News
3/12/2008
10:58 PM
Terry Sweeney
Terry Sweeney
Commentary
50%
50%

I Smell A Reality Show

Geeky? Unsociable? Does this sound like you? It's how the European Union's top technology official summed up the current lot holding down jobs in IT. Her prescription for change isn't likely to win her tons of support, either.

Geeky? Unsociable? Does this sound like you? It's how the European Union's top technology official summed up the current lot holding down jobs in IT. Her prescription for change isn't likely to win her tons of support, either.According to this story, the EU estimates it will need 300,000 additional IT workers by 2010 in Europe. And the EU commissioner for technology, Viviane Reding, says the stereotype of IT jobs being "boring and too technical" must be overcome to attract women into the field.

In addition to elevating women to IT positions of greater authority and visibility, Reding also suggested girls and young women shadow established female professionals to strip away the misconceptions and other barriers, real or perceived.

I've always thought that nothing builds teams faster than isolation and the need to cooperate. We could send them river rafting and on to a ropes course (maybe a little too '80s for this crowd). Or we could just put them on an island or lock them in a suburban household, along with a film crew and a 13-episode contract. "They may be geeky but they overcome poor social skills to manage the network better. Together."

Easy to mock, for sure. Yes, men still outnumber women in IT on both sides of the Atlantic. Still, when I raise this with the women in IT that I know, I get an eye-roll or a verbal back-of-the-hand. They dismiss it as a faux issue. Their eyes narrow further when the subject of quotas gets raised.

All that doesn't mean that these "bring your daughter to work" days are pointless. Just don't expect the atmosphere of the New York Stock Exchange or a hospital emergency room. A lot of what happens in a data center is boring and technical. And the stuff that engages and challenges and requires creative solutions may not be all that interesting to the average layperson -- male or female.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9728
Published: 2015-08-31
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.

CVE-2014-9729
Published: 2015-08-31
The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.

CVE-2014-9730
Published: 2015-08-31
The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.

CVE-2014-9731
Published: 2015-08-31
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and...

CVE-2015-0942
Published: 2015-08-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-6742, CVE-2015-6743, CVE-2015-6744, CVE-2015-6745, CVE-2015-6746, CVE-2015-6747. Reason: This candidate originally combined multiple issues that have different vulnerability types and other complex abstraction issues. Notes: All CV...

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.