Hacker Newsnew | comments | show | ask | jobs | submit | majelix's commentslogin

Spoiler alert: Your "private" network isn't.

-----


If you're hourly, of course it's a different thing.

But if you're salaried, it's an arms race. Employees willing to work extra hours get more done (or at worst, only appear to get more done), and thus will get the rewards and promotions.

-----


I actually experienced the opposite. The employees who went to heroic efforts to work long hours and “get things done” were often the ones who did the worst work that had to be cleaned up by someone else later. The people who came in on time and left on time tended to be more methodical and their shit just worked.

-----


But yet we find 3-5 hours a day for watching TV?

-----


It's even worse than that -- kill is just a command that sends signals to a program, some of which happen to (gracefully or not) stop the program. You can even define your own!

-----


> while the president leads the day-to-day operations.

How would you characterize the COO then?

-----


COOs manage the day-to-day operations.

-----


What's the difference between "leading" day to day operations and "managing" them?

-----


I know SC2 is probably a poor example but it fits very well here. It's the difference between managing a team strategy in an RTS versus looking at the individual unit deaths/spawns, types of units, etc.

-----


The two are similar, and you'll often see them combined. For the most part, president pre-dates the CXO nomenclature. Before there were CEOs, COOs, and CFOs, there were Chairmen, Presidents, and Treasurers. Those titles/roles still exist, but are often merged with CXO functions.

-----


> How does this not trigger any flags for monopoly abuse at the DoJ?

For starters, Microsoft does not have a monopoly on game consoles.

-----


He's probably talking about client-side IDS, such as in a corporate environment.

It's worth noting that in such an environment, he likely controls the client machines themselves (ie, only corporate machines on the corporate network), so it's straightforward to just push out a trusted Certificate Authority and intercept anyways.

-----


Snarky answer: He wants to be able to spy on his users in order to protect them from themselves.

-----


Why would technology be any different from anything else? The prosecution and defense are free to call on expert witnesses to explain SSL and heart surgery to the judge and jury.

-----


They're probably simple wrappers around https://marketplace.atlassian.com/plugins/org.swift.atlassia...

-----


That's exactly what we use. Unfortunately the scripts are full of various hardcoded internal info and I am not at liberty to post them. The CLI tools here make it very easy, though.

-----

More

Applications are open for YC Summer 2015

Guidelines | FAQ | Support | Lists | Bookmarklet | DMCA | Y Combinator | Apply | Contact

Search: