing as being entitled.

I had an ex-coworker who was interviewing, and when the interviewer looked over his publication and patents, all they could say was "Gee, some of these were a long time ago."

IMHO (seeing a number of laid off friends job hunt), two things work against you as an older developer. One, if you haven't kept your skills up - that's on you. We call it "Resume-Driven Design." You need to learn and use new languages and libraries (i.e. javascript libraries). Most of us (I'm mid-50's) started in an age when companies hired talent and developed skills. Now it's about hiring skills (a more ADHD hiring process given the accelerating pace of change). Two, companies want to be fast and agile. Experience and perspective ("I've got a life" or "I've got a family") work against you in that environment. They perceive (rightly or wrongly) that older employees won't have the "run through walls" mentality that they're looking for. ... and don't discount the cultural differences. The Wall Street Journal had an article yesterday about a company that segregates its Millennials in a "Kids Table" area, because of tensions over work styles and maturity/immaturity.

Comment: Re:Do you have a right to have secrets? (Score 1) 107

> Then why do you argue like attacking some other country's network is any less barbaric than attacking their "real" infrastructure?

Actually, I'm in agreement that a cyber attack could be very bad, potentially as bad or worse than a physical attack. However, proving who was responsible may be impossible (to the burden of proof necessary to justify a military response.)

> The lack of civilized behavior which speaks from your notion of "every country for themselves" is appalling.

Whether you agree or disagree, countries spying on each other has been around since antiquity. Is it "right"? That really does depend on which side you're on. The British breaking Enigma and reading Nazi codes was almost certainly "right", unless you were a member of the German Navy and your U-Boat was sunk, in which case it was cheating?

Was China's (presumed) hacking of US companies for economic espionage "right"? We in the US see it as cheating (stealing intellectual property), I'm sure China has a justification that they see as completely valid.

If I can make a completely sarcasm free recommendation, look up the ethical theory of Cultural Relativism.

Comment: Re:They allow their spooks to break into any syste (Score 2) 107

It looks like the burden of proof for combat actions will always exceed the proof that can be obtained from computer forensics.

Further, the likelihood of taking action is inversely proportional to the capabilities of the enemy. The US (for example) has no issue with bombing a third-world country, but would not take combat actions against Russia or China for cyber-crime. For all anyone knows, the evidence was entered in emacs by Spooks at the CIA to make it look like it was China. That's completely different than (for example) capturing a US spy ship (North Korea in the 60's).

Comment: Do you have a right to have secrets? (Score 5, Insightful) 107

Spying on another country has always been "illegal" in the country that is the target. It's "spying". A sovereign state doesn't have to follow the laws of another country.

The deeper (and IMHO more interesting) question is "Are you permitted to have secrets from your own government?"

It's up to you and your government to protect yourself from other governments. But what about your own? That's the [real] question we've been debating for the last several years (i.e. AS ... After Snowden).

Comment: Why not just deliver it yourself? (Score 4, Interesting) 296

This strikes me as either silly (very James Bond), or an indication that Cisco doesn't even trust its own employees.

Otherwise, why wouldn't Cisco just hand deliver the items using its own employees.

Taking this cloak-and-dagger approach implies that if anyone at Cisco knows who's receiving the hardware, then it is at risk, meaning that Cisco is compromised and knows it.

Comment: Occupied a very important niche ... strong typing (Score 4, Interesting) 492

by NothingWasAvailable (#48900245) Attached to: Ask Slashdot: Is Pascal Underrated?

I worked on an industrial project that consisted of a couple of million (with an "M") lines of Pascal. We used IBM's Pascal/VS dialect. Pascal/VS had extensions that made it very, very close to Modula-2. We used Pascal because it was portable (across IBM platforms) and strongly-typed. At the time, it was the only strongly-typed language available to us. Our error rate (bugs reported by customers) was incredibly low, because it was really hard to make many of the screw-ups that were then common in PL/1, Fortran, and c. We ended up with a system that ran across IBM's product line (mainframes, workstations, PC's).

As Pascal aged (we could see that support would be ending), we moved to C++ by converting the entire code base into a subset of C++ (using a software package we purchased and thousands of lines of AWK and sed). We used C++ as a "strongly typed subset" of "c" for about 10 years, before we started converting to objects and methods.

That project started in the 80's and is only now (almost 30 years later) being rolled up and decommissioned. The original architecture was very structured, streamlined, and simple; with an incredible amount of effort going into defining data structures (as befit the restrictions of Pascal, like no dynamic arrays). It held up very, very well. Still blows the doors off its competition in performance, but the company is getting out of development and support, and needs something it can buy (even if it's slower and has less function.)

Comment: Re:Make an example of them. (Score 1) 247

by NothingWasAvailable (#48882065) Attached to: Dish Network Violated Do-Not-Call 57 Million Times

Agree completely (sorry, I don't have any moderator points available!)

For the reasons stated by JDAustin, a corporation must die before the others start to think "Hey, maybe we should obey the laws!"

It appears that one or two financial companies every decade or so just isn't sufficient to keep corporations in line.

Comment: Something to work into my Computer Ethics class! (Score 1) 1

by NothingWasAvailable (#48719407) Attached to: Doxing As An Attack

... this spring: Doxing. There are almost too many topics to try and cover (and the available textbooks have no hope of keeping up.)

This was also seen recently when two New York Times reporters were Doxed (is that a word?) in retaliation for an article that gave information about Darren Wilson. The actual facts of what was published seemed to be almost irrelevant.

This goes hand in hand with "Context Collapse". Making everything about someone public is sort of the ultimate context collapse, isn't it?

Comment: Who's interests are actually served by Congress? (Score 1) 1

This would seem to go hand in hand with the Princeton study from last April that claims the US is an Oligarchy.

The paper itself seems to be quite dense (try reading the abstract!) Our media overlords helpfully interpreted it for us.

Comment: Re:It takes a while (Score 1) 464

Ditto here ... it takes a little while to get used to the progressives, but then they are unnoticeable.

I had one pair that made me dizzy, so I went in and had them checked. They had ground them with the wrong pupil distance.

I've worked with several people who swore by two pairs of glasses ... progressives or bifocals for ordinary use, and a pair ground to one distance for computer work. I also have a pair of strictly reading glasses that I use for close work (mostly reading in bed at night).

Comment: Re:How on earth? (Score 1) 84

Think of it as three separate businesses. A completely full 200 mm (trailing edge, but boutique or specialty) semiconductor fab in Vermont, an under-utilized 300 mm (too small to be competitive) semiconductor fab in New York, and hundreds of engineers and scientists who have consistently produced technologies that let IBM build 5.5 ghz server chips, and continue to come up with new analog and mixed signal technologies at older nodes. The 200 mm fab has multiple small unsexy chips (like antenna switches and battery chargers) in almost every cell phone (including the iPhone 6).

GF wants the boutique fab and the engineering talent.

Hackers are just a migratory lifeform with a tropism for computers.

Working...