The Bastard Guide To Writing Software

Junket Alert


More wonders from the House of BOFH™Episode 3

BOFH 2002: Episode 3

I HATE IT!!!!

The Boss has been talking to some geeky guy from R&D who's so far 'out there' he's got satellites orbiting him, and now he wants us to develop our own software...

"But it's a sure thing!" he cries, mentally preparing for his stardom on the international geek-talk circuit as the man who brought the world a new alternative. "We just write an Office type system that can compete with Microsoft and sell it for half the price!"

"Compete," I respond dubiously, "with Microsoft?"

"Yes."

"The company whose court imposed penalty which was pretty much equivalent to a slap on the bum with a rolled up newspaper?"

"Yes."

"And by Newspaper I mean PART of a newspaper - something like the 'Culture' section of "The Sun", the non-boring bits of "The Financial Times" or the non-fiction portion of a vendor's Benchmarking specs handbook?".

"Sorry?"

"It doesn't matter."

"But surely it's possible to write such a system?" The Boss asks, masking his disappointment as best he can.

"It's possible, yes, but feasible, probably not."

"Why not?"

"Well for a start, there's the development staff. Not to mention analysis!"

"Analysis?"

"Yes - of needs, we'd have to find out what people know and want."

"Oh, you mean like meeting rooms, questionnaires and some focus groups?"

"I was thinking more of the Tape storeroom, a rubber hose and a bright light, but yes, you're in the right ballpark."

"But we know what people want," The Boss continues, ignoring me. "They want what they've got, with more security - well, with ANY security - and cheaper. Obviously there's going to be expenses for the organisation in the training and travel side of things."

"Travel?"

"Well yes, to evaluate the options, visit vendors to see how they do things, that sort of thing?"

>WHOOP! WHOOP!< >JUNKET ALERT!<</b>

And so the delicate process of junket negotiation begins...

The Boss obviously knows that this project suggestion would be as popular as a Windows T-Shirt under Richard Stallman's Xmas tree and is now entering the delicate area of junket negotiation.... To get something he wants, he has to offer me something I might want in a manner that conforms to the Encoded Junket Standard RFC.

"And who did you envisage going to these sites?" I ask, starting off the negotiation with a simple Query Junket packet.

"Well I suppose the Project Champion, and some form of Secretarial/P.A person," he responds.

(In other words, "Me and the new girl from the Admin Pool who's rumoured to be undergarment impaired and have a morally casual attitude.")

"Uhuh," I respond, sending out the standard Junket Packet-Received-And-Decoded response.

"...and obviously the Technical Project Manager."

(Meaning: And obviously YOU, so I can get your vote when the feasibility of the matter is under discussion..)

"And..." I add, resending a PRAD, and following up with an unsolicited Request For Further Junket Tradeoff Items.

"And possibly one or other personnel who might be critical to the project."

A standard Capacity For Extras Available packet, meaning Whoever you want to get the ball rolling

"Well I was just thinking I may need some Personal Assistance myself if there's a lot of data to be compiled sorted through. And given that we're looking at external markets, probably it should be an external person."

The Boss acknowledges my request for handbrake accompaniment, and the deal is struck...

"I'll get right onto it." he burbles, heading out of the office at Warp Factor 5.

. . . Later, at the Departmental Projects Meeting . . .

"..which means we might both SAVE ourselves some licensing costs and EARN ourselves money as well. The benefits would far outweigh the costs!"

"Really?" the Head of IT says. "But this travel, are you sure it's really necessary."

"Well, to get a real feel for the development life cycle, yes."

"But you don't seem to have thought of the higher levels of this - the management and marketing phases of the operation?" The Head responds, sending a Query Junket Packet.

"Obviously, there would need to be some senior Management presence," The Boss negotiates.

"Yes" the Head PRADs, followed rapidly by a RFFJT: "and perhaps.."

"And obviously someone to organise the copious notes and meetings," The Boss CFEAs.

Once more the deal is struck.

"You've got to be kidding," The PFY jumps in, smelling blood in the water. "What about development and Analysis costs."

There comes a time in every bastard's life when he has to sacrifice a friend for a junket. It's sad but true - and remember, all's fair in love and computing. More so if you're playing a teams shoot-em-up game and a team member gets in the way of your handcannon....

"Well we don't need any analysis, because we know what they want.." I respond, going on to repeat The Boss's message from before.

Seeing his chance of a junket going down the tubes, The PFY tries to torpedo mine.

"What about Development costs then?" he snipes.

"I know it'll cost a bit, but I've been working it out. You see, development costs can be worked out by multiplying the number of programmers and testers, by the cost of the development tools, by the number of hours it takes to develop the software - right?"

"Yes," The PFY concurs.

"And so by lowering one, we'd lower the cost of the whole project."

"Yes."

"Well, I've been looking at these Open Source Tools and, well, they don't cost anything."

"Yes?" The PFY asks, not seeing the trap until it's too late.

"So if the Number of programmers and testers, times the cost of development tools - which is zero, times the number of hours equals the cost of the job...."

"yyessssss?"

"Then the job should cost nothing."

"Wait a minute.." the Head of IT frowns, performing some mental calculation involving carrying a bunch of 1s, subtracting the number he first thought of, and dividing by his belt size. "You know, I think he's RIGHT!"

So it's a done deal. Junket approved and booked. True, I expect that when I get back all my plants will be poisoned, my desktop will be rigged to the mains, and my hydraulic chair will be remote controlled...

But it's worth it.... ®

BOFH is copyright © 1995-2002, Simon Travaglia. Don't mess with his rights.


Other stories you might like

  • DigitalOcean sets sail for serverless seas with Functions feature
    Might be something for those who find AWS, Azure, GCP overly complex

    DigitalOcean dipped its toes in the serverless seas Tuesday with the launch of a Functions service it's positioning as a developer-friendly alternative to Amazon Web Services Lambda, Microsoft Azure Functions, and Google Cloud Functions.

    The platform enables developers to deploy blocks or snippets of code without concern for the underlying infrastructure, hence the name serverless. However, according to DigitalOcean Chief Product Officer Gabe Monroy, most serverless platforms are challenging to use and require developers to rewrite their apps for the new architecture. The ultimate goal being to structure, or restructure, an application into bits of code that only run when events occur, without having to provision servers and stand up and leave running a full stack.

    "Competing solutions are not doing a great job at meeting developers where they are with workloads that are already running today," Monroy told The Register.

    Continue reading
  • Patch now: Zoom chat messages can infect PCs, Macs, phones with malware
    Google Project Zero blows lid off bug involving that old chestnut: XML parsing

    Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a victim's device.

    The bug, tracked as CVE-2022-22787, received a CVSS severity score of 5.9 out of 10, making it a medium-severity vulnerability. It affects Zoom Client for Meetings running on Android, iOS, Linux, macOS and Windows systems before version 5.10.0, and users should download the latest version of the software to protect against this arbitrary remote-code-execution vulnerability.

    The upshot is that someone who can send you chat messages could cause your vulnerable Zoom client app to install malicious code, such as malware and spyware, from an arbitrary server. Exploiting this is a bit involved, so crooks may not jump on it, but you should still update your app.

    Continue reading
  • Google says it would release its photorealistic DALL-E 2 rival – but this AI is too prejudiced for you to use
    It has this weird habit of drawing stereotyped White people, team admit

    DALL·E 2 may have to cede its throne as the most impressive image-generating AI to Google, which has revealed its own text-to-image model called Imagen.

    Like OpenAI's DALL·E 2, Google's system outputs images of stuff based on written prompts from users. Ask it for a vulture flying off with a laptop in its claws and you'll perhaps get just that, all generated on the fly.

    A quick glance at Imagen's website shows off some of the pictures it's created (and Google has carefully curated), such as a blue jay perched on a pile of macarons, a robot couple enjoying wine in front of the Eiffel Tower, or Imagen's own name sprouting from a book. According to the team, "human raters exceedingly prefer Imagen over all other models in both image-text alignment and image fidelity," but they would say that, wouldn't they.

    Continue reading
  • Facebook opens political ad data vaults to researchers
    Facebook builds FORT to protect against onslaught of regulation, investigation

    Meta's ad transparency tools will soon reveal another treasure trove of data: advertiser targeting choices for political, election-related, and social issue spots.

    Meta said it plans to add the targeting data into its Facebook Open Research and Transparency (FORT) environment for academic researchers at the end of May.

    The move comes a day after Meta's reputation as a bad data custodian resurfaced with news of a lawsuit filed in Washington DC against CEO Mark Zuckerberg. Yesterday's filing alleges Zuckerberg built a company culture of mishandling data, leading directly to the Cambridge Analytica scandal. The suit seeks to hold Zuckerberg responsible for the incident, which saw millions of users' data harvested and used to influence the 2020 US presidential election.

    Continue reading
  • Toyota cuts vehicle production over global chip shortage
    Just as Samsung pledges to invest $360b to shore up next-gen industries

    Toyota is to slash global production of motor vehicles due to the semiconductor shortage. The news comes as Samsung pledges to invest about $360 billion over the next five years to bolster chip production, along with other strategic sectors.

    In a statement, Toyota said it has had to lower the production schedule by tens of thousands of units globally from the numbers it provided to suppliers at the beginning of the year.

    "The shortage of semiconductors, spread of COVID-19 and other factors are making it difficult to look ahead, but we will continue to make every effort possible to deliver as many vehicles to our customers at the earliest date," the company said.

    Continue reading

Biting the hand that feeds IT © 1998–2022