To the Clowns in IT

The real problem are the IT guys who can’t distinguish between users who as where the Any key is and users who have worked on a wide variety of machines and operating systems.

You must er on the safe side. One of the salesmen I worked would would scroll through files in the Windows directory, declare, “I don’t need that!” and delete files willy-nilly.

I keep getting users asking me to connect to their laptops and fix problems…when the laptop is is the laptop bag in the back seat of their car.

I get one or two of these a month. Half the time, it’s the same user.

Back in the days of Windows 3 I had a user that understood that the files were important and that it would be very bad if deleted. Unfortunately her OCD got the better of her so all of the DLL files got moved into a folder called DLL. SYS files into SYS folder.

Then I got the call…

My dad did that.

What an IT clown may look like.

And how do they do that, assuming a large population of users?

Developers are IT. When they don’t think of themselves as such is when that part of IT that has to support the shit developers produce are in trouble. Because when that software pukes, it isn’t developers (the ones who don’t think of themselves as IT), who get the call and look bad in front of the business.

Developer
All Oracle licenses are free in the Testing environment. (at a retail prices of ~$50K that left a potential liability of $5M.

Developer
No one is using that Oracle license anyways. (Oracle doesn’t give a shit that the license isn’t being used and why the hell didn’t you put in a change to bring down the server if it isn’t being used!? Oh, I forgot, developers can’t be bothered figuring out the Change process, or Release proces, or basic project management (applies to the PM’s as well!)…or pretty much any other IT process).

Forgot one.
“Don’t we have an Enterprise license for this?” No, and just because we might have doesn’t mean the license is free. You gotta pay and I’m NOT sorry that you are an idiot and didn’t budget for the cost.

You can’t be authorized to make IT purchases. I can tell because you answered the phone.

Shows what yu know (or don’t know, really).

Every time you use a credit card, that transaction eventually goes thru a COBOL program (probably one originally written pre-Year2K).
And any deposit or withdrawal from your bank account – that too is likely a transaction eventually processed by a COBOL program.

Not the fancy front-end you see on the ATM screen or the credit card terminal, pr your online access to your account, but deep dpwn where the actual processing is done, it’s probably still running COBOL code.

“What were you doing right before you got this error?”
“Nothing…”
“…”

Every IT call ever.

In all fairness, they probably do not remember. They are writing a letter to their Mother, not consciously using a computer. It should be like making toast, set the knob, put in the bread. One doesn’t think about what the outlet voltage is, which circuit breaker the toaster is plugged into, or how many other devices are drawing current in the house.
In addition, they lie to their Physicians, employers and parents, why not us?
:slight_smile:

As someone who can’t get her phone to connect to the Exchange server after two IT tickets and an authorization form, I’m getting a kick out of this thread…

My previous admin job was remembering all my boss’s passwords, helping her change them, and repeatedly taking her damaged phones back to IT for replacements. Good times.

Heh heh, I used to have my frustrations with the end users, but now I are one. A lot of our IT folk are getting out of that and getting into technical presales and solution engineering. Being able to narrow my focus and having a better work/life balance was a nice incentive.

Wow. Talking about turning to the Dark Side!

:slight_smile:

That is what we call it. :slight_smile:

Stupid Ass User: What do you mean my account got compromised and I have to change my password? I like my easy password.

SAU: We have to take down the F&B (food and beverage) servers for at least a day? What do you mean the people who compromised my account infected the F&B system with spyware and have been sending out our customers credit card info?

SAU: Why would I have to change all my passwords? Oh, having one password for all systems is bad? Really?

SAU: Why is the whole system coming down? Oh, due to the security issue I caused by not securing my password led to multiple systems being infected and you had to bring in an outside security company to certify that all our servers are clean so that the <insert state certification board here> will let us keep our license. Really?

SAU: I don’t understand why the I.T. staff is so mad. What? Really? You had to replace all the hard drives on the F&B system and pay $25,000 to a vendor to certify the rest of the systems were clean? Really? Wow.

SAU: Why do I have to have a password with symbols? Its hard to remember. I just keep it written down on my desk but I still have problems with it.

True story. In the end, SAU, who happened to be upper management, caused us to replace all the drives in two systems. It brought on a rather intense audit and required an outside firm to be brought in to confirm we cleaned everything up. SAU had VPN access, being in upper management. The security audit did pinpoint SAU as the root entry point of the attack. Specifically his PW which was easily guessable, his wife’s name. SAU also had it written down all over the place. I don’t know much more about the specific attack as I handled the rebuild side of the giant fucking clusterfuck. The security review pointed to lax passwords as the main cause of the issue. Of course, the only people with lax password standards were upper management. They would bitch at the owners and the owners would push for lax passwords for certain people. We pushed back but the owners overruled.

This little episode cost about $75,000 and two weeks of work. Assuming that your telemarketing company has any sensitive data, well, there is a reason for good security.

Slee

Actually, we have loads, like everything a consumer doesn’t want to fall into the wrong hands. Therefore we have a heavily enforced paperless office, with no pens, cellphones, internet access, or MP3 players (they are thumb drives in disguise, y’know) either. My program, though, isn’t interested in people who spend their own money, so I only have and need info I could get from Google, if I could get to Google. Which I can’t, because of the people calling consumers.

OTOH, unlike places where I had access, and through me a hacker, to everything about the company and its clients and needed a more-secure password, I still have the same username/password as I described above.

My experiences with IT departments in the various countries I’ve worked in have been quite good so I have but a few instances where I’ve had to step outside to vent.

In one site, many of the IT techs were quite new to the department and were not always able to resolve problems in a timely manner. To address this problem the manager decided that if the issue could not be resolved in less than 30 minutes, the tech was to delete everything on the pc, reinstall the operating system, and return it to the user. The user then had to install all the programs from media and configure all the settings, a task that usually consumed most of a day.

In one country, we had a pc connected to several devices that took an vendor tech from the UK a lot of time to install, configure, and get working. One day, a colleague came to my office and reported that the scanner was making grinding noises. We went to have a look and found that it was a simple single sheet HP scanner whose belt was catching, and most likely a bit of oil was needed to fix things. There had been a recent request from IT for users to make use of the new Help Desk systems so I had my colleague call the helpdesk and open a ticket.

A few minutes later an IT tech appeared and we outlined the problem and then stepped out for lunch, leaving the tech to do his work. When we returned from lunch, we had a looked in the room and found that the tech had taken the pc away and left everything else. :eek: A hurried call confirmed our fears that the IT tech re-imaged the pc and pronounced the problem solved. Fortunately for us, the software vendor was in country for another client and came over to fix things. I put a few drops of oil on the scanner belt and it worked fine.

I can also echo other comments about software dongles and moving ones e-mail account to another country.

These days all of the technical work is done on Linux workstations so calls to the helpdesk are a thing of the past.