Feeds

BOFH: BOFH vs Bot: Ultimate Smackdown

Sacrifice is nice

  • alert
  • submit to reddit

Application security programs and practises

Episode 16

I love these quiet moments before the storm.

Well, technically speaking, it’s between storms, but the fact remains that there’s a certain amount of solace in not actually being in a storm at this point in time.

In these calm periods my mind enters a peaceful, dreamlike state where I find my thoughts drifting in anticipation to a utopian-like existence where I’m blowing creatures away in Duke Nukem Forever while The Blue Nile’s next album plays in the background...

Ahhh.

Peaceful. Calm. Musical.

“WHAT ARE WE GOING TO DO?!!!!”, the Boss shouts,

And back to reality...

So the PFY and I are trapped on a landing between floors while a couple of mutant security robots block our exit from above and below. To make matters worse the Boss has inadvertently blundered into the stairwell with us and narrowly avoided being turned into rough-cut schnitzel. The same cannot be said for his briefcase however...

It’s looking bad for us. Being trapped in a stairwell over the weekend by two vicious chainsaw wielding robots pales in comparison to being trapped in a stairwell over the weekend by two vicious chainsaw wielding robots while the Boss recounts the high points of his five year project to build an eighth scale replica of Stirling’s Victoria locomotive.

“What I don’t understand” the PFY says, before the Boss can get started “is how the second robot went bananas?”

“Easy” I reply “Your ‘advanced learning neural’ crap appears to have enabled your robot to learn how to make other mutants like itself. You know, like vampires, zombies and Facebook users.”

“Yes, that was perhaps a bit of a d-”

“Don’t say design flaw” I snap, a little jaded with that particular excuse. “A design flaw is omitting reinforcing between the rear panel and gas tank of a consumer vehicle - which might eventually kill you. Designing a robot whose ultimate purpose is eventually to become so intelligent that it will kill you is something else altogether..,”

“Designing a..,” the Boss blurts,

“I...,” the PFY interrupts,

“No, it’s fine! At this point recrimination is not helping us in any way. We need to address our current situation. We’re trapped by robots with no simple method of escape,”

“My cell phone battery is flat,” the PFY adds,

“...and mine is on my desk. The overpowered cattle prod appears to have suffered some form of internal meltdown and the pinch is completely discharged,”

“The remote control for the building power isn’t working” the PFY says, pressing repeatedly at a button on a small black box on his key ring.

“In short,” I say, “It’s time to face facts. Technology, like a poorly trained Alsatian, has turned on us.”

“No!” the PFY gasps

“Yes.” I respond. “This isn’t some randomly coincidental sequence of events – this is fate. For too long we have neglected the power of technology and taken it for granted – at our own peril. The Gods of Technology are angry. They require...”

Human Sacrifice

“Human sacrifice!!!” the PFY says.

Actually, he doesn’t say that at all. He just thinks it.

I know, because I’m thinking it too.

The Boss, on the other hand, is probably thinking about the Onion Bhajis on the lunch menu.

“Exactly” I say. I mean, think.

The PFY nods.

“At times like this,” I say to the Boss, “I like to ask myself what MacGyver would do?”

“Oh yeah!” the Boss says, “fabricate something from whatever materials are available to solve the current problem.”

“Exactly!” I respond, “We need to use whatever we can lay our hands on to help us divert the attention of the robots until such time as we can lay our hands on a more suitable solution,”

“Like an axe,” the PFY adds,

“What do you propose?”

“Well firstly, like MacGyver we need to take an inventory of the raw materials available to us,”

“Oh, ok. Well I have a... disposable lighter, a little credit card torch/knife combo, and two.. aspirin. Not a lot really,”

“Well obviously, like MacGyver, we’re limited in the raw materials available to us – however this may not necessarily be a limitation because his real talent was in recognising the potential of raw materials when he saw them. Now tell me, are you particularly attached to the lighter, card or aspirin?”

“Not really, why?”

“I’m simply asking because like in MacGyver it is inevitable that we will have to damage the raw materials to create the solution we need”.

“I see,” the Boss nods. “Fair enough.”

“So,” I say. “Are we agreed that if we’re going to get out of this, it’s time for each of us to make individual sacrifices?”

“Yes”, the PFY says.

>Shove!<

Half an hour, several sturdy blows with an axe and one ambulance call later..

“You know, I’m not completely sure the Boss realised that he was the individual we were talking about sacrificing” the PFY says

“Management” I sigh “There’s some things you can’t explain to them, no matter how clearly you put it..”

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.