Re: Cash is king
So what did they take? Barter?
40470 publicly visible posts • joined 16 Jun 2014
"but people don’t still actually use it, do they?"
A few weeks ago I encountered an area where parking meters wouldn't take cards despite being apparently equipped with card reader hardware. Getting sufficient change to last for a few days wasn't easy.
I'm not sure whether or not they had pay by app because I'm not going to download and grant bank account access an app I see advertised on the side of a parking meter.
"The most common reason for taking no action was down to simply not knowing how to take control of one's data online."
And exactly how does one do that, other than rejecting intrusive services, as mentioned in the article?
Maintaining multiple email IDs is one way. It takes work but is possible although email clients could make it easier by providing a preferred ID field in the contacts list.
What's needed is an amendment to the DPA enabling the ICO to pro-actively audit companies, issue fines big enough to cause consternation at board level and, to support and incentivise the work, allow the ICO's office to retain a proportion of the fines.
Tcl was responsible for the worst abuse of a programming language I ever came across. A script with a few parameters would almost certainly sufficed but, no, Tcl was used to invoke vi and feed it with all the "keyboard" input to write a number of one-off scripts that were then run to do the actual backups or whatever. Just the sort of thing that happens when somebody says "This is cool - what can we get it to do?".
It worked. It was a good thing it worked because if it hadn't there's have been no indication of what a one-time script might have been doing. I should have replaced it with something simpler but, on the basis that I was just passing through as a temporary admin (not that temporary as it turned out) it didn't seem a thing to reverse-engineer and take on.
Unless management takes personal responsibility for security and is prepared to abide by all the rules, processes or whatever and also to back up the technical staff then any attempts to improve security will be overrules as soon as management finds them inconvenient.
"Chasing paperwork in the name of mediocrity gives me hives."
Mediocrity: that's the word. I remember [REDACTED] going on about quality management systems and stating, in effect, that quality was quantitative, not qualitative (not their words but that was the upshot) and that what mattered was choosing a point on the scale and hitting it (again, expressed in dressed-up form). My response was that in that case you could just as accurately call it a mediocrity management system.
Not really. They've spent time doing their compliance when they could have spent it on actually improving quality. Think of it this way. You're getting near to end of day. You've a job which will take 30 mins to do and 30 mins to do the paperwork. You have 30 mins left. The paper work is what you need to show you've done the job. Do you just do the job and leave the paperwork undone or do you do the paperwork and leave the job undone?
The experiments you describe in your first paragraph would be described as enthusiasm. That you're not enthusiastic about the results won't diminish it when people are trying to tot up enough to reach a total of "much enthusiasm". IYSWIM
This thing about shells...
A member of our local history group has beenp hotographing documents and emailing them out in batches. Using my GUI email client I can select a series of emails, each with multiple attachments and selecting save with attachments. What I then get is a directory (folder if you prefer) with a lot of email texts (which are irrelevant) and a series of directories (ditto) named Attachments1, Attachments2 etc containing the images which I do want gathered into the same directory. I have too options.
1. Use the GUI file manager, go into each attachment folder in turn, select its contents, hit CTRL-X , back out of the folder into the parent folder andhit CTRL-V. Repeat for each folder in turn.
2. Open a shell terminal in the directory and issue the command
mv Atta*/* .
and I'm done.
Which option would you take?
The reason some of use use shell commands some of the time is because they're just so much slicker.
"Also, a hardware refresh of 3-5 years means that IT departments aren't trying to support multiple variations of desktops/laptops."
I think the stats show that IT departments are avoiding supporting multiple versions by the simple expedient of sticking with what's already working.
"Recall is designed with security and privacy in mind,"
In that case how was it that they had created "unique security challenges" and that few if any of these claimed security features were originally present? Does that mean that in a few months they've completely redesigned and reimplemented it or have they just bolted Sellotaped on as an afterthought as much as they could come up with in a brain-storming session?