mercredi 25 mars 2015

Dirty laundry: the dark secrets of working in the technology industry

Introduction and age concerns


If you are reading this then it's a good bet that you are interested in technology or more likely, work in IT. But there are secrets within the tech industry that may surprise you – that's probably because no one likes to talk about them.


Whether you have a keen interest in technology or work as a developer, programmer, support professional, administrator or IT manager, you'll likely find these dark secrets fascinating reading…


Why is a lot of software so buggy?


When you have updated the software on your smartphone for the umpteenth time due to "bug fixes and performance improvements" you may wonder why so many updates are needed.


The truth is that most software developers aren't all that good at their job, writing code that is simply not fit for purpose. This leads to bugs, flaws and spiralling costs of developments. We all need software to function in our daily (civilised) life so there is a big demand for programmers that outstrips the number of actual decent developers, leading to the situation we have at present.


But also, fixing bugs is an expensive process, and at some point the money runs out and code has to be released in order to get some revenue back from it. Automated testing can help but this may only reduce failure rates down to about 40%.


Don't get old


We can't stop aging but it appears we also can't stop being discriminated against because of age. The older people get, the more likely they are to find getting a role in IT a hard job in itself.


Technology is obsessed with looking young and being hip and trendy. In the US, according to statistics from the Bureau of Labor Statistics and Census, while salaries increase for engineers in the semiconductor sector in their 30s, this slowed after the age of 40 and actually fell for those in their 50s.


Another survey carried out by recruitment consultants Greythorn found that nearly three quarters of IT professionals thought the industry discriminated against older workers.


Ros Altmann, the government's tsar for older workers, told the Telegraph that workers with the old 'O' levels were suffering rejection from jobs, and were at a disadvantage in the job market.


When old IT equipment goes missing


Old computers never die, they get repurposed by your IT staff in their homes. In fact old IT equipment theft is commonplace. According to a report by the Guardian, more than 600 laptops and 83 iPads belonging to the BBC were stolen over a five-year period. Also, 34 desktop computers were also stolen, along with seven e-readers and four kettles.


It may seem like a victimless crime, but more often than not, computer equipment contains sensitive data that an organisation may not want leaving the infrastructure. Many organisations still haven't got processes in place to make sure that any device leaving the network permanently has data wiped off it completely.


Insider threats and qualification quirks


Does your firm have a Snowden?


With the Edward Snowden scandal still fresh in the minds of many, we know just how much damage a disgruntled employee can wreak if given the impetus to do so.


In fact, it is very easy for anyone in IT to sift through all the data coming in and out of an organisation's network should they be minded to do so. The enterprise can only be as secure as the ethics IT administrators live by. Administrators are privy to far more data than they need to be to carry out their role – and, to be honest, the same argument can be made about the humble user.


Edward Snowden


The common "insider threat" problem means that organisations should operate on a "least privilege" model that means people have access to the minimal amount of data possible, and that data access is continually monitored.



Consultants taking the credit, and dodging blame


From time to time, consultants can be brought in to help implement particular systems. When it all works, it's great but some consultants will try to take all the credit for the implementation.


Equally, if things go wrong with a project, these consultants can put the blame on IT staff and argue that the system works elsewhere, and the problem lies in how local IT infrastructure is implemented.


IT certifications don't mean a person is good at their job


Recruiters and human resources personnel use certifications as a way of trawling through the hundreds of job applications they get when sourcing personnel for roles within the IT organisation. It's a quick fix that matches up people to roles. But old-timers will often lament that people hired on the basis of how many certificates they've got may not have the real world experience to actually do their jobs.


While a certificate may get someone through the door and show that they are dedicated to a career in IT, it is not that great a gauge that the person is any good at their job.


There is no perimeter in IT security


With infrastructure there is often talk about guarding the perimeter from hackers. The truth is, there is no perimeter and believing there is one is like believing in the Easter Bunny.


And if there was a perimeter, where would it be? Organisations and security vendors can't really define where the perimeter is. It could be the endpoint, the user or where the physical network actually ends. Putting controls on any of these will give an organisation a false sense of security as hackers could simply find another way in.


And if anything, the cloud makes this worse with applications and servers running outside of the traditional network, but still interacting with users within that network as well as those outside it.


It is better to design security with no assumption of a perimeter – for example, guarding a firm's data is a better bet for security.







from TechRadar: All latest feeds http://ift.tt/1y53z70

via IFTTT

Related Posts:

  • Review: Technics Premium C700 Introduction The Premium C700 system is the first Technics branded hi-fi system to be launched in seven years. The hi-fi brand, which was lauded and loved throughout the Seventies and Eighties for its turntables and silvery … Read More
  • MWC 2015: HTC One M9 vs Samsung Galaxy S6 Design, display and processor The waiting is over and two of the most anticipated flagship phones of 2015 have been unveiled and thrust into our very palms. But how do they stack up against one another? We take a look at the… Read More
  • Review: Canon EOS M3 Introduction and features Canon's first compact system or mirrorless system camera, the EOS M, seemed very good on paper, but at launch it was expensive and let down by a lacklustre autofocus system that was slow and prone t… Read More
  • Review: Updated: HTC One M9 Introduction, design and screen The HTC One M9 is a phone built on precision. It's a brand realising it made a pretty much perfect phone with the One M8 and doubling down on its greatest strength to try and win over more cus… Read More
  • Review: Updated: Sony Xperia Z3 Compact Introduction and design The Sony Xperia Z3 Compact is the latest entrant in Sony's rapidly expanding line of Xperia Z handsets. Though the original Xperia Z was only launched in March 2013, there have since been three main e… Read More

0 commentaires :

Enregistrer un commentaire