ECMA TC39 Committee Proposal For Where They Will Go Out To Lunch Reaches Stage 4
July 14, 2017 In the wake of excitement generated earlier this week from the release of the 8th edition of the ECMAScript specification, the ECMA TC39 …
July 16, 2017 WASHINGTON, D.C. - Findings released today by the Pew Research Center indicate that the popular tech interview question, “In as much detail as possible, what happens when you type a URL into your browser and press enter?” is being widely abandoned by the technology sector due to most candidates dutifully including a bleak depiction of how various entities spy on, manipulate, or abuse these requests. Companies were quick to identify the trend of interviewers emerging from the room appearing pale and gaunt, and the question was quickly stricken from their interview process.
The question, which was originally intended to be a fun exercise allowing the candidate to flex their knowledge of TCP/IP networking, instead is turning into a dreary affair featuring a punctilious chronicling of how clandestine organizations and autocratic regimes interfere with the world’s internet traffic. In the report, Pew describes how a large fraction of companies using this question confirmed that most candidates, in an attempt to give as complete an answer as possible, would diligently include spooky specifics like how the NSA likely intercepts and records request metadata and ships it off to their Utah Data Center.
Pew’s report also indicated that a surprising percentage of candidates were also able to expound on exactly how nefarious state actors are able to manipulate or censor internet traffic. According to Pew, interviewees were able to offer brilliantly specific descriptions on how exactly China’s Great Firewall (GFW) might work to inspect and filter network traffic, or the different strategies Turkish ISPs might wield to go about injecting propaganda into unencrypted traffic.
With the United States embroiled in an ongoing net neutrality debate, precocious candidates were also quick to include speculative answers on how american ISPs would go about introducing bandwidth restrictions and blacklists into existing infrastructure. The Pew report indicates that many top candidates were able to propose some breathtakingly elegant solutions that ISPs might use to twist the arms of customers.
According to the report, candidates providing profound insight into domestic and geopolitical internet fuckery was too grim for interviewers, and the question was discarded in short order. Pew also indicated that industry segments involving device encryption were also moving away from similar types of end-to-end interview questions.
This article was originally published on AlwaysTrending, a fantastic (but archived) satire site by Matt Frisbie. Copied here with permission of the author.
July 14, 2017 In the wake of excitement generated earlier this week from the release of the 8th edition of the ECMAScript specification, the ECMA TC39 …
July 5, 2017 MOUNTAIN VIEW - In an attempt to modernize its course offerings, Coursera announced this week the upcoming release of “Client-side …
June 25, 2017 SAN FRANCISCO - Is the new Twitter user interface ruining your life? Now there’s a way out - if you’re willing to pay for …
June 21, 2017 PALO ALTO - Enjoy working from home, but yearn for the interminable stimulation and irritation of an open office? There’s an app …
June 19, 2017 NEW YORK - Eager to cash in on the machine learning gold rush, this week Etsy threw its custom-embroidered hat into the ring with the …
June 12, 2017 CHICAGO - Normally sporting a jovial and collaborative atmosphere, the office of a downtown software company descended this morning into …
June 9, 2017 MOUNTAIN VIEW - In response to overwhelming demand from recruiters who prefer to invest the smallest possible amount of effort when …
June 6, 2017 SAN FRANCISCO - In response to a growing number of customers who seemed to have forgotten their place, version control giant GitHub …
May 26, 2017 PALO ALTO - Already waist-deep in what was certain to be another daylong slog through the company’s ghastly GitHub repository, …