Boss swore by 'For Dummies' book about an OS his org didn't run

So a developer de-bugged his personality with a long-range hack

On-Call Welcome again to On-Call, The Reg’s usually-on-Friday column in which readers share tales of being asked to do nasty jobs at nasty times, often for nasty people.

And yes, this is Thursday. But Friday’s a holiday (in some places) and lots of you read On-Call, so they made me do one before I started eating too many chocolate eggs.

As ever, your fellow reader who sent in a story has asked not to be named. But “Jeffrey” was unusual in that he gave us a reason for anonymity, namely “so current associates don’t know the lengths I will go to.”

To understand those lengths, know that Jeffrey’s story started when he was just 24 and worked for a local government that wasn’t a happy ship. Staff came and went at a furious rate and after just three years in the job he was the senior staffer.

Bosses turned over fast, too, and Jeffrey says they were never any good. “But they thought they were God’s gift,” Jeffery wrote. “The new people usually had an attitude that they were better than any government employees, who must be dopes. That they had just become government employees themselves was beyond them. Of course I was young and dumb myself, but still...”

Into this environment came a new boss, “Roger,” who Jeffrey said “came into work every day with a briefcase containing two items and nothing more. Item one was a peanut butter sandwich and item two an ‘IBM MVS for Dummies’ book.”

Sadly, however, the local government didn’t run IBM MVS, the OS for IBM’s S/370 and S/390 mainframes. Yet four months into the gig, Roger was still nose-deep in the book and liked to think he could teach Jeffrey a thing or two about doing his job.

Jeffrey wasn’t enjoying that, so when he noticed Roger struggling with report generating application Easytrieve, he decided to have some fun. “I hung around after everyone had left, and went over that program with a fine tooth comb,” Jeffrey told us. “I found the problem in ten minutes, tested to make sure I was right, and covered my tracks.”

Come the next day, Roger again struggled to get his code working when Jeffrey offered some help but was rebuffed: Roger thought he was the better man. So Jeffrey admitted that his meagre skills would probably not solve the problem, but suggested Roger could do worse than take a punt on a long shot.

Roger agreed, hauled over the printout of his code and started schlepping it to Jeffrey’s desk. Which was when Jeffrey pounced and from several feet away loudly proclaimed he had found the bug on a single line of code.

“It’s so obvious,” he said, selling it hard and advising that Roger’s world would improve if he made just one change.

Roger was dubious because who can spot a bug at arm’s length, never mind insist that the first bug they spot will sort everything out? But Jeffrey insisted, and Roger did as asked. Then he looked at Jeffrey “with wonder and great bewilderment” as the newly debugged program worked like a charm.

Jeffrey says he told Roger, “I thought that would fix it. I’ve always had a knack for debugging.”

Which is pretty accurate because he de-bugged his relationship with Roger in an instant: Jeffrey says “From that moment on Roger treated me like I could fix anything, and came to me with all problems.”

Have you de-bugged a boss? Or had one who knew less about what he bossed than Roger? In either case, let me know and you could appear in a future edition of On-Call. ®

Similar topics

Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021