21
Sat, Dec
3 New Articles

Losing It

Commentary
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

I peruse the online editions of many general and IT-specific news media, not to mention hardcopy editions of my regular newspaper, The Globe and Mail, and a weekly news magazine, The Economist, to try to come up with proper topics for this space. (I'd much rather use improper topics, but MC Press won't let me.) On September 22, 2006, a number of the online sources ran a story about 1,137 laptop computers that had gone missing at the U.S. Department of Commerce over the years since 2001.

With so many different media outlets reporting the same story, I knew there had to be a press release involved, so I went to the Department of Commerce's Web site. I was right. According to its September 21 release, "The Department of Commerce today announced information from its recent Department-wide reviews of missing, lost or stolen laptops ..." I guess I've been writing for too long because the first thing that came to mind was, "missing, lost or stolen?" Wouldn't "missing or stolen" or "lost or stolen" suffice? The difference between "lost" and "missing" escapes me. At best, it's a rather fine line.

Mental editing is an occupational hazard. I probably shouldn't mention it at all because I'm much better at catching superfluous words in other people's writing than in mine, so you'll likely find an overabundant plethora of instances in my prose, but never mind because that has absolutely nothing to do with what I want to talk about this week.

The press release went on to say, "Based on the review in response to the public inquiry, the Department determined that within its 15 operating units for the years 2001 to the present, out of over 30,000 laptops within the Department's inventory over that time period, 1,138* were either lost, stolen or missing." There's that "lost, stolen or missing" a second time. I guess once wasn't enough for them. And we'll ignore some of the punctuation and other issues I have with that sentence.

What's with the asterisk? It refers to a footnote in the release that says simply, "Due to an editing error, the correct number should be 1,138, not 1,137." Huh? The press release never mentions that the wrong number had been released earlier, so someone reading the new release without seeing the articles written using the incorrect release would likely be rather confused, but that's not what bemused me. "Due to an editing error, the correct number should be ..." How can an editing error cause the number of missing computers to increase by one? Don't tell me that someone lost another laptop while editing the press release. Exactly how could that happen? Did overly energetic editing cause it to fly out from under the editor's fingers and into outer space? I think what the editor or writer meant to say was not that the correct number is something different due to an editing error, but rather that due to an editing error the incorrect number was reported previously. However, again, never mind; that's the writer in me talking, and it still has nothing to do with what I want to rant about.

Much more important than the wording of the press release is the fact that the computers were lost or stolen, but the aspect I want to try to understand first is why the Department didn't know about those missing laptops until a public inquiry forced it to do a review. That doesn't seem possible to me. What's particularly surprising is the fact more than half, 672, of the missing computers were from the Census Bureau. How could they lose that many computers and not know about it fairly quickly? Excuse me if I'm wrong about this, but isn't the Census Bureau supposed to be rather skilled at counting things? Its excuse was that "during the last five years [it] has used over 20,000 laptops." Oh, well, that's OK then. After all, it lost only 3.36% or so of its computers. I guess that means that if we lose track of 3.36% of our income when we send in our taxes, the IRS or, in my case, the Canada Revenue Agency, won't mind, right? (Author's note: I bear no responsibility for any jail time you may serve as a result of following this advice.)

What's disturbing is that those lost computers weren't empty. According to the press release, "249 contained personally identifiable information." But don't worry your pretty little head about that because "access passwords, complex database software, systemic safeguards and/or encryption technology significantly limit the potential for misuse of data on the laptops." Significantly limit the potential—doesn't that just give you a warm, fuzzy feeling about your private data? Hey, I've got a better idea. Why don't they try a little harder to not lose the computers in the first place?

Oh, wait. Maybe that data protection was not as complete as first claimed. The release goes on to state that, of the 246 Census Bureau laptop computers that contained some degree of personal data, 139 were either only partially encrypted or had no encryption. Huh? What were all those comforting words about data protection earlier in the press release all about? More than half of the missing computers with personally identifiable data on them were either not fully protected or not protected at all. Are you feeling lucky?

Here's the thing that I really don't understand. Even in a department where the counting skills might not be the keenest, let alone in the Census Bureau, how could it lose that many computers and not realize it for the few years that passed until someone from the public asked the department to check?

I can't get the following scene out of my head. Bert, a government manager, sticks his head out of his office, sees his shadow, darts back into his hole, and hibernates for six more weeks. Then, after again poking his head out, he says, "Cynthia, would you step into my office for a minute?"

A startled Cynthia wakes up, walks into Bert's office, sits down, and resists the urge to nap. Bert says, "I'm a bit confused." Bert doesn't notice the smirk on Cynthia's face and continues. "I have here your request to buy a replacement cutting board for your office. Why do you need a cutting board at all, let alone a replacement?"

"You wouldn't approve my requisition for a television for my cubicle," responds Cynthia. "I hate missing my soaps, so I'm going to spend my own money to buy a TV and install it above my desk, but I can't afford it right now. I'd want one of those big plasma screens. To save money, I've started bringing my lunch rather than going to the cafeteria. I prefer to cut my sandwiches in half before eating them, and I don't want to risk damaging my desk. The problem occurred when I was slicing an exceptionally crusty sandwich. I brought the knife down so hard that my old government-supplied cutting board broke in two. That would have nicked my desk quite badly if I hadn't been using the board, so I need a new one to continue shielding my desk. I'm very careful about safeguarding government assets. That's just the way I am."

"Did you ever consider cutting your sandwiches at home and bringing them in pre-sliced?"

"What a great idea! I never thought of that. I guess that's why you're the boss."

"Well, never mind. What perplexes me is that I've never authorized the purchase of a cutting board before, and I've never seen one around the office. What does it look like?"

"It's black, about 13 inches wide, 10 inches deep, and an inch or two thick. The really cool part is I can swivel it open. Inside, there's a keyboard and a screen that I can use to calculate the calories in my lunch. It's got the word 'ThinkPad' on it, whatever that means. One of my coworkers called it a laptop, but I couldn't understand why. I certainly wouldn't want to cut my sandwiches on my lap. That would be dangerous even with a cutting board."

"You should have reported your coworker immediately and, by rights, I should reprimand you. Section 789, paragraph 42 of the department's sexual harassment directive expressly forbids the workplace use of the word 'lap' or any derivative due to the possible sexual overtones. Against my better judgment, I'll let it go this time.

"Getting back to the matter at hand—sorry, Section 742, paragraph 23 forbids the use of the word 'hand' coupled in the same sentence with any other body part, such as 'back,' even when, in context, the word is not intended to mean a body part. I guess we're even. What I meant to say was, returning to what we were discussing, I can't authorize a replacement cutting board. What I'll do instead is approve the purchase of a television for your cubicle so you won't have to buy your own and you can afford to go out for lunch again. How would that be?"

Cynthia leaves smiling. Pleased with how well he dealt with what could have been a very sticky human resources issue, Bert decides to tackle another problem before taking his afternoon nap. He asks Simon, another of his subordinates, to come in.

"Simon," Bert begins, "I've been checking the records, and I noticed that you haven't sent me a single report, memo, or email for...let me see..." Bert looks through the many tall stacks of paper on his desk and comes up with an answer. "Yes, here it is. Eight months, seven days, four hours, and (looking at his watch) 23 minutes. I'm sure you're aware that the standard for employees in my department is a daily minimum of 14.27 pages of paper, or the electronic equivalent, averaged over a five-day workweek. Why haven't you submitted anything in more than eight months?"

"I lost my computer."

"You lost your computer? Good God, Simon, why didn't you report it to anyone in all this time?"

"I use a computer only to create paperwork and nobody ever reads it anyway."

"Well of course nobody reads it! Don't be silly! I have a human resources budget for paperwork creators, not paperwork readers. Plus, I have funds for new disk drives and filing cabinets every year. If I don't fill them, the powers-that-be will cut the department's budget next year. We wouldn't want that, now would we? I'll get you a new computer, but I have just one question: What have you been doing all this time?"

"You'll be very pleased with me, Bert. I haven't wasted my time at all. Not one little bit. I've been doing an inventory of office supplies. So far, I've only been able to check a couple of items, but did you know that we have 1,732,342 paper clips, divided among 239,978 boxes? What I found particularly shocking is that there are 37 unaccounted for—37 paperclips that is, not boxes. I think we have to face up to the fact that someone in the office is stealing paperclips. I've lost all faith in humanity because of this."

Simon pauses, stares at the ceiling and, after a few minutes, looks back at Bert and resumes talking. "Sorry to leave you hanging there, Bert, but I have this weird feeling that there's something else I meant to tell you that's slipped my mind for the moment...what was it?...it must have been trivial...oh yeah, I remember now. There are also 1,138 computers that have vanished, disappeared, or gone astray or that have been lost, misplaced, mislaid, stolen, pilfered, purloined, thieved, or abducted by aliens."

Bert, losing his temper for the first time in his career, screams, "That's appalling! I can't believe it! Thirty-seven paperclips, you say? You realize we're going to have to call in the police, don't you?"

Obviously, I don't believe that scenario is particularly plausible, so I was at a loss to come up with an explanation for how that many laptops could go missing. Then I found it. I went back to the Department of Commerce Web site and looked at the mission statement posted there. One of the eight elements in the Department's mission is "Ensuring effective use and growth of the Nation's scientific and technical resources." So that's it. If you lose 1,138 computers, you have to replace 1,138 computers, and that will help to ensure the effective growth, if not use, of the nation's technical resources. Case closed.

Joel Klebanoff is a consultant, a writer, and president of Klebanoff Associates, Inc., a Toronto, Canada-based marketing communications firm. He is also the author of BYTE-ing Satire, a compilation of a year's worth of his columns. Joel has 25 years experience working in IT, first as a programmer/analyst and then as a marketer. He holds a Bachelor of Science in computer science and an MBA, both from the University of Toronto. Contact Joel at This email address is being protected from spambots. You need JavaScript enabled to view it.. To date, he has never lost his computer, although he has frequently regretted that fact.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: