Beware the techie who takes things literally

'If it works already, why pay' says the boss... because of course he does

Who, Me? Time bombs and shareware feature in today's edition of Who, Me? as a boss's big spendy vehicle leaves a coder out of pocket.

We start the week with a story from a reader Regomised as "Frank", and a confession from his second job following a disastrous first foray into the IT world.

Frank and a freelancing friend were working for tiny company that sold mobile data collection equipment. The company liked to punch above its weight. "On the phone we had to act as if we were at least 20-people strong," he told us.

This was a pain because every ring of the phone meant an interruption to coding.

While this was annoying, it wasn't as annoying as the boss's approach to finances.

"I had to write a demo program for showing the usefulness of those mobile data units," he said. "Basically collecting the data and showing it on a PC."

This being the end of the 1980s, the demo was coded in Turbo Pascal. However, reading and writing to the device had to be done via the RS232 interface, something the out-of-the-box Turbo Pascal of that era was not entirely suited (at least, not in the way Frank needed).

Shareware to the rescue

The shareware in question was distributed via floppy disk. It consisted of an assembly routine that could be accessed by Frank's Turbo Pascal code and did pretty much exactly what was required. The catch was the requirement for payment should the code see commercial use.

It was a one-time fee of £10 ($13.60).

Frank didn't see a problem. His boss, who had just taken delivery of an expensive new car and not been able to sell his old one, did. Pennies needed to be pinched.

So, there was no money to spare, said Frank.

His boss's take: "Works already, why pay?"

A refrain familiar to all too many open-source authors today.

Frank was an honest chap and confessed the situation to the shareware author. The author was understanding.

"He said OK. I should limit the lifetime of the software that uses his routine to a year and it would be OK for him."

So that's exactly what Frank did. After one year his app would stop working. To be absolutely sure of staying compliant, he also ensured his app would delete itself and remove all its source code.

Time passed. The boss's old car remained unsold, and as a further money-saving exercise it was suggested that perhaps Frank might like to switch from being a permanent employee to freelance? Taxes would be saved... but Frank refused.

And so, with just three months on the clock, he was unceremoniously fired.

And there the story might have ended. His former boss tried the same stunt with Frank's colleague, only to come seriously unstuck when the tax office demanded five years of back payments ("That's how long my former colleague had been working there," Frank said).

But for Frank it was on to pastures new. Even when the boss called up a year later: The company was bigger now, and perhaps Frank might like to come back?

No chance.

"He also said that the program I had written had really been a great demo at CeBit and they liked it very much," Frank recalled.

"Just that after two days of the trade fair it mysteriously disappeared from the disk and its backup did not work either."

"And they had to shut down the demo."


Did Frank do right or wrong? Software stopping working after an evaluation period is, after all, the way of things.

But was the scorched-earth policy overkill and a little ethically dubious? Have your say in the comments and send us your confession in an email to Who, Me? ®

Similar topics

Broader topics

Other stories you might like

  • Experts: AI should be recognized as inventors in patent law
    Plus: Police release deepfake of murdered teen in cold case, and more

    In-brief Governments around the world should pass intellectual property laws that grant rights to AI systems, two academics at the University of New South Wales in Australia argued.

    Alexandra George, and Toby Walsh, professors of law and AI, respectively, believe failing to recognize machines as inventors could have long-lasting impacts on economies and societies. 

    "If courts and governments decide that AI-made inventions cannot be patented, the implications could be huge," they wrote in a comment article published in Nature. "Funders and businesses would be less incentivized to pursue useful research using AI inventors when a return on their investment could be limited. Society could miss out on the development of worthwhile and life-saving inventions."

    Continue reading
  • Declassified and released: More secret files on US govt's emergency doomsday powers
    Nuke incoming? Quick break out the plans for rationing, censorship, property seizures, and more

    More papers describing the orders and messages the US President can issue in the event of apocalyptic crises, such as a devastating nuclear attack, have been declassified and released for all to see.

    These government files are part of a larger collection of records that discuss the nature, reach, and use of secret Presidential Emergency Action Documents: these are executive orders, announcements, and statements to Congress that are all ready to sign and send out as soon as a doomsday scenario occurs. PEADs are supposed to give America's commander-in-chief immediate extraordinary powers to overcome extraordinary events.

    PEADs have never been declassified or revealed before. They remain hush-hush, and their exact details are not publicly known.

    Continue reading
  • Stolen university credentials up for sale by Russian crooks, FBI warns
    Forget dark-web souks, thousands of these are already being traded on public bazaars

    Russian crooks are selling network credentials and virtual private network access for a "multitude" of US universities and colleges on criminal marketplaces, according to the FBI.

    According to a warning issued on Thursday, these stolen credentials sell for thousands of dollars on both dark web and public internet forums, and could lead to subsequent cyberattacks against individual employees or the schools themselves.

    "The exposure of usernames and passwords can lead to brute force credential stuffing computer network attacks, whereby attackers attempt logins across various internet sites or exploit them for subsequent cyber attacks as criminal actors take advantage of users recycling the same credentials across multiple accounts, internet sites, and services," the Feds' alert [PDF] said.

    Continue reading

Biting the hand that feeds IT © 1998–2022