Tag: hardware

The Old Gray Mare Ain’t What She Used to Be

The Old Gray Mare Ain’t What She Used to Be

This might seem like a blog about horses or livestock but we will be talking about technology, and how to breathe new life in to your old computers.

In 1946 they designed the ENIAC to be the end all be all in technology.  Twenty minutes of Computer time would replace over 240 man hours where calculations were concerned.  The economic model fell apart with the amount of man hours needed to maintain the computer, not to mention the parts, ‘tubes’ and the energy needed to power it.  

Today in this modern era of technology we have something known as Hardware Asset Management.  If your CIO gives you a blank stare if you talk with him or her about it, consider hiring a new one.

CFO’s hate surprises. Without asset management one quickly learns there are no good surprises in business.

The modern day desktop has a life cycle of five years and the laptop, three.  What if there was a way to extend that life cycle for a minimum investment?

They rate components in computers in something known as MTBF or Mean Time between Failures.  Notice that does not ‘if it fails, but when.’

Looking at the different components within a computer, one of the most fragile and arguable important is the hard drive.  Next would be the power supply, and any moving parts, which would be the fans, drives and cd-rom.

How do we mitigate this to an acceptable level of risk, and push the envelope out one to two or more years?

Normal physical maintenance should be at the top of every ‘engineers’ duties.
·         Visiting with the users looking for clues about what they are dealing with.
·         Visual inspections of how the machines are installed and cared for.
·         Regular dusting of the CPU and other fans looking or listening for bearings, etc.
·         Frayed cables or broken tabs on network cables.
·         Non-authorized software.

Managers of those individuals should be mindful of updates, security and so on.  License compliance is part of Software Asset management and not in the scope of this document.

Now what about extending the life cycle of a computer?

The secret is SSD drives.  As developers constantly up the requirements for applications to perform, we cast aside perfectly viable computers for newer hardware.

What if? 

What if we could solve some of those issues with a simple upgrade? SSD Drives are under $100 for a Terabyte drive.  A disk duplicator cost around $40 or certainly less than one hundred dollars.

Taking out the hard drive, placing it in the source compartment of the duplicator and the new SSD drive in the target; in 4 hours’ time you have a solid state drive that is no longer subject to accidental jars such as in laptops.  More importantly than this, is the speed issue.  You also have a perfect clone of the original meaning, you have a backup should something happen.

SSD drives are much faster than regular hard drives and there are no moving parts.

The laptop I am writing this on, was a retired HP with an I 3 processor and 6 gig of ram.  One $100 drive later this laptop performs like a new one.  Yes, the Office applications are still 2010 but, I have Windows 10 and it runs just fine.
Boot up time went from over three minutes, to under thirty seconds.

Application loading time is incredible and if Windows needs to swap, it is swapping to memory and not a slow hard drive.

Bottom line, I have a perfectly good laptop pulled from the retirement pile, for $100 and four hours of my time.

Since the copy process is automatic, you put the two drives into the machine, hit copy and go do something else until it is finished.  Actual human hours involved were less than 20 minutes.
The old Gray Mare now is running like a colt, and I can save the money I would spend on a laptop and new software for something else.

For an individual this is an easy decision to make.  Multiply this by ten or a thousand employees.  Could your P&L use the extra boost?

Like always, I am a consultant and would be happy to visit with you about how you are doing business, and if there are ways to improve upon them.

Bio:
I was working with computers before Bill Gates was a household name, and Steve Jobs was still a criminal working out of his garage, designing and building ways to scam the phone company.  I met him while supporting Next Step Computers during one of my jobs years ago.
From before ‘Al Gore’ invented the internet, to performing disaster recovery strategies for large and small companies, I stay active. Reach out to me on Linked In, or through this blog.
-Best

 

Advertisement
Is Buffoonery the new American Norm?

Is Buffoonery the new American Norm?

 

“Doctor, when I do this it hurts.  My hair is thinning, and I am tired all the time.”

“Is that all?”

“Yes, other than this strange growth on my neck. What can you give me to make it better?”

“We must run some test first to see if these symptoms are related and then figure out what is causing them.”

“You doctors are all alike, you just want to run my bill up with unnecessary test, so you can make a car payment or even a house payment.  Just prescribe something, and I will be on my way.”

The patient in the above dialogue is a Buffoon.

Oddly enough, I get this same kind of rhetoric when I am called out to come up with a disaster recovery plan and discover that they have many other issues.

“Do you think you can fix these issues we are having?”

“What are some of the issues?”

“Computers drop off the network for no reason.  Printers often don’t get their print jobs, we think it is the printer, so we keep calling Cannon out, but they never fix it! The internet is slow and sometimes unresponsive.  Our phones don’t always work.  The phone vendor keeps telling us it is not his problem but you know those vendors, get your money and then forget they know you.  My lead guy tells me we need more internet bandwidth, would that fix it?”

“It sounds like you have some serious issues, when would you like me to start?”

“Start?  Just go push the right button and fix it!  How long will it take?”

“It depends on what I find.”

“What do you charge?”

“$125 an hour unless you would like to have me out here on a contract for a set amount of time.”

“What would you charge if I contract with you for two hours.”

“$250, (and it may be more if I have to deal with stupid nonsense like this, while I am working.)

“Truly I get this kind of stuff from CIO’s no less.”

The old joke about a thousand dollars regarding kicking a computer to make it work is just a joke.  While that might end up being the final diagnosis (which I doubt), this is a mindset from those who have no idea of what they are talking about.

Truly if it is from someone outside of IT, it is not their fault. Their job is to run the company, turn a profit or drive the business to produce more of what they do.  It is not to run IT.  Now if the CIO has this dialogue with you as a consultant then you have issues.

Some people are in high up positions because of who they knew and not what they knew.  Some are there because their parents own the company.  I personally try to stay out of situations like that because it hardly ever ends well.  I have done it many times in the past.  One of the most frustrating things is working for a guy “CIO” who did not even have a computer at home.  He knew little about computers or technology other than green screen 5250 stuff as a programmer, using RPG or Cobol.

When I walk in your door to resolve an issue or create a disaster recovery plan, there are things that I want to see.

  • Up to date network map.
  • A runbook
  • I will want to see the recent logs from the servers.
  • I will want to see your notes from the change control committee. (living document)
  • I will ask about your issues from the past to current. Are there pain points and what are they?
  • I will want to know what you would like to see as a deliverable. (an end goal)
  • I will want to know about your business model, so I can best position you for the future.
  • I will ask about the age of the hardware and what your hardware asset management looks like.
  • I will also want to know the same about your software. S.A.M.
  • I will want to see the licenses for the software that you have and I will want to see where the software is and when, if ever was it updated.

If you asked your CIO for these things, could he provide them?

As the CEO, ignorance is not an option.  There are seldom good surprises in business.

There are many other things I will want to have handy before I even begin to diagnose, troubleshoot or create a disaster recovery plan.  One of the most effusive displays of frustration from a client was when I discovered through digging that someone had spliced network cable improperly and it would need to be replaced.  Cat 5 to Cat 3 no less.

Yes, I will want to know about the cable plant. Was it installed all at one time or has it evolved over the years?   When you climb into the overhead ceiling to find a gob of electrical tape or even scotch tape holding network cable together, that will make your blood run cold.  If they are that stupid or cheap unless they are under new management or are willing to hand you the checkbook, you probably should just walk away.  Life is too short.

When I talk with potential customers, I can get a sense of their knowledge level quick enough.  How is that done?

I was in data processing long before Bill Gates was a household name.  Steve Jobs was still a criminal selling blue boxes made in his garage and CPM was the operating system.  What I do is not cheap but, it is worth it.  Most companies that have a disaster if not resolved within three days go out of business.

“We live in Dallas Texas, what kind of disaster could we have that would put us out of  business?”

The disaster that I see the most often was caused by employee error.  I do a risk assessment as part of the deliverable which many companies need for their insurance provider.

Now that we are in 2018 is this the year that you pay attention to your network and other infrastructure?  Is this the year that you look at security both digital and physical? “yes, I do that too.”

If you like my blog, please consider following me.

-Best

 

When Should You Replace Equipment and Why

When Should You Replace Equipment and Why

 

 

Today I thought I would talk about a subject that is near and dear to the hearts of most CFO’s.  Money and budgets.

 

In the IT ARENA as it were all hardware has a lifespan.

 

  • Desktops 5 years
  • Laptops 3 years
  • Tablets, PDA’s and phones about 2. *

 

HAM or Hardware Asset Management is close cousins to SAM or Software asset management.

Many that I deal with in this industry are loath to do either of these.

 

Why?

What seems so intuitive to a business minded person is out in left field to the IT Manager.

 

While most hardcore IT people will undoubtedly have the updated newest most magnificent PC at home, they will be loath to keep the hardware at work current.  Either budgetary constraints, lack of planning on their IT staff, laziness or foolishness on managements parts while keeping the dinosaurs alive.

IT is a moving target.

One of my clients was experiencing a strange anomaly on one of their machines.  I was there for other reasons, and they ask me if I had ever seen anything like it.

 

On occasion, the mouse pointer would change with some strange addition to it, making the original tip Indistinguishable from where it should be pointing.

 

Nobody has seen everything and the same is true for me.  Offering my services, as they did not have the time for this, I did the usual stuff.

After hours of doing my routine including removing the hard drive and running scans on it outside of its operating system, the problem looked more and more like hardware.  Faulty graphics adapter perhaps.

After moving the PC into the shop, the problem disappeared.

Going back to the work area where the PC was, under the desk was an old UPS.  Taking the UPS into the shop and checking it out, I soon discovered that the sine wave of 60 cycles was anything but clean and, it was not holding the right voltages even though the battery was good.   Upon further investigation, I learned that they had a routine of replacing batteries in old UPS’s and putting them back out.

Putting a new ups under the ladies desk, solved the problem.  It was a $79 solution which should have been automatic.

I don’t want to go into the weeds here, but electronics have a lifespan.  Things called MOV’s for one (metal oxide Varistor) are sacrificial devices that are designed to clamp power spikes keeping them from going downstream, in this case, into your PC and monitor.  They have a finite lifespan.

UPS’s or Uninterruptable power supplies are insurance.  When the battery dies, replace them.

Recycle them after you remove the battery and dispose of it accordingly.   I would bet that all over every office building they have surge protectors that are no longer functioning.  For the same reason, they too have an MOV across the 120V AC line.  They die!

I have written about PC’s lifespan before, so I don’t want to repeat myself.

Hardware Asset Management protects the company in many ways.

You should never put an old machine at someone desk having them limp by with a clunker when they need a Corvette. The software today is memory and CPU intensive with the ever growing demands of anti-virus software and the numerous updates, it is worse.

Soft dollars are real.  If you have employees that cannot work because their network is down, that is real money!

Employing a good software deployment strategy along with keeping the same model of machine in the business is wise, and worth looking into.

Software and Hardware management are critical pieces of a business strategy.

One client I had, bought whatever was on sale on New Egg.  Support was a bloody nightmare and oh by the way, why do you think it is on sale?

Always purchase from a VAR, and build that relationship with them.  You may need them one day!

Leasing vs. owning is worth looking into for many reasons.  Bottom line, you change out the PC’s every few years, and you get the same PC to support throughout the company.

The clunkers end up on eBay and eventually, someone somewhere will be playing solitaire on it.   Today’s Corvettes are tomorrow Clunkers, simple truth! 

Depending on the size of your company software licensing needs to be evaluated and care taken to make sure that you are in compliance. An enterprise license is excellent to have if you are large enough. Software and licensing are evolving daily it seems, with lease being the operative word.  Subscription services much like antivirus software is commonplace, ensuring a revenue stream for the developers.

Gone are the days of buying a box of software with a few floppy disk and using it forever.

I was visiting some friend when I saw an old 486 computer sitting on his mother’s desk.

My first computer was a Kaypro, and I went through the 8088 @4.7 mhz to GHz and beyond.  To see the old 486 running with Solitaire on the screen and windows version three, you could see the mindset and how it evolved.

I recently trashed (recycled) a bin full of disks with programs, backups, and god only knows what all.  The next week I tossed an entire bookshelf full of technical books from Novell to MSCE windows NT stuff.  Thousands of dollars and hundreds of hours studying in the bin.  SAD

Your PC is not too dissimilar from your car.  You don’t buy it as a thing but as a resource. When your vehicle starts to spend more time in the shop than on the road, you trade it in.  The same is true of your PC, Laptop and the rest.

Somewhere in my closet I still have a 16mg stick of memory that I paid over $500 for back in the early 80’s.  $500 back then was a lot of cash.  The stick of memory is nothing.  What it did for me was why I bought it.

If you are not connected to the internet as long as you can keep your 486 running, and it does what you need it to do, it is viable.  If you still have a copy of lotus 123, you too can relive the days of / .. 🙂

 

*  2 years on the average portable device is recommended because they are portable, and often dropped.  If you budget 2 years, you can indeed budget correctly.

 

If you find my blogs helpful or entertaining, please follow me.

 

-Best

Ready, Fire …Aim

Ready, Fire …Aim

After the recent storms, one might have guessed that my phone has been busy.  Firstly let me say that Disaster Recovery by its very title is a bit of a misnomer.  While I have some abilities to recover lost data using some forensic skills developed over decades of twiddling bits, that is not really disaster recovery.

Disaster Recovery and business continuity are about planning for an event which may or may not happen.  The “plan” assumes that your business systems will be affected negatively and puts forth a tested strategy to recover from the said event.

With the recent devastation by hurricanes and earthquakes, one would think that those businesses not affected would be learning from those that were.  If you search my blogs on this site, you will see that I have laid out

Do not ask him or her, are we covered just in case, ask them specific questions laid out in this blog here.

Yes is not a satisfactory answer, demand the details and the proof.  I don’t care how much of a friend he or she is, demand the evidence.  The devil is in the details, and the last thing you want is a bunch of excuses.

I am learning from phone calls that too many have been assured that they are covered, and that is very possibly why today they are looking for ways to recover data from destroyed equipment.

Disaster recovery is not some dark magic spell cast under the voodoo magic of bits and bytes in the wiring closet or back part of the computer room.  The bottom line is to test it, whatever your people come up with, check it.  Keep checking it until you can recover your business with outside contractors and hardware with data and documents prepared by your staff.  There is to be no input from you or your staff during the test.  The hurricane, earthquake, fire, attack from zombies or employee error took you and them away from the scene. The plan provided must work!

This is why we who do this insist that companies use “best practice” standards in the industry when creating your individual networks and systems.

One such company has a senior IT staff littered with programmers.  These people think they know more than Microsoft.  Using kludges from Unix, Linux and other programming wizardry to subvert some of the basic tenants of networking, they have made their network so unique that it will depend on them to be there to recover.

If it is not broken, don’t fix it!

Writing programs that workaround things like DNS is just crazy stuff and now it is dependent on the network never changing, at all.

If your data is successfully mirrored offsite, an excellent team of engineers might get you going in weeks, not days if you have failed to follow best practices.  While your data might eventually be usable, you and your company will be on the sidelines as most businesses do not recover from such a catastrophe.

Folks I have been at this since 1982, I have learned a thing or two in those years.  Ask your team the questions or be prepared for unpleasant surprises should you ever face a business stopping event.

Got to go and explain once again what disaster recovery is and is not.

-Best

What If?

What If?

Every day someone finds something.  This day was no exception.  The more creative the attack the more interesting the day.  If you call that number they try to get you to give them $199.00 to unlock your computer.

You can send me some money if you like but, here is the fix for this…

CTL ALT DEL , task manager, kill the process, aka browser and then do not restore the page when you reload the browser.

I am not affiliated with CCleaner but I sell a heck of a lot of it for them.  Install it and let it clean your browser after every use.  $25 a year and damn well worth it!

As one might use an explicative to emphasize a point, I often use a somewhat tawdry analogy for this purpose.  Surfing the web with inadequate anti-virus software is like “hooking up with a stranger” without using protection.   Not only is it idiotic, but dangerous!

Having been in Data Processing, or the IT business since before Steve Jobs or Bill Gates was a household name, I know a thing or two.  The scars on my back are from arrows taken in the trenches of digital mayhem. This bedlam was caused by such things as bosses wanting to be on the bleeding edge, to software not ready for prime time, been there done that.

Free antivirus software is not worth what you pay for it!  

The best security software is going to have a price or cost to it.  Why?  It takes many engineers, coders, and much research to create and maintain a massive program like anti-virus software.  Who is going to do that for free?  More importantly, why?

While someone might write an app for free, to get their name out there; anti-virus software takes a village.

Much like hiring someone to sell your home, you don’t hire someone who does it part-time or as a hobby. If you want to get something done, give it to a busy person.  If you want to sell your home, hire someone who’s lively hood depends upon them being successful.  You want a secure computer, hire or purchase the product with the most to lose if it fails.

There is much more to the process of considering which product to purchase but, free is not a reason.  I would argue that free is a cause to eliminate that choice.

The reality is that the internet has become the wild west.  The bullet that finds you can come from almost anywhere. Every company that uses computers should have a security officer.  His or her job should be to focus their attention on threats out there and the best way to keep them from affecting that company.

I find it surprising that politicians are screaming about Russian hacking of our computers.  What the hell do you expect?  You just assume that someone with a certification gives a damn!?

What worked in 1982 does not work now.  Having a “PC Wizard, or your grandchildren” working for you is tantamount to a trapeze act, blindfolded and working without a net.  Insurance companies and credit card companies are now aware of this and demanding your strategies to be secure in the world of cyber threats.  They should audit you, and they should hire folks like me who know what to look for.

White Hat hacking allows us an inside look at what one might expect.  We learn many ways to infiltrate a company.  The same applies to the TSA in homeland security.  While I would probably choose a job to be that guy that test the security systems of the homeland, airports and such, it is much easier to check companies.

The first thing I must do is understand you.  More importantly, know that entity many of us in the biz call “users.”

Too many infiltrations are accomplished with something called click bait.   “Ten pictures that should never have been made public…” With half a picture of some scantily clad woman visible, how many will click?

Human nature dictates men will want to see what the camera saw. “Boom, you’re infected.”

Good antivirus software will stop any activity created by software manipulation but, the caveat or keyword there is “good.”  What if you bought the bargain basement software or just used the free stuff?

For the coders to write the fix, someone must fall prey to it, report it, and then they must institute a fix.  That is why Software of this type is never static.  Updates are consistent and often.  New threats are released hourly.  To run a company dedicated to this is no small task.

Maybe you own a plant which produces widgets.  Your widgets are better than others, and your competition wants the skinny.  You hired someone like me for your IT manager or CIO so they cannot get in through your firewalls.  Your safe, or so you think.  Industrial espionage is rife in the competitive world of gadgets and widgets.  If I want in bad enough, I will contract one of my guys to write a program that will hide on a computer until certain key phrases are typed, and then it will activate.

“Wait, you said my firewall is secure, Fort Knox secure!”

“Why yes I did, so I am going to place this little program on a thumb drive and…I am going to put some naughty pictures on it with some commercial looking writing on the outside of the device to make the person who picks it up from the parking lot where I dropped it, think that they have something juicy.”

Possibly just tossing a thumb drive out the window of my car near the parking lot with a few files on it, and the Trojan would be enough to get me into your network.  I will purchase some chrome colored or fancy looking thumb drive to be sure that it is spotted.  I will know when the landscape folks work, so I make sure and plant it after they have done their thing so that one of your employees will find it.

Maybe I send one of my spies out to places that your guys eat and leave the drive on the table by the ashtray or the salt and pepper shaker at the table they eat every week on a given day and time.

Possibly I get one of my people inside your company, hired by you.  They install some remotely controlled program like Team Viewer on their PC and Viola; you are hacked.

Because your IT guy is so sure that his firewall is good enough, or your engineers are so demanding that he left the USB ports open for use by them, with lax policies he leaves your company vulnerable too.

How do we stop the threats?

One way we do this is with training.  Every employee should sit through CE training on the essential use of the corporate computers.  This is information that they can bring home and share.  Education is by far the best tool one can have in their arsenal.

All of the policies are trumpeted for them to hear and before they leave they sign a document saying they will adhere to them.  With it harder and harder to fire people these days, that too is one more tool in your belt.  Good employees, you want to keep, those that prove lacking, they need to go.

I could easily make the argument that good computing practices are patriotic.  I could certainly apply this to purchasing respectable anti-virus software and creating policies and procedures that protect your business but, the bottom line is, in the end, it will save the company money.

I was making this argument to a CEO of a good-sized company when he stopped me and said, but viruses help your bottom line too.

I argued that I would much rather use my time and talents to design safe environments for companies like his than put out fires.   It is considerably less expensive to install a good fire retardant system then to try and rebuild.  Yes, a metaphor for using robust best practice standards in computing vs. reacting to noise.

Noise is the result of a problem created by an event that was unplanned or caused by employee error.

A good security person is somewhat paranoid and is always asking, what if?  I do this in disaster recovery scenarios balancing those “what if’s” against statistics and a risks assessment.

With proper education, we can mitigate the employee errors.  Using proper procedures and policies, we can diminish the unplanned events, i.e. viruses or other malicious code.

When I run into companies that think free antivirus software is adequate, it makes me a little crazy.  If they are a public company, trust me, I will not purchase their stock.  Flirting with disaster out of sheer frugality or ignorance is idiotic.

If you keep your guys around because you like them, think again.  I may love some folks, but I would not hire them for certain positions if I could find someone better.  I don’t have to like you, for you to work for me.  If you are the best person for the job, you get the job.  P&L trumps feelings!  Feelings can be costly and can be a liability.  Logic in business is your ally.  Logic must always be forefront when making business decisions.

I have walked away from companies who have their kids working for them.  By hiring the children, you open yourself up to losses that could be untold.  One company had their children not doing the paperwork necessary to complete the task, thus losing money in that department.  Hiring me to do an analysis, it did not take long to find the problem.  I fired her children after trying to work with them.  I kid you not one of them actually cried in my office after telling him time after time he must do all of the job.  A grown man crying!  There is no crying in IT.  Either perform the work or get the hell out!  Either do all of the job or learn to ask, “Do you want fries with that?”   Is that too tough?  I felt for the kid but, feelings do not dictate policy.

Do your kids a favor and don’t hire them.  The real world does not work that way so why in the world handicap them, and make them believe that it does?

Over the years there are best practices that have been created by time trusted procedures and policies.

Some are things like:

  • Hardware Asset management.
  • Software Asset Management
  • Security both physical and digital

I could write a book on the subject, but I will spare you the details.

Today, now more than ever we must harden our networks.  We must have sound policies and procedures in place, and they must be adhered to.  Documentation is essential, and it must be updated.

I don’t relish firing people but, sometimes their people are the problem, and the CEO is so far removed from the process they just don’t know it.  If training can fix it, I am all for it.  Attitude too plays a crucial role in the process, and I will not tolerate a crappy attitude.  Life is too short, and the subject matter is too important.

I love the HR folks because often they are the gatekeepers, saving the CEO from disaster.  Good HR folks are worth their weight in silver.  Gold, maybe not, so let’s stick with silver. Worthy people are not that hard to find as many would have you believe.  Upright people are around, but they may not have everything that you are looking for immediately.

Instant gratification is an expensive luxury and can be elusive at best.  Where employees are concerned, I want to start with a “good foundation.”

We place certifications above character, and that is part of our modern day conundrum.

I hired a grocery store manager and trained him for a job in IT.  He had little experience in the job I hired him for, so why did I hire him?

He had the right attitude and wanted to learn.

I had the time to train him.

The money used for training him was penny’s compared to hiring exactly what I was looking for.

He did not have the bad habits that come with so many “experts”  with the certifications, and their egos.

He ran a grocery store and let me tell you; he was not afraid of work!

Back in the day, we had interns or apprentices.  Folks, we need to look carefully at that once again.  I have hired many over the years that had the right attitude and the skill set to learn.  American people are out there struggling, and we won’t give them a chance.  Why?  Instant gratification.  We need someone who can step into the job right now, and we run with minimum employees because of what?  Because it is so expensive to have employees.

That is one of the things we need to push back on Congress and health care to fix, but the reality is, internships and apprentices I think are essential to finding and creating good employees.

Every job fair that I go to has thousands of workers looking for work.  If you can’t find them, you are not looking!  I spot good employees daily.  There are times I would love to go work for a recruiter just because I can spot talent!

Are they the exact racehorse ready for the Derby today?  Maybe not, but can they be trained?  There are virtual diamonds in the rough everywhere, looking for a chance! We are begging to bring in more H1B folks instead of taking care of our own.  That is not very damned patriotic if you ask me!

Our schools are a disaster in my opinion.  In speaking with college graduates today, I am frequently amazed at just how ignorant and totally out of touch with reality that they are.  Someone somewhere screwed them to the tune of tens of thousands of dollars for an education that is worthless.  When they think voting for a socialist is a good idea, they were screwed by their college and should demand their money back!

Today we have kids tens of thousands of dollars in debt, and they cannot find a job.  I know of several college grades making much less than $15 an hour.  Our educational system needs an overhaul.

As quickly as a company can get a process documented and packaged, they send it overseas via a VPN over the internet, sending jobs out of the country.

Trades are being overlooked for white collar jobs which are going the same way.  IT jobs are vanishing in the states.  Virtual IT shops are set up in some foreign country, hiring an English speaking American to act as a liaison between them and their Indian or other counterparts.  With an American point of contact, it is then up to the American to manage the folks in another country who speak little English, making little money, to be the IT shop for these American companies.  This same person puts an American face on their business while working with their client managing the “noise.”

“Do you see any security risk there?”

You have no clue where your intellectual property is going or who is seeing it.  Maybe you have a contract but so what.  Much like HIPAA was created to protect your health information, do you honestly feel as if your information is secure?  If you do, you are fooling yourself.  Read the documents you sign when you visit the doctor.  You sign things saying that your information is protected and then you sign a document which pretty much gives them a pass to do whatever they want to do with your information.  Smoke and mirrors.

Doctors and hospitals are hacked and the information is stolen all too often.  Why?  How?  Piss poor planning on someone’s part. Using some cheap method to get things done perhaps?

Your contract with your Virtual IT company is as worthless as the paper it was printed on.  Yes, that deal might make you feel better but, know if you are a developer, someone in some other country has your work and if they can use it, they will.

I want to touch on Software Asset Management as it is germane to this subject.  All of the subjects are salient, but that one, in particular, is in the case of security.

There are tools which you can use to inventory every program on every PC.  Why?  Why would you want to do this?

Licensing of software is an issue, but more importantly, you should want to know what is on those PCs.  The first time I did this for a company I was struck with the reality of the sheer number of programs designed for remote control of a PC, that was active.

In this world we live in, corporations can ill afford to have the wild west inside their computer networks.  Besides the games and other foolishness that was identified, the risk to the infrastructure was phenomenal. The company is liable for every program on their PC’s, no matter who put it there.  If they are audited for their licenses, and someone like myself does an audit and finds them, they must then produce that license.  Can you?  Can you put your hands on all of your licenses?

Ignorance is no excuse!

Having been part of the evolution of the business process, dating back to the secretary and the typewriter to current day, I have seen the learning curve first hand.  Fighting the first virus on a network before there was anti-virus software; asking “what if” became second nature.

Back when Gregg shorthand was used, a business letter cost an average of $100.00 back then.  Now we type out e-mails with the ease of few keystrokes and dictation is a thing of history.  Technology has improved the business process, but the bad guys have found a way to make it interesting.

The very tools we use to make our lives easier are under constant threat by evil forces that look for ways to extort money or steal your property either through the exploitation of your network, or your employees themselves.

We use the cloud as if it were a hard drive in some vault in our closet.  We send information to the cloud without a clue where the cloud is and who has access to it.  Why we don’t encrypt that data before it leaves our computers is beyond me.  If I were a villain, I would be looking for ways to infiltrate the “cloud.”

“What if?”

The opinions expressed are my own as well as the intellectual value of the information put forth for your consumption.

© All Rights Reserved 2017

 

How often Should I Change the Ribbon

How often Should I Change the Ribbon

 

 

By far this is the most often asked question when I am speaking with a customer.

First things first, however.  There are three different types of ribbon for your consideration.

rapidprint ribbon a

By “type of ribbon,” I mean what fabric was used.

  • Nylon
  • Cotton
  • Silk

Nylon, most probably the least expensive of the three has plusses and minuses.

Nylon takes more abuse but, does not hold as much ink as some others.

Cotton, also not the most expensive holds much more ink for a longer period. However, Cotton pulverizes much easier than Nylon.

Silk, the most expensive of the three holds together longer and is in the middle of the road as far as its ability to retain ink.

“Great, there are three types, which one do I need?”

There are a few different factors to consider.

Your average humidity.  The moisture in ink will evaporate much faster in Arizona, than Florida, for example.

“Why do I care about how fast the moisture evaporates?”

The medium for the ink is the moisture.  When the ribbon is dry, the quality of the print is diminished.  Also, it is my contention that the moisture from the ink assist in lubricating the type section allowing it to wear much slower than pure metal on metal.

Pulverization

As the solenoid under the type section rises to strike the type section, it places the imprint on the document of the date, time and whatever other information you may have on your individual plates.

Each time it does this, it breaks the bonds in the fabric a little, which is the ribbons substrate or media which holds the actual ink.

During the ribbons life cycle, the spooling mechanism rolls the fabric back and forth as it nears the end.  Several passes of the ribbon are possibly before the ribbon should be replaced.

I tell customers to make an imprint right after they change the ribbon.  Take that example hang it by your machine somewhere.

Much like the brakes on your car, you have no idea that from the get go they are performing less efficiently until one day you hear the ubiquitous squeal from a metal warning indicator telling you to service your brakes.  Each day they wear just a little bit more and stop just a little less efficiently.

Your ribbon from day one slowly loses ink, and before you know it, you are not able to clearly see the imprint.

“Why is this a problem, I want to get the most out of the ribbon I can!”

“No, no you don’t.  Most of you are scanning or imaging your documents.  That means that the original text must be legible.  Since most scanners do not get 100% of the original “value” or the image darkness, the original needs to be as dark and definite as possible.”  Secondly using a ribbon too long will cause pulverization of the substrate.  If you have ever looked inside your Rapidprint or Widmer file date stamper and seen “gunk” in the wheels or plates. That is from ribbon fragments and paper dust bound together with ink as the glue.”

Do not try this at home!

Many of you have attempted to clean this yourself.  Once you try this, quickly you will see the error in your way.  Using an old toothbrush and alcohol should be an easy task!  There is a reason that I do very little service in the field.  One customer did this and told me of the experience.  I did not mean to laugh but, the walls appeared as though an inkwell blew up.  Her clothes, desk and anything within proximity was spotted with ink.

Never mind the mess that this process makes here is the real bugaboo.  When cleaning the machine, you take the oils and other chemicals away which lubricate the wheels and mechanism.

I disassemble each machine after cleaning it replacing the worn parts, and then I replace the lubricants.

For these to function properly the tolerances are critical.  Some have tried to replace parts by themselves to find they got into more than they bargained for.

If the machine full of gunk is left untreated, the mechanism will wear faster, and the imprint will not be clear but smeared as the letters like “O” will be filled in and appear as a large dot instead of an “o.”  The same applies to the numbers 0 or 6 or 8 or 9 and any other letter than has a closed circle of some sort.

Since these machines can cost up to $1000 each, it is a super good idea to have them serviced occasionally.

Changing the ribbon when the print starts to get too light is also a good idea.

At TimeDok we sell and service these machine and have done so since 1995.

If you purchase a dozen or more ribbons from me at one time, I pick up the shipping.

In summary, Silk is the most robust ribbon for those of you who don’t like to change them as often as you should.

Cotton will render the best print image but will pulverize and needs to be changed when the print gets too light.

Nylon is less expensive than Silk and does hold up better than cotton but will not last as long as cotton or silk.

One of the other things I see too often is this.  “The spooler is not working!”

Go here and check this out before you send me your machine

http://www.timedok.com/Support.html

The other guys won’t tell you that…

While I actually want your business, I don’t want it under false pretense. Many times the ribbon was installed improperly, and it will not spool if it is.

Follow me on Linked In or check out my website at www.timedok.com.

“Is it feasible to use Timedok for my service as I am not in Texas?”

If you can get UPS to come to your location then yes.  I currently have customers in all 50 states and in some of its territories.

Call or write for details.  Many times a machine will just show up with no advanced warning from a new customer.  That is ok too but, a heads up would be nice so I can get to know you a little and vice versa.

http://www.timedok.com/contact.html

 

 

 

Hubris in IT

Image

 

It would seem that “Pride cometh before a fall” is something that is lost on most people who work in IT.

 

As someone who has been working with computers from about the time Bill Gates was buying an operating system from some poor guy in Washington State, and Steve Jobs was phone phreaking; There is just not much that escapes me.

 

I was doing some consulting for a company that was simply put together with bailing wire and scotch tape.  They had a huge pipe to the internet and were getting a dribble through by the time it hit the desktop.

 

Loading WireShark (a free protocol analyzer) examining the broadcast packets it was easy to see why.  The OS was literally working with NetBIOS to route packets.

 

A quick examination of the “server room” found the switches all tied together with Fiber and, patch cords going from one switch to another causing untold amount of routing loops etc. While the picture above is a stock photo the room in question looked very much like this.

 

My job however was not to fix their networking issues as this was the task of the guy I was “helping.”  He was the System Administrator.  I sent e-mails to him alerting him to my findings so he could take the appropriate steps, which for some reason he discounted and did not do.

 Image

The weeks went on and the problems persisted several times a day where people were kicked off of the network or files were corrupt or lost etc.  His response/fix was to release and renew the IP address.  Putting one band aid on the problem day after day I guess gave him a sense of accomplishment but the problems were looming and like the 500 pound gorilla in the closet, soon to get out.

 

One of the things that I learned many years ago is to work with VARS.  Value added resellers have years of experience to draw upon.  They know which products are buggy and to stay away from and which are tried and true.  If you are a business don’t try and save money via internet stores as you will get what others can’t sell for one reason or another.  They are on sale for a reason…

 

When I asked him for his vendor contact list to include in his DR plan, there were no VARS on the list.  Everything was from internet companies or local retail locations.  He in fact had no fallback plan if the $hit hit the fan.

 Image

The hardware purchased looked as much.  There were no standards anywhere.  There were high end SANS tied to cheap switches.  The workstation of choice was whatever he got a good deal on making mass deployment of anything just about impossible.  Hardware was way past its lifecycle and the list just went on.  Because of his pride; he was not willing to listen to anyone regarding anything IT.  If he does not change it will be his undoing.

 

This is not my first rodeo and certainly not my first encounter with arrogance.  As a manager I can deal with it, as a consultant one must work around it and if it becomes too big of an impediment, bow out.  There is no reason to sully your name with a situation like this when the outcome will likely somehow be your fault.  

 

Always hire people smarter than you are and have the humility to acknowledge that you are not the end all be all.  There is simply too much information out there to know it all.  Wisdom is; knowing that you need help and to leverage VARS and consultants is simply smart.

 

-Best to you and those that you care about!

The case of the password vs insanity.

Image

 

We have all heard that the definition of insanity is: doing the same thing over and over again expecting different results.  This was not lost on me when recently my password on my home PC was no longer accepted.

Imagine logging in to your own PC, that no one else touches, and the password no longer works.

I cannot tell you how many times that I tried the password that I know that it is supposed to be, and then doubting my sanity, trying every other password that it might be “just in case I changed it” without remembering I did. 

Image

The only reason there was a smidgeon of a doubt is that recently Yahoo forced me to change my password.  They would accept nothing less than a strong password which by the way is so strong that I have trouble typing it while looking at it, and there is not a chance of remembering it.

No longer are the days of the family pet or address or birthday acceptable as passwords.  Imagine having to type a password like this T4^s#hg^9? every time you logged on to your computer!

While the home PC’s password was not quite this strong, there is more than room for error.  This led to a rather frustrating afternoon as one might guess.

The trouble shooting process was difficult as Windows allows little room for error and certainly not much for diagnostics.  My first guess was the keyboard had to be messing up in some way so I changed the batteries.  When that did not bear fruit I hooked up a hard wired keyboard to the USB port and still nothing.  “Incorrect login name or password.” 

Image

Google produced nothing relevant other than an ad for some company that sells some software to recover your password.  Microsoft was no help.  If I were in a decision making role at Microsoft I would make some sort of option on the login screen that would allow for one to make certain that their keyboard is typing the correct letter and that the caps is on or off.  Wireless keyboards don’t have any LED on them to tell you about “num lock” or shift lock and , the screen was not giving me any hint of this either although it normally would.

Windows 7 offers a way to reset the password, but you have to plan for it first and oh yes, it requires the “A drive, a floppy.”  This too needs to be re-thought as few computers today have a floppy drive.

Image

Somewhere in the process of trying to boot into safe mode I get an error that says “keyboard failure.”

At this point I try the wired keyboard into several different USB ports with the same results.  I then installed a usb card thinking that maybe that would work, nope same results.

I could do things in Bios but not in Windows.  The thing that would have helped is a way to check the keyboard, in Bios.  My guess is that Bios is not as picky about what it sees from the keyboard and since you are only using limited keyboard functions, curser movements, enter and tab, one would not have guessed that the USB was having issues.

I just happen to own another machine of identical configuration, so a swap of the hardrive to the other machine rendered a machine that worked with my password that worked all along.

I can only conclude that there is an issue with the USB controller on the motherboard.

I am considering clearing out the Bios on the old board and trying a re-install of the software just to see if that fixes it.  There may also be some sort of update from Dell for that Bios.

For you hardware junkies out there, this is probably standard fare.  While I could have purchased a new machine for the $$ wasted in time to diagnose this, I have a new found empathy towards those who just use the machine and have no clue how it works.

Can you imagine Joe Q User out there that really looks for the “any key” having an issue like this?Image

If I was frustrated (and I have been at this when DOS 1 was new,) I cannot even fathom what something like this would be like for others who have less experience than I.

I hope that this helps someone somewhere possibly saving some time and frustration as this type of bugaboo should not happen.

Image

 

Best to you and those that you care about!