BOFH: Halon is not a rad new vape flavour

Migrate data? If you're keen on seeing clouds...

Episode 7 "Simon, Steven – a word?" the Boss burbles warmly.

"What's up?" the PFY answers warily.

"Nothing - just having an interesting conversation with a bloke from an outfit that deals with infrastructure obsolescence, code debt and I.T. asset leveraging."

"Ah yes, I thought I felt a disturbance in the force," the PFY nods.

"Come again?"


"Well if you've got the time I think you'll find this really interesting."

"I doubt it," I say.

"Really? You've not heard what he's got to say."

"You mean something about high replacement of hardware versus virtualised hosts, uhhhhhhmmmmm, the problems with developing our own systems as opposed to encouraging staff to use vanilla off-the-shelf products, aaannnnnnd how we could use the money we're spending in IT on other blue-skies technology which will launch the company well into the 21st century?"

"Uuuuhhhhh..." the Boss says.

"And you found him how? A cold call?" I ask.


"An advert which was disguised as an 'industry event'?"


"YOU JOINED A WEBINAR - or, as we call it - willingly watched an advert?"

"I... It wasn't an advert."

"Right, so if someone came up to you and suggested that they take half an hour out of your day - at a time of their choosing - to show you a PowerPoint presentation of their product you'd tell them to take a hike, right?"

"It depends."

"But if they tell you it's a webinar then that's all different?"

"I... That's not the point."

"And you were so taken by the presentation you invited them here - to OUR WORKPLACE - to try to advertise to the PFY and me?"

"It's not an advert; he's just suggesting a discussio.."

"A discussion about our systems with a scripted sales pitch aimed to point out all the faults in our IT just before proposing a solution which will save our company 40k a year - NO WAIT!, maybe 100K a year in IT costs?"


"And there are two of them, the smooth one and the geeky one?"

"There are two people but I don't know that there's a..."

"The smooth one will probably have... a sports jacket and a polo neck while the geeky one will be... in some fashionable denim, pointy shoes and retro paisley shirt. And a beard - with a... 60% probability of a hair bun - because he's the edgy authentic woodsman type."

"You just watched them come in on the security cameras!" the Boss says.

"Didn't need to - it's the standard ensemble for new wave hucksters."

"I don't think it'd hurt to have a quick coffee with them and hear what they have to say."

"We'll stay till one of them mentions their Paleo diet, veganism or caffeine intolerance," the PFY offers.

. . .

"Well that was quick," the PFY says, 2 minutes and 28 seconds later.

"You didn't give them a chance!" the boss blurts.

"Sure I did," I respond. "I let him bang on about ethically sourced beans, their holistic approach to core health - whatever that means - and even tolerated his tangent on pesticides in Arabica crops. But he had to go full Paleo-dullard on us."

"You need to hear what he has to say!"

"No I don't. It's always the same. We'll make substantial savings that we'll be able to use for other things - only we won't because all those savings AND MORE will be swallowed up in the implementation phase. Then, in two years' time - after someone's handed you your resignation letter to sign (or you've been lynched for choosing such a crap setup) we'll pay another small fortune to some other crapbox company to do the same thing all over again."

"What will it hurt to listen?" the Boss asks.

Around about now I realise that the Boss already has some form of verbal agreement in place that he wants the PFY and I to rubber-stamp the technical side of.

. . .

"I think you'll find that the proposal covers all the bases and ticks all the boxes," Polo-neck says.

"There are no implementation costs," I comment.

"Oh, they're minimal. It's just a standard install for us," Hairbun says.

"So you'll take all our data from the various databases and slap it in your database?"

"Well, we thought that you'd probably want to do that," polo neck blathers.

"And how often does that occur in real life?"

"Most of our clients go down that road."

"And how many of your clients find 'that road' is a poorly signposted one-way street ending up with a couple of guys with bad teeth playing banjos - before it really takes a turn for the worse?"

"I'm not sure what you mean."

"Well SOMEONE has to move the data and no one here knows what your schema is, so if we want to complete the data migration THIS CENTURY we'll need help from your people."

"It might help," Polo-neck nods.

"So my question was HOW MANY of those 'most of our clients' actually end up paying you to migrate their data for them - at their cost?"

"Well we take a cooperative approach with all our clients."

"So you do it for free?"

"Obviously an agreed hourly rate would b..."

"And presumably we 'agree' on that rate after we've forked over the product cost, tried to do the data transfer and failed and are facing a company backlash?"

"It's hard to know a rate without knowing how many hours are involved - there's obviously economies of scale..."

"So back to my question - how many?"

"We help all our clients."

"And by 'help' you mean 'shaft'?"

"Look I don't think..."

"Ballpark figure," the PFY says, "What does your average client spend on data migration?"

"Well none of our clients are 'average'," Hairbun says.

"Ordinarily," I say, "at this point my assistant would be unlocking the floor-to-ceiling windows along the side of the office. A couple of minutes after that, I'd make a gasping panicky phone call to security, babbling about a tragic workplace accident. They'd call emergency services and place another tick inside the TWA box on their whiteboard."

"Well I don't see any point continuing this conversation," Polo-neck says, as he and Hairbun get up quickly to leave before things get nasty. "In any case, we already have a signed contract."


"Oh. Is our door not opening?" the PFY innocently, reaching for the window key.

>rattle< >rattle<

"Maybe you should bang it a couple of times," he says, twisting the key in the nearest window and unlocking it.

>rattle< >RATTLE<

"You could maybe cry out," I suggest. "Call for help. Although this room in a former life was a printer room, so it has truly exceptional soundproofing."




"Perhaps phone a friend?" I ask, as Hairbun scrabbles with his phone - only to find no bars, thanks to the blocker in the ceiling space above his head.

"Look," Polo-neck says. "Perhaps we got off on the wrong foot here. Maybe you don't understand the situation."


"Or maybe you don't understand YOUR situation," I suggest. "See this room is a lot like that contract - in that it's far easier to get into than out of."

"Oh," Polo neck replies. "So I take it you want us to tear up the contract."

"That's completely up to you," the PFY says, swinging open the window.


"Both copies," I suggest.


"And pop them both in our bin."


"Now the good part," I say. "You get to pick the window - because we like to take the cooperative approach with our vendors."


"Well, my assistant and I are just going to pop into the server room for a while. While we're in there - working away on some urgent issue - I suspect there's going to be some sort of inexplicable problem with our Halon system which will make it discharge into this office and not the server room."

"So your options are..." the PFY says, peering out the window, "the window on the left, which sits two floors above a bin full of cardboard boxes, or the window on the right, which sits two floors above an S-Class Mercedes..."

. . .

"I still think it was a little unfair not to state 'cardboard boxes containing all the old CRTs we had in storage'," I say, "but then we need to look on the bright side."

"What?" the PFY asks.

"We're one TWA tick away from an H&S refresher course with a free lunch."

Always good to see the silver lining.

Similar topics

Broader topics

Other stories you might like

  • Your snoozing iOS 15 iPhone may actually be sleeping with one antenna open
    No, you're not really gonna be hacked. But you may be surprised

    Some research into the potentially exploitable low-power state of iPhones has sparked headlines this week.

    While pretty much no one is going to utilize the study's findings to attack Apple users in any meaningful way, and only the most high-profile targets may find themselves troubled by all this, it at least provides some insight into what exactly your iOS handheld is up to when it's seemingly off or asleep. Or none of this is news to you. We'll see.

    According to the research, an Apple iPhone that goes asleep into low-power mode or is turned off isn't necessarily protected against surveillance. That's because some parts of it are still operating at low power.

    Continue reading
  • China will produce one in five of the chips it uses in 2026, says analyst
    Well short of planned 70 percent domestic capacity

    China’s integrated circuit (IC) production has failed to keep pace with its appetite for silicon, with market research firm IC Insights predcicting the nation will produce only one in five ICs it uses in 2026.

    That figure is a increase from 2021's one in six, and reflects eight percent compound annual growth rate from 2021 to 2026. But it means China will miss its own targets for locally-made-and-consumed silicon.

    “Although China has been the largest consuming country for ICs since 2005, it does not necessarily mean that large increases in IC production within China would immediately follow, or ever follow” said the firm in a bulletin on Wednesday.

    Continue reading
  • Tencent happily parting ways with loss-making cloud customers
    Cutting costs across sprawling business as COVID makes life hard in China

    Chinese tech giant Tencent has recorded its first ever quarter-to-quarter revenue fall, warned that COVID-19 lockdowns will hurt messing with its business, and cautioned against assumptions that Beijing is ready to enthusiastically support tech companies.

    On its Q1 2022 earnings call yesterday, the company offered more explanation of its shifting cloud strategy.

    Chief strategy officer James Mitchell told investors the company is pleased to have shown loss-making cloud customers the door, and “proactively scaled back … deeply discounted infrastructure-only contracts for basic services such as cloud compute and content delivery network.” Projects that had high costs and/or relied on sub-contractors have also been scaled back.

    Continue reading
  • Will this be one of the world's first RISC-V laptops?
    A sneak peek at a notebook that could be revealed this year

    Pic As Apple and Qualcomm push for more Arm adoption in the notebook space, we have come across a photo of what could become one of the world's first laptops to use the open-source RISC-V instruction set architecture.

    In an interview with The Register, Calista Redmond, CEO of RISC-V International, signaled we will see a RISC-V laptop revealed sometime this year as the ISA's governing body works to garner more financial and development support from large companies.

    It turns out Philipp Tomsich, chair of RISC-V International's software committee, dangled a photo of what could likely be the laptop in question earlier this month in front of RISC-V Week attendees in Paris.

    Continue reading
  • Did hoodwink Americans with IRS facial-recognition tech, senators ask
    Biz tells us: Won't someone please think of the ... fraud we've stopped

    Democrat senators want the FTC to investigate "evidence of deceptive statements" made by regarding the facial-recognition technology it controversially built for Uncle Sam. made headlines this year when the IRS said US taxpayers would have to enroll in the startup's facial-recognition system to access their tax records in the future. After a public backlash, the IRS reconsidered its plans, and said taxpayers could choose non-biometric methods to verify their identity with the agency online.

    Just before the IRS controversy, said it uses one-to-one face comparisons. "Our one-to-one face match is comparable to taking a selfie to unlock a smartphone. does not use one-to-many facial recognition, which is more complex and problematic. Further, privacy is core to our mission and we do not sell the personal information of our users," it said in January.

    Continue reading
  • Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware
    Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D

    Analysis Wizard Spider, the Russia-linked crew behind high-profile malware Conti, Ryuk and Trickbot, has grown over the past five years into a multimillion-dollar organization that has built a corporate-like operating model, a year-long study has found.

    In a technical report this week, the folks at Prodaft, which has been tracking the cybercrime gang since 2021, outlined its own findings on Wizard Spider, supplemented by info that leaked about the Conti operation in February after the crooks publicly sided with Russia during the illegal invasion of Ukraine.

    What Prodaft found was a gang sitting on assets worth hundreds of millions of dollars funneled from multiple sophisticated malware variants. Wizard Spider, we're told, runs as a business with a complex network of subgroups and teams that target specific types of software, and has associations with other well-known miscreants, including those behind REvil and Qbot (also known as Qakbot or Pinkslipbot).

    Continue reading
  • Supreme Court urged to halt 'unconstitutional' Texas content-no-moderation law
    Everyone's entitled to a viewpoint but what's your viewpoint on what exactly is and isn't a viewpoint?

    A coalition of advocacy groups on Tuesday asked the US Supreme Court to block Texas' social media law HB 20 after the US Fifth Circuit Court of Appeals last week lifted a preliminary injunction that had kept it from taking effect.

    The Lone Star State law, which forbids large social media platforms from moderating content that's "lawful-but-awful," as advocacy group the Center for Democracy and Technology puts it, was approved last September by Governor Greg Abbott (R). It was immediately challenged in court and the judge hearing the case imposed a preliminary injunction, preventing the legislation from being enforced, on the basis that the trade groups opposing it – NetChoice and CCIA – were likely to prevail.

    But that injunction was lifted on appeal. That case continues to be litigated, but thanks to the Fifth Circuit, HB 20 can be enforced even as its constitutionality remains in dispute, hence the coalition's application [PDF] this month to the Supreme Court.

    Continue reading
  • How these crooks backdoor online shops and siphon victims' credit card info
    FBI and co blow lid off latest PHP tampering scam

    The FBI and its friends have warned businesses of crooks scraping people's credit-card details from tampered payment pages on compromised websites.

    It's an age-old problem: someone breaks into your online store and alters the code so that as your customers enter their info, copies of their data is siphoned to fraudsters to exploit. The Feds this week have detailed one such effort that reared its head lately.

    As early as September 2020, we're told, miscreants compromised at least one American company's vulnerable website from three IP addresses: 80[.]249.207.19, 80[.]82.64.211 and 80[.]249.206.197. The intruders modified the web script TempOrders.php in an attempt to inject malicious code into the checkout.php page.

    Continue reading

Biting the hand that feeds IT © 1998–2022