On Y2K, I was working. I had 3 days of food
but only 3 cigarettes. That was a close run thing, let me tell you.
495 publicly visible posts • joined 6 Mar 2008
Nowadays, to really convince them, you need to stand buck naked in the middle of the room, stick your todger between your legs and spread your arms out and scream "I'd F**K me!".
(Disclaimer, if you accidentally get elected as a Tory Party member using this technique, don;t blame me).
I used to team together with 2 mates (one of whom now works in america for one of the big three, the other is a psychiatric out-patient, I am somewhere in the middle) for parts and postage on various Dick Smith Kits. If only a) electronics had not lost out to computers, and b) other retailers weren't doing it better and cheaper, and c) their brand name kit wasn't crap, things could have been different.
RIP Dick
Yep I work for a government department (now as a contractor) and my favourite saying is "Security is also providing access to those who should, as well as denying it to those who shouldn't". It's both BTW, not one first then another.
I do manage to get on well with the local security administrator, who is prepared to find a way to follow the rules but provide the access in a reasonable manner. Just lucky, I guess.
how can we get to the boardroom table (or cocktail cabinet or golf club) to pre-empt shadow IT, by campaigning to broaden the services IT proper offers to cover the need that spawned this issue in the first place?
The first problem with fighting battles on who provides IT Services is knowing there is actually a battle going on.
(me, I tend to provide hourly reports when things fail to my manager and his manager, even if it's 3am. That tends to get the root cause analysis focused on making sure it does not happen again.)
(IT division of large car manufactuer) sent through a pair of photoshopped pictures of the queen and her mother, sitting naked at a table from the waist up (Oh god, I hope they were photoshopped, the bodies were appropriate for their age). I was naturally deliriously happy, as this must have been a sacking offence and I hated the prick. Strangely he only got a warning and had to make an email apology to whoever received the files. Must have had some managers balls in his hands to be that untouchable.
but at least medicine has a specific entry criteria, which eliminates a lot of the Dunning Kruger effect.
I have had subordinates in a technical role insist that their solution is the right one simply because they thought of it first, then use that position to go fishing through your experience and find out all that you know by arguing constantly. It's almost like a dilbert cartoon, having someone insist that anything they don't know is obviously not important.
who always looked like he was dipped in glue and thrown through a op shop window. Until he got made redundant and had to re-apply for his job, then miraculously he found a barber, and a razor and a suit. One of the guys walked up and said "who are you and what have you done with Richard?". He didn't get rehired.
Not quite a smell story, but I was chatting up an attractive vendor rep who was onsite and when she mentioned where she was staying, I said "Oh yeah, that hotel is where most of the local hookers work out of". Next time she came through, she stayed at a different hotel. And avoided talking with me in the social area after that (It's a gift, what I can say?)
if they help make their device secure "just once", and set a precedent, then in 2 years they will not be able to give their phones away. Cue end of mobile division of apple.
If I was tim cook, here's what I would do,...
Drag the process through the courts as long as possible
While tied up in legal process, offer everyone with an iphone 5C a replacement device free of change that is not vulnerable to that particular exploit the FBI are asking for (Apple have the cash for this)
When all but the iphone 5C in question are swapped, release the cracked firmware to the FBI.
Result: Apple have complied with the court order, customers have secure data, everyone goes home happy.
if the ability to potentially perform this unlock is in Apple's codebase and keys, how secure are they keeping it? We worry about "bad actors" within government agencies, is Apple tracking those who have access to it's commercial product? Could the government "coerce" someone with access to this repository or keys to copy it and release it to the NSA?
"Sometimes our government is doing what we think only other governments do" - Right Now video, Van Halen
for a customer, which, when I looked at the comments, was old enough to vote. (+20 years)
And when I scrolled through the code, I saw the interface script was called a terminal program with modem commands, as the interweb wasn't big back in 1996 at this customer. (Ever tried googling "term commands" and trying to get meaningful help?) Fortunately that part of the script was disabled.
Only last week I was on another customer site trying to determine on a redhat system why the rotated compressed messages logs only had 15 or so lines in them. Turns out one of the sysadmins decided to write a script to cycle, compress and archive the messages files at 1:45 in the morning. I send him a curt email with "man logrotate" and "cat /etc/cron.daily/logrotate" and a reminder to let the OS do it's own maintenance rather than re-inventing the wheel.
your supervisor instructed you to make a change that cost you your job. How did this happen without lawyers / violence becoming involved?
Forget ITIL, agile or any other methodology, if someone invents a way of providing evidence capture on IT systems to a legally submittable level (before, after and authority to proceed), and a way of challenging technical decisions in a legal forum in a quick and relatively painless manner, 50% of British IT managers will resign in fright and all of a sudden projects will actually be delivered on time.
I had a manager who insisted that the operators only needed to see the 10 commonly occurring types of error AND NO OTHERS. I pointed out any new and interesting errors would go un-noticed until their impact was felt, and this was a risk to the business. "Tough, over-ruled!" came the response. And then 6 months later the systems catastrophically shut down due to overheating. When the main director comes knocking on my door asking why monitoring did not pick this up, I sent him the meeting minutes detailing the decision, a snapshot of the monitoring tool showing the SNMP alerts for the temperature warnings (not on the top 10, naturally) occurring for 2 hours before the event, and copied in a yahoo email address (that I created myself) called "whittleandcrouchassocs@[etc]". The issue seems to be dropped after that.
(Bonus points for those who can identify the TV program I got the lawyer names off.)
because it never passes the value of "status" to "SUCCESS"? or never tests if status == SUCCESS?
We had a brilliant one at my old company in the UK, an officious manager who said in a meeting "I should know, I used to be a DBA" and the head DBA (very technically capable) said "Yes but you weren't a very good one".
but I tried anyway, writing an update program using APIs for a helpdesk system, to process the extract from the HR system and create / modify / delete users. Trouble is I know diddly about managing string variables so it would keep crashing about 5 times during the run, but at progressively different places each time.
One of my co-workers (bless her) had the idea to split the HR extract into individual files of one line each and write a wrapper script to call the program once per line. End result, the hidden memory problem never surfaced because it was just one record each time. Never been so happy to have my code "bypassed". (I asked her to go out with me shortly after that, but she turned me down and "came out" the next week - I tend to have that effect on women).
is that Mr Technical Genius and his buddies boasted about how they were breaking the law in un-encrypted Skype calls and emails, which were then subpoenad and presented to the Judge.
Turns out hubris is not directly illegal, but the actions taken under the influence of it quite certainly are.
As Herr Schmitz is quite fond of saying to others: "Don't hate us because we beat you, thank us because we educated you".
(reference to the evidence below, just in case you want facts to get in the way of your ideological rants)
http://arstechnica.com/tech-policy/2013/12/us-unveils-the-case-against-kim-dotcom-revealing-e-mails-and-financial-data/
we had a tabbed Aide Memoir for Battlefield First Aid, including yes / no questions for triage and problem resolution. It was created by some PhD medical doctor. Apparently there is a need for one for IT First Response (or challenge and query on the user at the other end). Anyone up for the job of creating one?
with the five letter acronym for our division, along with the years it had been running (10 years, so read "1998 - 2008"). I remarked that it looked like a gravestone, and out of curiousity I took it to a jewelers to be appraised. He said it was worth 25 quid, but if I had brought it in before our name was scratched on it, he would have given me 50 for it.
All the 100 odd employees got one, and speaking of gravestone, our division was sold the very next year to an out-sourcer.
then wait until they become a republic and they remodel their flag off of that.
Why couldn't we just stick a kiwi silhouette in the bottom left corner (for pedants, the "third quarter"), in place of where the sun goes on the Australian Flag? It's not rocket surgery!
(I'm a Kiwi, my ancestors emigrated voluntarily!)
our DR site was in the Data Centre of another division as part of a "gentlemens agreement" (cue major stress and anxiety over service delivery once the "gentlemen" concerned both left).
To replace the Data Centre power bar (or link, or something) took 3 complete attempts involving full outages, over different weekends, because the sparky either had bad plans, inaccurate documentation, or forgot to take a panel off to look beforehand. Rumour had it the overloaded component was GLOWING! under normal load. I pitied the poor sysadmin who had to coordinate this debacle, he was off on stress leave for a month later that year.
I recently took over from a disgruntled employee who quit with 4 weeks notice and I came in from a consultancy firm for a 2 week handover. He gave some notes and feedback but also made himself available via email for queries or historical reference (eg. "when we did it last, how did you do it?"). In return, I have fired off my howtos / sample configs on automated builds, security hardening, and patching I have since developed, which were useful for him to get started in his new role.
but only for any company doing more than 100K business per year to NZ.
Oh and if you use a VPN to bypass GST collection on a service, you risk a fine of up to 25K. But how will they know that was what you were using the VPN for? I imagine they can't collect full records from credit card companies in a fishing expedition, and requesting individual records will be time consuming and expensive.
All from Oct 1 next year.
http://www.stuff.co.nz/business/74076061/gst-to-go-on-digital-goods-from-october
a) a diagram behind the device showing an outline of the PC and the location of status LEDs and control switches. So you can say "find power LED on diagram, locate on box and tell me what colour it is",
b) an IT baccalurate in 3 tiered stages. Seriously, in the 80s my public service job included briefing users hired in the 50s on what a mainframe did and how networks actually worked, in a 30 min standup as part of a 3 day course for "intro to computing". And they would turn out to be the lowest maintenance users afterwards. It is kind of assumed that non-technical people understand a lot of these concepts, a recognised "computer user" course where concepts are covered would go a long way to reducing these sorts of calls.
Honestly? Become a "tech counsellor".
As we all know, mental health is a big issue in all high pressure industries. So, set yourself up with a anonymous Skype account, allow clients to talk about their work pressures and stresses, and figure out a billing system. Hell, if you can figure out with an appropriate techie a method of delivering all these things (video / billing) combined, you could sell it as a service itself.
Yes, certainly difficult to butt into a meeting when it's held on the pillow of the CIO. Seen this happen before in the UK, surprised there isn't a rule regarding professional conduct and personal relations.
One memorable meeting with an Project Management company resulted in their representative stating they would introduce us to another company who would do the actual work, and when I asked what services they would provided after that, they said "nothing". My next question was why didn't the second company have any marketting or project management teams, and if so, why would we bother dealing with the first company at all, paying a fee for the priviledge of an introduction only. The meeting went downhill after that and we didn't engage either of them.
I love the doom and gloom merchants on the financial crisis earlier in this forum. As I recall, economists have predicted eleven of the past three recessions.
Here in NZ, we have the Green Party happy-clapping "Quan-ta-tive Ease-ing" on the news, and this coming from co-leaders with a doctorate in politics and a former MP for the legalize cannabis party.
The true value of money would be the confidence in and likelihood of getting full reimbursement. (Not necessarily the same things). So long as we have the churn of deposits in / withdrawals out, the system is stable. If the zombie apocalypse actually comes, then food and weapons will become the currency in barter or in extreme circumstances, violence and theft will be the new fiscal practice. Reminder, buy more ammunition this weekend.