News
3/12/2008
10:58 PM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
RSS
E-Mail
50%
50%

I Smell A Reality Show

Geeky? Unsociable? Does this sound like you? It's how the European Union's top technology official summed up the current lot holding down jobs in IT. Her prescription for change isn't likely to win her tons of support, either.

Geeky? Unsociable? Does this sound like you? It's how the European Union's top technology official summed up the current lot holding down jobs in IT. Her prescription for change isn't likely to win her tons of support, either.According to this story, the EU estimates it will need 300,000 additional IT workers by 2010 in Europe. And the EU commissioner for technology, Viviane Reding, says the stereotype of IT jobs being "boring and too technical" must be overcome to attract women into the field.

In addition to elevating women to IT positions of greater authority and visibility, Reding also suggested girls and young women shadow established female professionals to strip away the misconceptions and other barriers, real or perceived.

I've always thought that nothing builds teams faster than isolation and the need to cooperate. We could send them river rafting and on to a ropes course (maybe a little too '80s for this crowd). Or we could just put them on an island or lock them in a suburban household, along with a film crew and a 13-episode contract. "They may be geeky but they overcome poor social skills to manage the network better. Together."

Easy to mock, for sure. Yes, men still outnumber women in IT on both sides of the Atlantic. Still, when I raise this with the women in IT that I know, I get an eye-roll or a verbal back-of-the-hand. They dismiss it as a faux issue. Their eyes narrow further when the subject of quotas gets raised.

All that doesn't mean that these "bring your daughter to work" days are pointless. Just don't expect the atmosphere of the New York Stock Exchange or a hospital emergency room. A lot of what happens in a data center is boring and technical. And the stuff that engages and challenges and requires creative solutions may not be all that interesting to the average layperson -- male or female.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2227
Published: 2014-07-25
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.

CVE-2014-5027
Published: 2014-07-25
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.

CVE-2014-5100
Published: 2014-07-25
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_...

CVE-2014-5101
Published: 2014-07-25
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authn...

CVE-2014-5102
Published: 2014-07-25
SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.