• fmstrat@lemmy.nowsci.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 hour ago

    I hate any company that uses or builds AI to screen out hires so, so much. Tagging metadata is OK, but filtering is just evil (am/have been a hiring manager).

    The company also added that it’s instituting a bug bounty program to better catch security vulnerabilities in the future. “We do not take this matter lightly, even though it was resolved swiftly and effectively,”

    I also hate it more that I can’t hate them for doing the right thing.

    • Jolteon@lemmy.zip
      link
      fedilink
      English
      arrow-up
      27
      ·
      9 hours ago

      I don’t think you were quite grasping the scope the McDonald’s operates at. That’s only a couple hundred per location, and fast food restaurants tend to have extremely high turnover, so that’s definitely not an unrealistic number.

    • Lost_My_Mind@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      8 hours ago

      ETA? Estimated Time of Arrival?

      One of us doesn’t know what that stands for. I feel like the time my grandpa died, and mom sent me an email telling me “We’re going to the funeral this Friday to pay respects to grandpa. LOL!”

      I was quite confused. Turns out she grew up with “Lots Of Love”. For a second she seemed like she turned into an absolute psychopath, for like…no reason.

      • spizzat2@lemmy.zip
        link
        fedilink
        English
        arrow-up
        26
        ·
        edit-2
        7 hours ago

        ETA? Estimated Time of Arrival?

        In this context, it means “Edited To Add”. I do wish they abbreviated it some other way, since “Estimated Time of Arrival” is a much more common meaning. I would accept “E2A” or something stupid, as long as it was more unique. Alternatively, they could just use “Edit:”.

        Edit: added link.

    • Dave@lemmy.nz
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      9 hours ago

      They have over 40k locations. Many are 24/7. They also surely churn through employees, have many part time employees, and probably get many more applicants than they hire.

      The employees will be hired by the franchisees but they still use the McDonalds software.

      Millions is not a surprise to me at all. Perhaps that it’s tens of millions is a little surprising, but it still seems within the realm of possibility.

    • Dudewitbow@lemmy.zip
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      9 hours ago

      i mean there’s a shit ton of unskilled labor out there whose vertical reach isn’t that great.

  • Tikiporch@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    ·
    7 hours ago

    A lot of companies use Paradox. They shit canned all their HR down to the bare bones and hired Olivia, which the Paradox recruiter I worked with said is so bad he has to take over answering in chat half the time.

    • Chozo@fedia.io
      link
      fedilink
      arrow-up
      14
      ·
      8 hours ago

      “Hacker” doesn’t always imply one acting with malicious intent.

      • Lost_My_Mind@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        8 hours ago

        If the 90s taught me anything, it’s that hacking is done exclusively on monochrome green monitors, with dos. Except once they hack in, the monitor is full color, and somehow has access to every video camera on the planet. With the ability to enhsnce resolution seemingly to magical levels where you can see a clear reflection in someones pupil.

        ENHANCE!!!

        • brsrklf@jlai.lu
          link
          fedilink
          English
          arrow-up
          3
          ·
          5 hours ago

          Nah, they evolved way past that in the following decades.

          Sometimes when they’re in a hurry they create GUI interfaces using Visual Basic to track IP adresses.

          And sometimes, if they’re very good, a hacker can manually carve a virus in a piece of bone using fractal patterns. They can use that to hack the computer scanning the bone so it adds a zero in thresholds for CPU heat monitoring and make it instantly catch fire.

          • Lost_My_Mind@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            5 hours ago

            Are you sure you’re a dancing bear? Are you related to the masturbating bear from Conan O Brian’s late night show in the 90s?

    • Armok_the_bunny@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      8 hours ago

      The risk is that some unknown hacker discovered this vulnerability and abused it before the researchers discovered and reported it. It sounds like the company has confirmed that didn’t happen, but they aren’t 100% trustworthy in that regard, simply because they might have missed something.

      • Auth@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        8 hours ago

        yeah i know the risk, but the headline implies the data was exposed to a hacker who tried the password 123456 but thats not the case. A security researcher was investigating the application and accessed a test application with the password 123456 then found an API call which exposed the data and then he instantly reported it.