so, perhaps we should look for this plotline
on the next series of Silicon Valley?
399 posts • joined 6 Mar 2008
on the next series of Silicon Valley?
I had one in the late 80s. A new documentary just released online called "bedrooms to billions: the amiga years", very interesting (google it, I shouldn't need to post a link). Am sitting down this arvo to watch.
Share and Enjoy!
if you haven't first been an Administrator?
And as for Administrator jobs becoming redundant, not while my co-workers refuse to write anything down and hold it in their heads instead.
but only 3 cigarettes. That was a close run thing, let me tell you.
or as we called it in the 80s, "analysis".
who would have thunk? Didn't see any articles on El Reg about it today, bank holiday over there?
Nowadays, to really convince them, you need to stand buck naked in the middle of the room, stick your todger between your legs and spread your arms out and scream "I'd F**K me!".
(Disclaimer, if you accidentally get elected as a Tory Party member using this technique, don;t blame me).
I used to team together with 2 mates (one of whom now works in america for one of the big three, the other is a psychiatric out-patient, I am somewhere in the middle) for parts and postage on various Dick Smith Kits. If only a) electronics had not lost out to computers, and b) other retailers weren't doing it better and cheaper, and c) their brand name kit wasn't crap, things could have been different.
Yep I work for a government department (now as a contractor) and my favourite saying is "Security is also providing access to those who should, as well as denying it to those who shouldn't". It's both BTW, not one first then another.
I do manage to get on well with the local security administrator, who is prepared to find a way to follow the rules but provide the access in a reasonable manner. Just lucky, I guess.
More like the Parliamentary expenses scandal, where the leaker got away scot free rather than becoming a "celebrity" and / or a "target".
how can we get to the boardroom table (or cocktail cabinet or golf club) to pre-empt shadow IT, by campaigning to broaden the services IT proper offers to cover the need that spawned this issue in the first place?
The first problem with fighting battles on who provides IT Services is knowing there is actually a battle going on.
(me, I tend to provide hourly reports when things fail to my manager and his manager, even if it's 3am. That tends to get the root cause analysis focused on making sure it does not happen again.)
They decide to suck on the jobsian kool-aid? Steve comes back as an App and mentors the team?
Browser = Mozilla. Sorted now, very interesting article. Thanks for response.
Error 2035, thats what I think.
it's an indicator for acceleration and an unofficial mascot. It also shows when Zero G has been reached.
(IT division of large car manufactuer) sent through a pair of photoshopped pictures of the queen and her mother, sitting naked at a table from the waist up (Oh god, I hope they were photoshopped, the bodies were appropriate for their age). I was naturally deliriously happy, as this must have been a sacking offence and I hated the prick. Strangely he only got a warning and had to make an email apology to whoever received the files. Must have had some managers balls in his hands to be that untouchable.
pets to be stuffed and roboticised? Call Rick Deckard's Vetinary Services.
but at least medicine has a specific entry criteria, which eliminates a lot of the Dunning Kruger effect.
I have had subordinates in a technical role insist that their solution is the right one simply because they thought of it first, then use that position to go fishing through your experience and find out all that you know by arguing constantly. It's almost like a dilbert cartoon, having someone insist that anything they don't know is obviously not important.
when rather than looking for evidence, we used to just plant it and lie in court".
Have a screen that pops up saying "congratulations, you have a reasonable service for 5 minutes, at which time your access will expire and you will go back into the lottery pool with X other people".
who always looked like he was dipped in glue and thrown through a op shop window. Until he got made redundant and had to re-apply for his job, then miraculously he found a barber, and a razor and a suit. One of the guys walked up and said "who are you and what have you done with Richard?". He didn't get rehired.
Not quite a smell story, but I was chatting up an attractive vendor rep who was onsite and when she mentioned where she was staying, I said "Oh yeah, that hotel is where most of the local hookers work out of". Next time she came through, she stayed at a different hotel. And avoided talking with me in the social area after that (It's a gift, what I can say?)
Yes I am aware he is dead, same week as Jobs, but did he will the credit for Unix back to Thompson in a memorandum of understanding?
Most of the literature I see credits both Dennis and Ken with the eventual invention of Unix, (together after the third release).
a cell phone whose constituent parts can be broken down into small pieces without sharp edges, and can be cleaned and re-assembled quickly. Seriously, why has no-one thought of it before?
Call it the "porridge" or something.
if they help make their device secure "just once", and set a precedent, then in 2 years they will not be able to give their phones away. Cue end of mobile division of apple.
If I was tim cook, here's what I would do,...
Drag the process through the courts as long as possible
While tied up in legal process, offer everyone with an iphone 5C a replacement device free of change that is not vulnerable to that particular exploit the FBI are asking for (Apple have the cash for this)
When all but the iphone 5C in question are swapped, release the cracked firmware to the FBI.
Result: Apple have complied with the court order, customers have secure data, everyone goes home happy.
we could get the creative team from VIZ to run the Eurovision coverage and still get a classier event than we get right now.
if the ability to potentially perform this unlock is in Apple's codebase and keys, how secure are they keeping it? We worry about "bad actors" within government agencies, is Apple tracking those who have access to it's commercial product? Could the government "coerce" someone with access to this repository or keys to copy it and release it to the NSA?
"Sometimes our government is doing what we think only other governments do" - Right Now video, Van Halen
for a customer, which, when I looked at the comments, was old enough to vote. (+20 years)
And when I scrolled through the code, I saw the interface script was called a terminal program with modem commands, as the interweb wasn't big back in 1996 at this customer. (Ever tried googling "term commands" and trying to get meaningful help?) Fortunately that part of the script was disabled.
Only last week I was on another customer site trying to determine on a redhat system why the rotated compressed messages logs only had 15 or so lines in them. Turns out one of the sysadmins decided to write a script to cycle, compress and archive the messages files at 1:45 in the morning. I send him a curt email with "man logrotate" and "cat /etc/cron.daily/logrotate" and a reminder to let the OS do it's own maintenance rather than re-inventing the wheel.
your supervisor instructed you to make a change that cost you your job. How did this happen without lawyers / violence becoming involved?
Forget ITIL, agile or any other methodology, if someone invents a way of providing evidence capture on IT systems to a legally submittable level (before, after and authority to proceed), and a way of challenging technical decisions in a legal forum in a quick and relatively painless manner, 50% of British IT managers will resign in fright and all of a sudden projects will actually be delivered on time.
I had a manager who insisted that the operators only needed to see the 10 commonly occurring types of error AND NO OTHERS. I pointed out any new and interesting errors would go un-noticed until their impact was felt, and this was a risk to the business. "Tough, over-ruled!" came the response. And then 6 months later the systems catastrophically shut down due to overheating. When the main director comes knocking on my door asking why monitoring did not pick this up, I sent him the meeting minutes detailing the decision, a snapshot of the monitoring tool showing the SNMP alerts for the temperature warnings (not on the top 10, naturally) occurring for 2 hours before the event, and copied in a yahoo email address (that I created myself) called "whittleandcrouchassocs@[etc]". The issue seems to be dropped after that.
(Bonus points for those who can identify the TV program I got the lawyer names off.)
because it never passes the value of "status" to "SUCCESS"? or never tests if status == SUCCESS?
We had a brilliant one at my old company in the UK, an officious manager who said in a meeting "I should know, I used to be a DBA" and the head DBA (very technically capable) said "Yes but you weren't a very good one".
sort-of compulsory for snarky El Reg articles about the real world not matching the IT one
but I tried anyway, writing an update program using APIs for a helpdesk system, to process the extract from the HR system and create / modify / delete users. Trouble is I know diddly about managing string variables so it would keep crashing about 5 times during the run, but at progressively different places each time.
One of my co-workers (bless her) had the idea to split the HR extract into individual files of one line each and write a wrapper script to call the program once per line. End result, the hidden memory problem never surfaced because it was just one record each time. Never been so happy to have my code "bypassed". (I asked her to go out with me shortly after that, but she turned me down and "came out" the next week - I tend to have that effect on women).
Question: if he didn't want her to know in life, why should she know in death?
make every new IT manager play the game and submit their scores as part of their interview process.
I asked 100 people what was wrong with TV today, none of them said "resolution".
When Kate said the name was "short for Bob", I think he was lying.
it was an IBM computer theory based one. Can we introduce one for management, which permits them to speak on technical matters?
is that Mr Technical Genius and his buddies boasted about how they were breaking the law in un-encrypted Skype calls and emails, which were then subpoenad and presented to the Judge.
Turns out hubris is not directly illegal, but the actions taken under the influence of it quite certainly are.
As Herr Schmitz is quite fond of saying to others: "Don't hate us because we beat you, thank us because we educated you".
(reference to the evidence below, just in case you want facts to get in the way of your ideological rants)
we had a tabbed Aide Memoir for Battlefield First Aid, including yes / no questions for triage and problem resolution. It was created by some PhD medical doctor. Apparently there is a need for one for IT First Response (or challenge and query on the user at the other end). Anyone up for the job of creating one?
with the five letter acronym for our division, along with the years it had been running (10 years, so read "1998 - 2008"). I remarked that it looked like a gravestone, and out of curiousity I took it to a jewelers to be appraised. He said it was worth 25 quid, but if I had brought it in before our name was scratched on it, he would have given me 50 for it.
All the 100 odd employees got one, and speaking of gravestone, our division was sold the very next year to an out-sourcer.
then wait until they become a republic and they remodel their flag off of that.
Why couldn't we just stick a kiwi silhouette in the bottom left corner (for pedants, the "third quarter"), in place of where the sun goes on the Australian Flag? It's not rocket surgery!
(I'm a Kiwi, my ancestors emigrated voluntarily!)
our DR site was in the Data Centre of another division as part of a "gentlemens agreement" (cue major stress and anxiety over service delivery once the "gentlemen" concerned both left).
To replace the Data Centre power bar (or link, or something) took 3 complete attempts involving full outages, over different weekends, because the sparky either had bad plans, inaccurate documentation, or forgot to take a panel off to look beforehand. Rumour had it the overloaded component was GLOWING! under normal load. I pitied the poor sysadmin who had to coordinate this debacle, he was off on stress leave for a month later that year.
So nice to see Verity Stob back. ...... What, you mean,..... Oh.
I recently took over from a disgruntled employee who quit with 4 weeks notice and I came in from a consultancy firm for a 2 week handover. He gave some notes and feedback but also made himself available via email for queries or historical reference (eg. "when we did it last, how did you do it?"). In return, I have fired off my howtos / sample configs on automated builds, security hardening, and patching I have since developed, which were useful for him to get started in his new role.
from being able to collect all this information from a distance. It's human beings that ultimately do the bad deeds, so get some tradecraft back into intelligence gathering, infiltrate and manipulate, bribe and misdirect, and do the hard yards.
but only for any company doing more than 100K business per year to NZ.
Oh and if you use a VPN to bypass GST collection on a service, you risk a fine of up to 25K. But how will they know that was what you were using the VPN for? I imagine they can't collect full records from credit card companies in a fishing expedition, and requesting individual records will be time consuming and expensive.
All from Oct 1 next year.
Maybe Dubya is building his Dr. Evil Hideout down there and doesn't want word to get out.
a) a diagram behind the device showing an outline of the PC and the location of status LEDs and control switches. So you can say "find power LED on diagram, locate on box and tell me what colour it is",
b) an IT baccalurate in 3 tiered stages. Seriously, in the 80s my public service job included briefing users hired in the 50s on what a mainframe did and how networks actually worked, in a 30 min standup as part of a 3 day course for "intro to computing". And they would turn out to be the lowest maintenance users afterwards. It is kind of assumed that non-technical people understand a lot of these concepts, a recognised "computer user" course where concepts are covered would go a long way to reducing these sorts of calls.
All that proves is that TCP/IP came from DARPA but they in turn got it from Area 51. Is it a co-incidence that Octal is used to represent figures, and the aliens had 4 fingers on each hand?
I would have said BS too, 2 weeks ago, but after "VW firmware"-gate.....