Surely they have the data already
for who gets what and when and how much? And nobody thought to analyse that set of data and see how complex it actually was?
411 posts • joined 6 Mar 2008
for who gets what and when and how much? And nobody thought to analyse that set of data and see how complex it actually was?
I guess his court hearing for extradition must be taking his focus at present.
Yep, had that one too, at 2pm of the afternoon before Y2K ticked over. Fortunately no major problems.
the street kids and bogans (read: chavs down under) will knock them out of the sky for fun and / or sell them round the back of the pub. it will become prohibitively expensive experiment that will make people realise: humans have not yet collectively grown up enough to deal with this sort of technology yet.
so I had quite a few calls from irate people insisting they had dialled the correct number and refusing to entertain the concept that I was not the police.
One memorable occasion was when a middle aged lady phoned up to complain about the immigrant family across the road having a "matrimonial disagreement". She was quite incensed about this, going on at length and not letting me get much in the way of a response in. Being rather annoyed at this distraction, I said "well, our armed response unit is on the range at the moment, and they are short their quota of darkies this week, so I will send them down in about 30 mins or so to sort them out". She all of a sudden went very quiet and said "oh. thank you" in a small voice and hung up.
I sort of felt guilty afterwards, and did scan the local papers for a few weeks, waiting for the headlines like "shock! police quota for immigrant violence" to occur (never did). Eventually I swapped my number with the fax machine and all was peaceful again.
make it faithful and accurate, and only 12 people will understand and buy it.
make it accessible and dumbed-down, and 1200 people will complain about it.
(Note the interesting ratio between those 2 numbers)
Always found support in the midlands to be 3-4 hours for one vendor, fascinating to hear that Yorkshire has much better response (but I guess they were paying for it).
its about Development processes (building updates into versions and releases, and deploying them). I am fighting a semantic battle with senior manglement at a customer site on this, and pointing out that Operations is also the process. I have been a Developer for my sins, and know how badly this will end if they are the sole driver of this.
And the automation is used for deployment of the versions and releases, to allow both the conventional and Agile methodology to be relatively painless.
were crowing that they had information on this issue that could sink Hillary's candidacy. Given this report, are they more or less likely to put this forward and potentially embarass themselves?
Last night, halfway across the country! belgium!
that had high IO workload (NHS, Mining companies, finance companies, Defence industries) but with the "virtualise everything and split into components like SAP" methodology, they are fast becoming redundant. Not going back to that particular brand (and note how many HP-UX jobs on the UK sites require security vettings).
on the next series of Silicon Valley?
I had one in the late 80s. A new documentary just released online called "bedrooms to billions: the amiga years", very interesting (google it, I shouldn't need to post a link). Am sitting down this arvo to watch.
Share and Enjoy!
if you haven't first been an Administrator?
And as for Administrator jobs becoming redundant, not while my co-workers refuse to write anything down and hold it in their heads instead.
but only 3 cigarettes. That was a close run thing, let me tell you.
or as we called it in the 80s, "analysis".
who would have thunk? Didn't see any articles on El Reg about it today, bank holiday over there?
Nowadays, to really convince them, you need to stand buck naked in the middle of the room, stick your todger between your legs and spread your arms out and scream "I'd F**K me!".
(Disclaimer, if you accidentally get elected as a Tory Party member using this technique, don;t blame me).
I used to team together with 2 mates (one of whom now works in america for one of the big three, the other is a psychiatric out-patient, I am somewhere in the middle) for parts and postage on various Dick Smith Kits. If only a) electronics had not lost out to computers, and b) other retailers weren't doing it better and cheaper, and c) their brand name kit wasn't crap, things could have been different.
Yep I work for a government department (now as a contractor) and my favourite saying is "Security is also providing access to those who should, as well as denying it to those who shouldn't". It's both BTW, not one first then another.
I do manage to get on well with the local security administrator, who is prepared to find a way to follow the rules but provide the access in a reasonable manner. Just lucky, I guess.
More like the Parliamentary expenses scandal, where the leaker got away scot free rather than becoming a "celebrity" and / or a "target".
how can we get to the boardroom table (or cocktail cabinet or golf club) to pre-empt shadow IT, by campaigning to broaden the services IT proper offers to cover the need that spawned this issue in the first place?
The first problem with fighting battles on who provides IT Services is knowing there is actually a battle going on.
(me, I tend to provide hourly reports when things fail to my manager and his manager, even if it's 3am. That tends to get the root cause analysis focused on making sure it does not happen again.)
They decide to suck on the jobsian kool-aid? Steve comes back as an App and mentors the team?
Browser = Mozilla. Sorted now, very interesting article. Thanks for response.
Error 2035, thats what I think.
it's an indicator for acceleration and an unofficial mascot. It also shows when Zero G has been reached.
(IT division of large car manufactuer) sent through a pair of photoshopped pictures of the queen and her mother, sitting naked at a table from the waist up (Oh god, I hope they were photoshopped, the bodies were appropriate for their age). I was naturally deliriously happy, as this must have been a sacking offence and I hated the prick. Strangely he only got a warning and had to make an email apology to whoever received the files. Must have had some managers balls in his hands to be that untouchable.
pets to be stuffed and roboticised? Call Rick Deckard's Vetinary Services.
but at least medicine has a specific entry criteria, which eliminates a lot of the Dunning Kruger effect.
I have had subordinates in a technical role insist that their solution is the right one simply because they thought of it first, then use that position to go fishing through your experience and find out all that you know by arguing constantly. It's almost like a dilbert cartoon, having someone insist that anything they don't know is obviously not important.
when rather than looking for evidence, we used to just plant it and lie in court".
Have a screen that pops up saying "congratulations, you have a reasonable service for 5 minutes, at which time your access will expire and you will go back into the lottery pool with X other people".
who always looked like he was dipped in glue and thrown through a op shop window. Until he got made redundant and had to re-apply for his job, then miraculously he found a barber, and a razor and a suit. One of the guys walked up and said "who are you and what have you done with Richard?". He didn't get rehired.
Not quite a smell story, but I was chatting up an attractive vendor rep who was onsite and when she mentioned where she was staying, I said "Oh yeah, that hotel is where most of the local hookers work out of". Next time she came through, she stayed at a different hotel. And avoided talking with me in the social area after that (It's a gift, what I can say?)
Yes I am aware he is dead, same week as Jobs, but did he will the credit for Unix back to Thompson in a memorandum of understanding?
Most of the literature I see credits both Dennis and Ken with the eventual invention of Unix, (together after the third release).
a cell phone whose constituent parts can be broken down into small pieces without sharp edges, and can be cleaned and re-assembled quickly. Seriously, why has no-one thought of it before?
Call it the "porridge" or something.
if they help make their device secure "just once", and set a precedent, then in 2 years they will not be able to give their phones away. Cue end of mobile division of apple.
If I was tim cook, here's what I would do,...
Drag the process through the courts as long as possible
While tied up in legal process, offer everyone with an iphone 5C a replacement device free of change that is not vulnerable to that particular exploit the FBI are asking for (Apple have the cash for this)
When all but the iphone 5C in question are swapped, release the cracked firmware to the FBI.
Result: Apple have complied with the court order, customers have secure data, everyone goes home happy.
we could get the creative team from VIZ to run the Eurovision coverage and still get a classier event than we get right now.
if the ability to potentially perform this unlock is in Apple's codebase and keys, how secure are they keeping it? We worry about "bad actors" within government agencies, is Apple tracking those who have access to it's commercial product? Could the government "coerce" someone with access to this repository or keys to copy it and release it to the NSA?
"Sometimes our government is doing what we think only other governments do" - Right Now video, Van Halen
for a customer, which, when I looked at the comments, was old enough to vote. (+20 years)
And when I scrolled through the code, I saw the interface script was called a terminal program with modem commands, as the interweb wasn't big back in 1996 at this customer. (Ever tried googling "term commands" and trying to get meaningful help?) Fortunately that part of the script was disabled.
Only last week I was on another customer site trying to determine on a redhat system why the rotated compressed messages logs only had 15 or so lines in them. Turns out one of the sysadmins decided to write a script to cycle, compress and archive the messages files at 1:45 in the morning. I send him a curt email with "man logrotate" and "cat /etc/cron.daily/logrotate" and a reminder to let the OS do it's own maintenance rather than re-inventing the wheel.
your supervisor instructed you to make a change that cost you your job. How did this happen without lawyers / violence becoming involved?
Forget ITIL, agile or any other methodology, if someone invents a way of providing evidence capture on IT systems to a legally submittable level (before, after and authority to proceed), and a way of challenging technical decisions in a legal forum in a quick and relatively painless manner, 50% of British IT managers will resign in fright and all of a sudden projects will actually be delivered on time.
I had a manager who insisted that the operators only needed to see the 10 commonly occurring types of error AND NO OTHERS. I pointed out any new and interesting errors would go un-noticed until their impact was felt, and this was a risk to the business. "Tough, over-ruled!" came the response. And then 6 months later the systems catastrophically shut down due to overheating. When the main director comes knocking on my door asking why monitoring did not pick this up, I sent him the meeting minutes detailing the decision, a snapshot of the monitoring tool showing the SNMP alerts for the temperature warnings (not on the top 10, naturally) occurring for 2 hours before the event, and copied in a yahoo email address (that I created myself) called "whittleandcrouchassocs@[etc]". The issue seems to be dropped after that.
(Bonus points for those who can identify the TV program I got the lawyer names off.)
because it never passes the value of "status" to "SUCCESS"? or never tests if status == SUCCESS?
We had a brilliant one at my old company in the UK, an officious manager who said in a meeting "I should know, I used to be a DBA" and the head DBA (very technically capable) said "Yes but you weren't a very good one".
sort-of compulsory for snarky El Reg articles about the real world not matching the IT one
but I tried anyway, writing an update program using APIs for a helpdesk system, to process the extract from the HR system and create / modify / delete users. Trouble is I know diddly about managing string variables so it would keep crashing about 5 times during the run, but at progressively different places each time.
One of my co-workers (bless her) had the idea to split the HR extract into individual files of one line each and write a wrapper script to call the program once per line. End result, the hidden memory problem never surfaced because it was just one record each time. Never been so happy to have my code "bypassed". (I asked her to go out with me shortly after that, but she turned me down and "came out" the next week - I tend to have that effect on women).
Question: if he didn't want her to know in life, why should she know in death?
make every new IT manager play the game and submit their scores as part of their interview process.
I asked 100 people what was wrong with TV today, none of them said "resolution".
When Kate said the name was "short for Bob", I think he was lying.
it was an IBM computer theory based one. Can we introduce one for management, which permits them to speak on technical matters?
is that Mr Technical Genius and his buddies boasted about how they were breaking the law in un-encrypted Skype calls and emails, which were then subpoenad and presented to the Judge.
Turns out hubris is not directly illegal, but the actions taken under the influence of it quite certainly are.
As Herr Schmitz is quite fond of saying to others: "Don't hate us because we beat you, thank us because we educated you".
(reference to the evidence below, just in case you want facts to get in the way of your ideological rants)
sudo killall -9 Autopilot