Attacks/Breaches
3/11/2014
08:06 AM
Bob Covello
Bob Covello
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail
50%
50%

IT Generations: Communicating Across The Great Divide

At 25 years old, the World Wide Web today presents unique challenges for millennials and crusty curmudgeons alike. Here's how geeks of any age can learn to talk to each other.

The World Wide Web recently celebrated its 25th birthday. I am not referring to the original DARPAnet, or even the days of 2400-baud modems and bulletin-board services. I am referring to the era before the first computer virus was born, on the web that was created when Tim Berners-Lee typed the first HTML code that became the foundation of the web browsers that we all take for granted today.

We have come a long way from those early days of simple HTML code. In a way, we may have reached a new era in the world of information technology, an era that represents a true generation gap in the IT profession.

A dozen years ago, if a veteran technologist spoke about working with a modem, a younger employee fresh out of college or trade school may have remarked about the prehistoric times, but with an underlying sense of awe for the "dinosaur" of the computer age. It was as if the older worker had touched a part of the big bang that created everything that we know today.

One reason for this unspoken admiration is because the new employee of a dozen years ago was not too far removed to have forgotten the “early years.” Perhaps he or she had first-hand experience as a teenager struggling to configure a dial-up line while staring at a flashing “C:\ >” in glowing amber text on a monitor that weighed more than a couch. Or perhaps that young person sat and watched a parent try to decipher a poorly written manual with words like "default settings" while staring at a video screen with the magnificently unhelpful message "syntax error."

Source: Photobucket
Source: Photobucket

A dozen years later, people entering the job scene never had the early experiences of their predecessors. In fact, the new workforce is so far-removed from the old-world that the stories of the old-timers seem apocryphal. Not only do many younger workers not care about the ghost of technology past, many regard it as irrelevant. The immediate question that comes to mind is: Are the younger folks right?

I am not attempting to sound like a crusty curmudgeon; old-timers may be as much to blame for staying with the stories -- and sometimes the mindset -- of the past. The pace of information technology is so rapid that no one can rest on past accomplishments or the wishful thought that everything is perfect the way it is. That would be equivalent to a boxer taking it easy after the 6th round. So the question now becomes, how can the old-timers and the new-bloods come together to make real advancements in a collaborative spirit?

I would start with the old-timers. Let’s approach our broad knowledge and proud history as something we can use to advise our younger brothers and sisters about relevant modern topics. The challenge here is that we must keep learning in order to relate to the new audience. Conversely, we can learn from the younger crowd. The stories and experiences that we have can be presented in a way that rises above the anecdotal. We must not be threatened by the new workers. Sure, they are here to replace us, but our legacy is best served not by resisting the new, but by multiplying it with knowledge from the past.

The younger crowd should take the opportunity to seek out the old-timers who can point them to the future by guiding them through the past. The phrase about repeating history simply does not apply in technology, as I defy you to haul out that dusty Atari from the attic and get it to display anything in our world. Sometimes, however, history is not taught to prevent repetition, but to exemplify triumph in adversity. The early digital technology inventions were truly inspired. The early explorers in the digital world created something from nothing. This age of invention continues and shows no sign of abating anytime soon.

We have new challenges ahead, from areas such as protection of our privacy, all the way to the future of quantum computing. We can gaze forward, while looking backwards. No journey is ever successfully accomplished alone.

Bob Covello is a 20-year technology veteran. His passion is for security-related topics, and he is a strong supporter of education, collaboration, and mutual respect as tools for growth in the infosec community. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
3/11/2014 | 2:54:45 PM
Sure we repeat
I'm not so certain that we don't repeat history - just in a different jacket. How different is a private cloud from a mainframe in theory (slicing a large volume of capacity into discrete services). Or DevOps. It seems like there was a time when developers weren't silo'd like they are now.
Somedude8
50%
50%
Somedude8,
User Rank: Apprentice
3/11/2014 | 3:26:45 PM
Back when...
Back in my day, we had to carve nested tables in to stone tablets and FedEx them to the server.

Nothing tops the bitrate of a FedEx truck packed full of drives!
Bob Covello
50%
50%
Bob Covello,
User Rank: Apprentice
3/11/2014 | 3:40:32 PM
Re: Back when...
Back in my Early years, I drove a truck for Airborne Express, so you are correct!

We got that data to its destination before 10:30 AM Next Business Day.
moarsauce123
50%
50%
moarsauce123,
User Rank: Apprentice
3/12/2014 | 7:51:44 AM
Command line
The command line is as important as it ever was, just look at new tools like PowerShell. You cannot administer systems using a free app on your smartphone. Sadly, a lot of things are still incredibly complicated and bare bones. Just look at any code that needs to tell a system in tiny steps what to do. The only way to overcome this is through frameworks that make life a bit easier.
Bob Covello
50%
50%
Bob Covello,
User Rank: Apprentice
3/13/2014 | 9:19:18 AM
Remarkable coincidence!
Holy synchronicity, Batman!

A similar article to what I wrote is going to run in this Sunday's New York Times.

Now I know how the Beatles felt when The Rolling Stones showed up.

Now I know how Facebook felt when Twitter arrived!

Sadly, the author's outlook is not as positive as mine.

 

http://www.nytimes.com/2014/03/16/magazine/silicon-valleys-youth-problem.html?ref=magazine&_r=0
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/14/2014 | 10:49:55 AM
Re: Remarkable coincidence!
Thanks for sharing the NYTimes piece, Bob. There's a great quote in it from David Dalrymple, a technologist in the valley:

 "The most innovative and effective companies are old-guard companies that have managed to reach out to the new guard, like Apple, or vice versa, like Google."

Can anyone share their experiences across the gnerations that worked together to innovate and create great products?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-5522
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6025. Reason: This candidate is a reservation duplicate of CVE-2014-6025. Notes: All CVE users should reference CVE-2014-6025 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-5523
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5524. Reason: This candidate is a duplicate of CVE-2014-5524. Notes: All CVE users should reference CVE-2014-5524 instead of this candidate. All references and descriptions in this candidate have been removed to prevent acciden...

CVE-2014-5575
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE-2014-5665
Published: 2014-09-22
The Mzone Login (aka com.mr384.MzoneLogin) application 1.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio