[identity profile] phrogg.livejournal.com posting in [community profile] techrecovery
[livejournal.com profile] inahandbasket's ordeal reminded me of an issue i wrapped up myself not too long ago.

The sysadmin team manages the addition of computers to the network in my organization, but due to the size and various sites we work at, they delegate the actual work to the on-site techs - in this case, me.

I add the machine to the domain, they put it in a local-only subnet so i can get to the software i need to prep it for use (on a network share). After that, they run a scan to make sure there's no bad software/vulnerabilities, then move it to the full-access net...sounds pretty simple, right? Riiiiiight. Here's a typical exchange with these people:

Keep in mind that this all takes place via email, "so they can keep track of the process"...Also keep in mind that, with the exception of the final bit (they finally got it RIGHT instead), this is NOT AN EXAGGERATION. This is a paraphrase of the email chain from the most recent computer i put on the network.

ME: "Okay, i need to add [computername] to the domain so i can load it for [sitename]."
SA:"Okay, it's ready."
ME:"You forgot to give me permissions."
SA:"Whoops, sorry. Try again."
ME: "Thanks. Software load is complete. Ready for scanning."
SA: "I need the computer name."
ME: "I provided that in the initial email, but here it is again: [computername]."
SA: "Thanks. [computername] scanned clean."
ME: "Uh...can you move it to the full-access net for me?"
SA: "Okay. Where are you?"
ME: "I already sent this before, but [sitename and computername]"
SA: "Okay. I can't scan this computer for some reason."
ME: "IT'S ALREADY BEEN SCANNED!!!"
SA: "Oh. Who scanned it and when?"
ME: "YOU GUYS did. TWO DAYS AGO!!"
SA: "Oh, right, sorry. Where are you loca-- *sound of gunshots, and a blurb in the next edition of the newspaper about how Phrogg has been charged with multiple homicides, after being found at the crime scene, huddled in a corner and muttering, 'the stupid must be stopped!'*

I swear, if i ran this place, there would have to be certain minimum criteria for employment...like competence, for one.

Date: 2007-07-12 03:22 am (UTC)
From: [identity profile] karopanda.livejournal.com
Ahaha, I love it when things are "kept track of" by email...and yet somehow no one actually bothers to read the damn things. I have the same problem with the people in charge of network security at my uni :/

Me: "Hi, someone got banned for a violation that occurred before their computer was registered on the network, and it was never registered under someone else. The mac address is [insertsexyhexyhere], host name is [fwee] and the notification for the violation is [numbers here]"
Angry Superior Person: "I don't see any relevant information in the service request to know which machine it is. Please include all the necessary information before sending it up to us."

...Yeah... My school registers everything by mac addy's, and the person's user ID is all over the request, and they couldn't have possibly found out I wanted them to DO anything without seeing riiiight where the mac addy was.

Seriously though. No more email. I say you get their cell numbers and say, "Hey baby, you wanna hook such-and-such up to the interwebz? They'll love you long, long time." If nothing else, it'd be worth it to say "the interwebz".

Profile

techrecovery: (Default)
Elitist Computer Nerd Posse

April 2017

S M T W T F S
      1
2345678
91011121314 15
16171819202122
23242526272829
30      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Mar. 21st, 2026 03:00 am
Powered by Dreamwidth Studios