08:06 AM
Bob Covello
Bob Covello
Connect Directly

IT Generations: Communicating Across The Great Divide

At 25 years old, the World Wide Web today presents unique challenges for millennials and crusty curmudgeons alike. Here's how geeks of any age can learn to talk to each other.

Source: Photobucket
Source: Photobucket

Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
3/14/2014 | 10:49:55 AM
Re: Remarkable coincidence!
Thanks for sharing the NYTimes piece, Bob. There's a great quote in it from David Dalrymple, a technologist in the valley:

 "The most innovative and effective companies are old-guard companies that have managed to reach out to the new guard, like Apple, or vice versa, like Google."

Can anyone share their experiences across the gnerations that worked together to innovate and create great products?
Bob Covello
Bob Covello,
User Rank: Apprentice
3/13/2014 | 9:19:18 AM
Remarkable coincidence!
Holy synchronicity, Batman!

A similar article to what I wrote is going to run in this Sunday's New York Times.

Now I know how the Beatles felt when The Rolling Stones showed up.

Now I know how Facebook felt when Twitter arrived!

Sadly, the author's outlook is not as positive as mine.
User Rank: Apprentice
3/12/2014 | 7:51:44 AM
Command line
The command line is as important as it ever was, just look at new tools like PowerShell. You cannot administer systems using a free app on your smartphone. Sadly, a lot of things are still incredibly complicated and bare bones. Just look at any code that needs to tell a system in tiny steps what to do. The only way to overcome this is through frameworks that make life a bit easier.
Bob Covello
Bob Covello,
User Rank: Apprentice
3/11/2014 | 3:40:32 PM
Re: Back when...
Back in my Early years, I drove a truck for Airborne Express, so you are correct!

We got that data to its destination before 10:30 AM Next Business Day.
User Rank: Apprentice
3/11/2014 | 3:26:45 PM
Back when...
Back in my day, we had to carve nested tables in to stone tablets and FedEx them to the server.

Nothing tops the bitrate of a FedEx truck packed full of drives!
Lorna Garey
Lorna Garey,
User Rank: Ninja
3/11/2014 | 2:54:45 PM
Sure we repeat
I'm not so certain that we don't repeat history - just in a different jacket. How different is a private cloud from a mainframe in theory (slicing a large volume of capacity into discrete services). Or DevOps. It seems like there was a time when developers weren't silo'd like they are now.
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio