Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Stop being an obnoxious tech snob (Score 2) 809

by kid_wonder (#49048863) Attached to: Ask Slashdot: What Portion of Developers Are Bad At What They Do?

You post two examples of questions you asked your applicants.

Exactly zero of them applied directly to the actual work they would be doing.

I am fucking sick and tired of being asked moronic questions during interviews - and horrified when people I work with ask them. Why do you feel the need to show people how much they don't know, and pretend you are smarter than them?

If you want to pretend to want to find out how smart your applicant is, by all means continue. Otherwise just administer an IQ test and have them write some code related to the product they will be working on. Then, for gods sake, ask them about themselves.

The interview is not about you -- it's about the applicant. When you find a decent one you do want *them* to actually want to work with *you* right?

Comment: Re:Little disturbing (Score 1) 491

by kid_wonder (#46569761) Attached to: How Satellite Company Inmarsat Tracked Down MH370

I hear ya. But let me ask you this - are the insurance companies going to pay life insurance claims based on the evidence being used to make this announcement?

I'm not saying they need to find bodies, but appearing to simply rely on this new data analysis just feels wrong. The way I read this was that, based on this new analysis the plane was in the southern corridor and based on that "ping arc" they were not near land. Therefore everyone is dead.

I mean, that is my point. I am not saying the analysis is wrong, just that it felt weird to me that they announced all were lost due to that piece of information. Do you really tell family members that everyone is dead without having found wreckage? That just struck me as, at the very least, poor PR timing and at worst trying to sweep all of this away.

asmkm22 makes a good point, the Malaysian government is probably not used to the pressure of criticism and they just want this over with. Which, if true, makes this deplorable conduct.

Comment: Re:That guy... (Score 1) 112

He is good at what he does, and I can't figure it out either

1. Comes up with believable (albeit conspiratorial) story lines railing against government and big industry, and that you have proof
2. Say your business model is a protection against intrusive government and industry
3. Profit???

Comment: Had this conversation a million times... (Score 4, Funny) 505

by kid_wonder (#42451621) Attached to: Trip To Mars Could Damage Astronauts' Brains

Me: "Here's a pen dad, sign the picture for them"
Dad: "Why do they want my signature?"
Me: "You were an astronaut when you were younger, you went to the moon"
Dad: "What?"
Me: "Yes, you went to the moon."
Dad: "We've been to the moon? That is amazing!!!"
Me: "Yes Dad, and *you* have been to the moon"
Dad: "*I've* been to the moon?!?"
Me: "Absolutely, see that picture you are signing? That is you"
Dad: "OK. Why am I signing this?"
Me: "Your were an astronaut when you were younger, you went to the moon" ...

Security

+ - Researchers Convert Phones into Secret Listening Devices->

Submitted by
CowboyRobot
CowboyRobot writes "Columbia University grad student Ang Cui demonstrated how networked printers and phones can be abused by attackers. "The attack I demonstrated is caused by the multiple vulnerabilities within the syscall interface of the CNU [Cisco Native Unix] kernel," Cui tells Dark Reading. "It is caused by the lack of input validation at the syscall interface, which allows arbitrary modification of kernel memory from userland, as well as arbitrary code execution within the kernel. This, in turn, allows the attacker to become root, gain control over the DSP [Digital Signal Processor], buttons, and LEDs on the phone. The attack I demonstrated patches the existing kernel and DSP in order to carry out stealthy mic exfiltration.""
Link to Original Source

What this country needs is a dime that will buy a good five-cent bagel.

Working...