Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Credibility Indicators... (Score 1) 504

You need credibility indicators, including the degree. Firstly, to make it past the automated resume filters. Secondly, to connect with often non-technical hiring managers. Start the process to finish the degree. In the breaks between degree work, get certifications in technologies that pay well. Yes, there are lots of people who have certs, but don't know really know anything useful. But I usually hear about them, because they actually got through to the interview rounds before getting found out. If you actually have IT/Tech chops, and have (the desired) certs, and are working on your degree, getting a decent job, while still not easy, will be at least easy-er. Finally, if you have time, do a good job at some volunteer IT work for a charity in return for a recommendation. Or do a really good job at some reasonable, concrete contract work and make a recommendation part of the compensation if they're happy. Hiring is a tough process for the hiring manager. Try to make his/her job easier with respect to hiring you.

Comment: Old-school? (Score 1) 368

by ghostis (#34111494) Attached to: Why 'Cyber Crime' Should Just Be Called 'Crime'

I think the cyber- prefix is an artifact our transitional age (no global network -> pervasive global network). Kids born today will probably not distinguish between "cyber" parts of their world and real parts as concretely as we do. If they hear "cyber" in conversation, they will dismiss the speaker as being part of their parents' generation. People born after the mid-70s tend think of the word "groovy" (language not-withstanding) the same way in my experience.

Comment: Re:I'm convinced! (Score 1) 378

by ghostis (#31606470) Attached to: Photoshop CS5's Showpiece — Content-Aware Fill

Adobe makes their money on implementing efficient work flows for manipulating images, etc. If I am an independent designer, the more work I can cram into a day, the better I live. If I run a megacorp design department, the more work my employees can do, the fewer I need and the larger my bonus. I personally love and use the GIMP. It's an amazing project, but when I go head to head with my brother with his CS4 on a particular task, for the most part, I can't compete.

Comment: Re:Malware detection is Bogus. (Score 1) 410

by ghostis (#31484066) Attached to: How To Guarantee Malware Detection

Also, as an admin, help your clients change their business processes to minimize the number of workstations where regular users are local administrators. Yes, some software packages need local admin to work, but most do not. While doing this will not be a panacea, it does seem to cut infection rates down.

Comment: Switch out the workstation.... (Score 1) 403

by ghostis (#31366598) Attached to: Throttle Shared Users With OS X — Is It Possible?

Get an old pc and a big enough drive.

After hours:

Unplug the workstation from the network.

Load Linux and samba on the old pc.

Put all of the son's data on the old pc.

Rename the pc to the workstation name, plug it into the net, and share out the drive.

Stuff the pc under a desk somewhere.

Rename the workstation.

Plug workstation back into the network with its new name and continue working.

Hokey religions and ancient weapons are no substitute for a good blaster at your side. - Han Solo