Feeds

BOFH: I'll get my bonus even if it kills, well, someone

Goals, reviews ... unexpected tragedies

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Episode 13

"Okay, so we'll just work our way through last year's review and then move onto this year's one," the Boss says, fingering a couple of chunky wads of paper.

I hate review time. The only consolation I get from it is knowing that Bosses hate it as well. Everyone hates them - except for the drones from HR for whom this is probably justifies two staff EFTS alone.

"So. Agreed Goals," the Boss starts, leafing through last year's review, "Centralised Licensing Project."

"Yeah, I never did that."

"Why not?"

"Because of the review."

"What review?"

"I think you mean 'which review', not 'what'. So there was the review about standard remote workplaces that was supposed to talk about USB security and VPN access but actually talked about monitors and background images, the review of storage policy that wanted to know if we should use the cloud for storage or not, the review about network speed now that all our storage was in the cloud in some third world nation connected at blistering dialup speeds and which probably stores data in wooden platter hard drives because it's carbon neutral, the review about backup strategies and how wood mightn't have been as safe a media as we might have thought in a building fire, and finally the review about workplace safety in the light of the tragic accident that befell the man charged with starting the six former review processes. Then the conversation about the second tragic accident involving the reviewer working on the workplace safety review."

"So which one was this?"

"Was what?"

"The review that stopped you achieving this goal?"

"Oh, that. Technically it was half a review actually. So we started reviewing our licences and as part of the review process the reviewer guy audited all our printed licence media but tragically fell in front of a Circle line train in rush hour. Well, when I say fell I mean ..."

"... was pushed?"

"I mean we all said it was a tragic 'accident', but he'd been under a lot of pressure recently."

"I see."

"And to make things worse, he claimed to have proof that a lot of the licences we'd bought had actually been sold on eBay and that the company was instead running on completely pirated licences!!!"

"And what came of that?"

"Nothing. We gave him the licence documents and I guess the ... shame ... of making such a ludicrous claim ... uh ... drove him over the edge. It really was very tragic, because the company was just about to appoint him as a full-time IT auditor. It just goes to show that you never can tell."

"So we didn't bother investigating the licences any further?"

"No. Well there was no point - they were all lost in the accident."


"Lost?"

"Yeah, they were in his briefcase and blew everywhere. The PFY saw the whole thing."

"He saw the whole thing?"

"Yes, he was on his way home."

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.