Language Selection

English French German Italian Portuguese Spanish

Microsoft's personnel puzzle

Filed under
Microsoft

Sorkin, who holds a doctorate in computer science from the University of California, Los Angeles, said he first received an unsolicited invitation to Microsoft's Redmond, Wash., headquarters in about 2000, on the recommendation of a senior Microsoft manager.

But rather than attempt to win him over as a prize prospect--Sorkin specializes in operating system design and computer security, among other areas--Microsoft interviewers challenged him with a technical "pop quiz," he recalled. No one tried to sell him on either the company or the job, he said. He withdrew his application.

Then, during the past year, Microsoft called Sorkin to say it had scheduled a phone interview with him for another job. He hadn't applied for it, and no one had asked if he was interested.

"It displayed a certain degree of arrogance and presumption," Sorkin said. The approach also backfired: The consultant, who splits his time between Los Gatos, Calif., and Mesa, Ariz., didn't join the software maker.

Microsoft won't comment on Sorkin's claims. But he is one of many observers within and outside of Redmond who's raising questions about the way the company recruits and retains its work force. The issue has come to the fore in part because of comments made this month by internal Microsoft recruiter Gretchen Ledgard, who blasted some of her company's managers as "entitled, spoiled whiners" who assume that everyone wants to work for Microsoft.

Ledgard's comments also lifted the curtain on a broader debate about personnel practices at Microsoft, which now finds itself competing for talent with a host of new start-ups, and established rivals such as Google, IBM and Sony.

Among the charges leveled at Gates, Ballmer and crew: Job candidates have been turned off by Microsoft arrogance, and the company's extensive interview process works against hiring fresh thinkers.

Full Story.

More in Tux Machines

War Thunder on GNU/Linux and More on SteamVR

Leftovers: OSS

Security Leftovers

  • Wednesday's security advisories
  • Smartphones with fingerprint scanners under screen to hit market this year
    The majority of fingerprint scanners can be found either on the back of a smartphone or on the front, embedded in the home button. But it looks like that status quo is soon about to change. According to a report from The Investor, CrucialTec, a manufacturer of fingerprint modules based in South Korea, will launch its on-screen fingerprint scanning solution that allows you to unlock your device by placing a finger on the screen sometime this year. This means that we can expect to see the first smartphones featuring the new fingerprint technology hit the market in 2017. Unfortunately, CrucialTec did not reveal an exact time frame or the smartphone manufacturers it is currently working with.
  • Kaspersky launches 'secure operating system' -- with no trace of Linux in it [Ed: You must be pretty desperate for headlines and attention when your marketing pitch is, "we're not Linux!"]
  • Windows Botnet Spreading Mirai Variant
    A Chinese-speaking attacker is spreading a Mirai variant from a repurposed Windows-based botnet. Researchers at Kaspersky Lab published a report today, and said the code was written by an experienced developer who also built in the capability to spread the IoT malware to Linux machines under certain conditions.
  • Five New Linux Kernel Vulnerabilities Were Fixed in Ubuntu 16.10, 14.04 & 12.04
    We reported earlier that Canonical published multiple security advisories to inform Ubuntu users about the availability of new kernel updates that patch several flaws discovered recently by various developers. We've already told you about the issues that are affecting Ubuntu 16.04 LTS and Ubuntu 16.04.1 LTS (Xenial Xerus) users, so check that article to see how you can update your systems is you're still using the Linux 4.4 LTS kernel. But if you managed to upgrade to Ubuntu 16.04.2 LTS, which uses Ubuntu 16.10 (Yakkety Yak)'s Linux 4.8 kernel, then you need to read the following.
  • Another Linux Kernel Vulnerability Leading To Local Root From Unprivileged Processes

Red Hat News