Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Comment Direct experience (Score 4, Interesting) 350

I've worked with at least two employers where an indian (sorry, not intended to be racist but they were both indian), person from an agency who was converted to perm was put in place in a hiring position and then every single hire afterwards was indian, and exclusively from the contract agency that placed the individual.

I am aware that there are also incentives for these individuals, and that their relationships with the contracting firms are ongoing.

It's so obvious that I can't imagine it's not a known quantity.

It's not really racial discrimination, it's just a moderately biased business practice.

Comment Yes (Score 1) 162

I've been at it about that long. My very first UNIX support role for pay was with UNIX System III in 1985, so yeah 30 years this year. Creepy.

I worked on other things before that though, just not in a perm role.

I am unix grognard.

Comment Dear rift (Score 0) 174

You were cool when you were cool. Now, I don't recognize you anymore. I don't like your new friends, either.

Remember what we used to love about one another? You were innovative - a few years ago. You raised hopes. Now, you're not new anymore and other people are taking up where you left off with less baggage.

You didn't really lose your way, I get that. You were misled. In the end, it all goes to the same place.

Comment This is a good thing, and inevitable. (Score 1) 161

These breaches are a good thing, because they are forcing evolution.

Something we in IT have always known, is that security cannot be solely applied through obscurity. There will always be opportunity, tools and motivation that expose it.

This has never translated into other information sensitive disciplines, and right at this moment we have a tremendous amount of fragility in our financial and personal identification infrastructures because there is no concept of authentication.

That has to change. More of these breaches, which are not in and of themselves exceptions but rather the rule, will raise awareness to the reality of the situation - that attempting to protect oneself by hoping that ever more widely distributed sensitive information isn't disclosed, is not feasible.

Comment My life in the bush of java (Score 0) 382

Perhaps my experiences are unique, but in the 10 or so years I've been working with and around java development what I've seen is that java permits mediocre developers to produce complex software that's inefficient and badly abstracted, that does complex things slowly.

Furthermore, the little third world walled garden that java puts these developers in isolates and insulates them from the systems they are impacting.

That's my honest experience. Java developers of all the languages I've had to support on average have been the least skilled and least - I don't even know. It's hard to even qualify. Other developers take an interest in systems issues and work to improve it. Working with java developers is often like working with ducks. You can explain things over and over, and in the end unless you fix it from a systems perspective, nothing is going to get done because they don't understand or don't care.

To me, java was designed for one thing which makes a moderate amount of sense. A platform that is global. It isn't that, because java on each platform is fundamentally different due to the libraries involved, but furthermore it's a terrible fit for most of things I've seen people do with it.

Comment After 25 years of linux and 35 years of unix - (Score 1) 303

The current direction of mainstream Linux is so horrible that an open source windows could overtake it.

Config files that cannot be easily maintained, degraded modes that don't work properly, serviceability issues, binary log files that can only be consumed when the system has lib mounted (can't be read with /sbin) - it all points to a system being developed by non-sysadmins, which is exactly the reason that _we_ invented linux and the associated libraries in the first place.

Congratulations next-gen linux devs. You're basically rewriting solaris 3, which we abandoned in favor of lighter, better, simpler and more reliable. I can see the future, you'll be abandoned too.

Comment Their mistake - (Score 1) 116

...was in not publishing those policies to the hackers that got in earlier. If only they had known that there was a company policy against it, it could have saved everyone a lot of extra work.

All things considered though, this arrogance seems in line with a place who doesn't know their own vulnerabilities. I'd wager this isn't the first time they have been compromised and this is just defensive turtling to try to hide facts.

Comment Re:Lower Level != "Complex" (Score 1) 648

I feel just the opposite.

Just like I feel that it's crucial to teach a new driver how to drive a stick, I feel it's crucial to start a programmer on the most basic and fundamental logic and understand what goes into an instruction.

I have seen and endured grotesque inefficiencies that were a result of an abstraction layered on abstraction, in a virtualized sandbox (java usually), running on virtualized/abstracted hardware.

Lower level design and programming is not more 'complex' - it's more precise. While it could be argued that there is a time and a place for training wheels. we also understand with training wheels that they have to come off someday so that the rider can actually 'ride', It seems like all we do in the tech world is make training wheels for training wheels anymore

Comment I've seen this first hand (Score 1) 514

H1-B workers are a corporate dream. They are basically indentured servants, who are often brought over on a 'contract', for which they sign and are expected to take an subaverage pay rate for a duration in exchange for H1-B sponsorship. This is a huge boon to the employer because the worker is in a compromised position and is bound to maintain the position or lose sponsorship and opportunity for further sponsorship.

Without appearing too radical in my position, this really was quite literally the foundation behind indentured servitude in this country in the late 1700s. Individuals would agree to a contract and buy passage to the new world on their contract labor.

Conditions have changed, but this is what business will always seek - leverage. I could not accurately recount the number of times I have seen h1-b postings that were fraudulent. Postings that claimed that there was 'no available talent.' If they would be honest and say "no available talent willing to work for 60% market rate", then at least it would be honest.

Comment Is there something wrong with me that .,.. (Score 0) 178

I find this offensive?

We're spending science mind power, money and time researching a way to make a drug that replaces a persons weakness of character and lack of willpower. If you want to stop smoking, just stop. Don't buy cigarettes.

I feel that our culture is sliding away from any concept of holding people personally responsible for their own choices. If a person smokes, overeats, under-exercises - those are their choices. They must be held accountable.

Comment This is the government - (Score 1) 165

That we died to get away from.

It's also the government that so many tyranny seekers point to as the desired state in which the US must transition. A helpless disarmed population, and a government with no limits.

This law basically gives the government the right to imprison anyone for life who is online doing anything they decide they oppose. One-button tyranny.

God is real, unless declared integer.