Some IT guy, IDK.

  • 1 Post
  • 74 Comments
Joined 1 year ago
cake
Cake day: June 5th, 2023

help-circle
  • I feel like the executives are all in this “AI” echo chamber. Like, most people grossly misunderstand what AI is, what it does and what it cannot do, with current tech… And all the execs are sitting around in a circle jerk making up solutions using AI, for which there is no problem to solve.

    Don’t get me wrong, some companies are doing cool shit with it. Not necessarily practical shit, but cool nonetheless, other companies just seem to be drinking the AI Kool aid and throwing it at fucking everything for no goddamned reason just to get in on the hype. Investors are close behind, trying to ride the coattails of their “success” to riches, and it’s all just a self-reaffirming system with no basis in reality.

    Nvidia is the one profiting here, all this AI smoke and mirrors needs something for it to run on top of, they’re selling the physical tools to make it go. Whether it goes somewhere useful or drives off a goddamned cliff, doesn’t matter to Nvidia in the slightest. They made their money. Get wrecked.


  • Legally, it’s fully owned by the company.

    My current workplace uses mostly cloud desktops. Basically, even if you’re using a personal system, you install a remote desktop client software (it provides access to another system, it does not allow access to your system), which is used to connect to a server farm of virtual desktop servers. So the work desktop you use kind of overlays itself on your system. Your system is still there, humming away in the background, with it’s only task being to shuffle your input up to the cloud, and bring down the images of your cloud desktop and display them.

    There’s some other features, but that’s the core of it. We use a third party “remote monitoring and management” (RMM) tool to administrate company owned systems. You are perfectly capable of using the remote desktop client on a system that’s not company owned. I like this model, since you can minimize or close the remote desktop at any time, and since we (the IT team) have full access to the remote desktop server farm, we can connect to your remote desktop session and see what you see, but only what’s within the remote window. We can’t escape it to see your computer. So if you have a problem with your work stuff, we have access to that. If you have a problem with your personal computer, we need to use a one-time-use (or ad-hoc) remote connection software like LogMeIn or something similar (specifically the LMI rescue type feature set). Once we disconnect from your personal system after doing whatever troubleshooting you asked for, we lose access to that system.

    The programs change, but they do the same thing in concept. There are a number of company owned laptops and desktops we have our RMM tools on which allow us to dive into a system whenever we want.

    I run a homelab, personally, and when my workplace does not give me the necessary stuff to be productive from home, what I do is build a small virtual system on my home lab, which I remote into when I work (from my desktop), so I can maintain a work/personal division. It’s similar to the cloud system I’m doing at my current job, but the “remote” desktop is a VM on a server in my basement. Other times I’ve been given a laptop, and I’ll set it up in a corner and turn on its built in remote desktop service (to allow remote desktop connections into it), then use the same protocols to connect to my work laptop.

    When I’m done work, I just shut down the remote desktop connection and poof, back to my stuff on my PC.

    With my current job I went another way, I got a KVM switch, which allows me to switch between two physical computers at the push of a button. (KVM is keyboard/video/mouse) When I’m done work now, I push a button and my screens (I have several) and KB/mouse all switch back to my personal desktop. Same idea but different.

    I couldn’t imagine using my personal computer to do work stuff directly. That’s just not kosher in my mind. I have work’s RMM and tools all installed on the system I use for work, and my personal system is entirely free of such things.

    I also want to include a short story. Recently a client started a ticket about our company logo being on their personal computer. I grabbed that ticket up and immediately identified the system, and removed it from our system. I followed up with the user to verify that by removing it from our system, the icon disappeared (indicating our monitor agent was fully uninstalled), they confirmed, and I closed the ticket. I kept thinking it’s grossly inappropriate for our software to be on their personal system, and I wanted to get it fixed ASAP. Not everyone is the same, I’ve known users that want or e remote management tools on their personal systems. I don’t understand it, but I can’t tell them that it can’t be there either (the customer is always right, applies in this context).

    As I hope I’ve demonstrated, neither myself, nor anyone I work with, nor anyone I’ve worked with in the past, would ever take such an opportunity to snoop or spy on them, but I’d rather not have that liability hanging over my company. All it takes is for one person to have the software on there and accuse us of stealing their private data (say, leud pictures) and publically posting that information on the internet, and I’m sure the policy would change. Of course, we wouldn’t do that, but all it would take is the accusation.

    It’s a bad day for us when we see something we shouldn’t, especially if upon seeing it, we’re morally obligated to contact the authorities (in the case of illegal content such as child porn). If course, if something like that is observed by a tech, we must do something about it, but we don’t want to have to get involved in that sort of thing, so we’re pretty careful about it. To put it simply, we’re not looking for anything, and we don’t want to snoop through your stuff, because if we do and we find something we shouldn’t, there’s going to be hell to pay. Not only in the fact that now we need to report it to the police, but also that we need to be able to justify why we were able to see it in the first place. If we can’t justify why we were looking at the content, that’s probably grounds for termination and getting blacklisted from IT, even if it had a positive result (like a pedo being sent to jail).

    Bluntly, it’s not worth the risk, paperwork, or inevitable trouble that we’ll face if we do.

    Keeping a good separation between personal and work minimizes the risk of IT seeing something that shouldn’t, even if it’s not illegal/illicit. Even your personal financial information. I don’t want to know. I had a call recently with a user who couldn’t log into their bank, and through testing, I was on the lookout for errors while they logged in. As soon as login was successful and their accounts were up, I minimized my remote control so I didn’t see more than I absolutely had to, of their bank info. I got them into the accounts. I don’t care what the accounts are, or what is in them. It seems minor, but that is that users personal information which I do not need to know. I solved their login problem with the site, so I’m done.

    I probably have a hundred of other examples, even some where my co-workers had to contact authorities, I’m pretty sure… Every decent IT tech knows that this is a risk and we do what we can to avoid getting caught up in it. We don’t want to have to answer those questions.

    If you ever have IT connect to your computer and your background goes black, there’s a reason. At first it was bandwidth related, and we’ll still say that as the reason, but a large reason why we still do it, even into an age of high speed internet, is because a lot of people put pictures of their family, friends, sometimes even inappropriate content, as their desktop wallpaper. It’s hard to miss when it’s your wallpaper. So if it’s blacked out when we connect, that’s one less possible problem we have to deal with.

    I’ll stop, but if you have questions for a random internet IT guy, please feel free to ask.

    Take care.


  • There’s a lot of trust required in IT. You must be a trustworthy person. Being fired for a trust related reason is basically a death sentence for an IT career. That being said, none of the tools I typically work with will provide previews of a user’s screen, or such previews will be low enough resolution that reading what is on screen is basically impossible.

    When we connect to a system and get a full resolution image of what’s going on, pretty much always there’s some on screen indication of us being connected.

    IMO, this is how it should be.

    The only time I’ve actively tried to “spy” on a user’s activity, has been when requested to do so by a manager/owner, usually when pursuing an allegation of inappropriate use of a work computer. Even then it’s been very rare, and I can only recall one such instance of it happening at all.

    As an IT person, I will say, I could care less what you do with the equipment. I’m busy enough, I don’t need to fill my day with watching you do your job. Yes, we have tools which can allow us to eavesdrop on everything you do, I don’t touch them unless I absolutely must, usually only if I’ve been ordered to.

    Another poster pointed out that work resources do not belong to you and legally, they’re right. The system, including all data and work contained therein is legally the property of your employer. This includes your email and any correspondence, and anything else that work provides as a function of your employment. If you create an excel work sheet that does some data processing for you, or reformats information in a better way, during work hours, that sheet isn’t yours. The ownership of the sheet is your employer. Though you did the work in creating it, your employer owns it because they paid you for the time/effort to do so.

    Personally, I do whatever I can to avoid interacting with users unique files. I recently refused to work on someone’s personal iPhone because it contained personal data. Though their work email was probably present on the device, I didn’t want to touch it. I did however, provide instructions for them to do what they were asking themselves.

    When interacting with work-owned systems, I’ll modify the registry, and run command line commands without the users knowledge, in an effort to reduce the disruption to their workflow, while solving an issue. Generally this is when I have a request from that user, or the company, to get something done, such as install a piece of software. You’ll be working away and poof, new software appears.

    Anyone in IT unnecessarily snooping in on your files, can be fired with cause, ruining their career, if they’re caught.

    We have access to everything, and I mean everything, in an organization. Your email, files, databases, software… Partly for troubleshooting, and partly for performing backups. If we don’t directly have access, typically we have permission to grant access, so we can grant ourselves permission to access whatever we need to. This means that IT is one of the highest trust areas of the business. We can read the CEO’s emails, send mail as anyone, access everyone’s files, and delete all data on everything in such a way that it is impossible to recover. We need the access to do our jobs and violating the trust we have with that access, is unforgivable and a career-ending event.

    I will say that I have not met any IT professionals who will snoop, spy, eavesdrop, or otherwise examine what you do or what data you have or interact with, without a good reason. If it happens, it’s likely that someone else, such as a manager, has requested that we do. We are merely the middleman in that scenario. Bluntly, we’re too busy than to just do it for kicks.

    If any IT professional has violated trust, I would report it to management. It is grossly inappropriate to access a user’s system without just cause.

    As for notifications, that varies depending on the request. I typically only inform people when I need to remotely control their desktop (interrupting their work) and I’m generally very receptive to being asked to wait before connecting so any sensitive information can be dealt with and closed before the session is established. I have no issue with that. I don’t need, nor want to know any more than I do. I’m never looking for illicit or illegal things unless they are creating a problem (excessive bandwidth use, excessive disk use, etc). For the most part, I try to stay in my lane. I’m here to help, not spy on you to get you fired.


  • For me, working in IT, two things are keeping me on Windows:

    • games
    • IT tools only made for Windows.

    Most remote access stuff is entirely Windows based. Sure, there’s clients so you can connect to Linux, Mac, whatever, from the admin console, but the plugins and whatnot that actually show you the remote users desktop are almost entirely Windows exclusive. There’s sometimes a Mac option, but almost never a Linux option.

    Using something that’s more common/public, like TeamViewer isn’t really an option. There’s a plethora of business focused RMM tools that are just web apps with Windows plugins for all the heavy lifting.

    The part that gets me, is that any of these tools which allow for self hosting, can have the server and client side on Linux, but the IT team doing the work only gets Windows as an option for the remote control tools.

    Infuriating.











  • I think the part that bothers me the most is that, the customer is likely completely oblivious to the fact that a repair person used a third party part in their device.

    I don’t think most cellphone users are discerning enough to start checking if the repair place is actually licensed by Samsung to perform repairs or not. They just see the Samsung logo under the banner of “we fix these brands” and go in. As long as it’s fully working when they walk out, they couldn’t possibly give fewer shits whether genuine Samsung parts were used to fix the device.

    This is essentially victim blaming. Anyone who can fix the phone themselves with non-Samsung parts is going to do it themselves and never get “caught” doing it. So instead of “catching” the “bad actors” putting non Samsung parts into phones, they’re putting that responsibility on customers? That’s a PR nightmare. What the fuck are they thinking?


  • I want to say up front that, I don’t feel any sympathy for the company, nor do I have any love for the ewaste they created.

    That being said, it’s a decent idea, and I would have liked to see where it went. Their implementation was completely wrong on do many points, but it was still a half decent idea. Basically having what Google assistant should have been, pinned to your chest like a comm badge sounds pretty cool. The laser projector for your hand was interesting, but very hokey, the data communication was poorly thought out, far too slow to be useful, the design wasn’t the worst, but still not great. The battery life was questionable at best…

    But the concept of what it was supposed to be able to do, was not terrible. Possibly the last terrible part of the product.

    Personally, I want a personal assistant. Since I’m not rich, I can’t exactly hire one. Having an AI assistant, that you talk to through a communications badge seems like a decent idea. I’d want it to basically run from my phone, mostly local to my phone, so my data isn’t pushed everywhere, but the tech isn’t quite there yet. Not enough TOPS, not enough memory, not enough storage for all the models; and certainly not enough battery to power AI running on your phone.

    I can see what they were going for but they fell so far short of the goal that it’s not really visible in what was delivered.

    I imagine the pitch meeting about this being something along the lines of a guy rushing in after watching Star Trek discovery, when they got the holographic comm badges, and going, I want to make that! With the Zora AI and everything! And then people jumping on the bandwagon, knowing full well that they’re not even going to come close.

    I hope everyone that works there gets new jobs in sectors that aren’t using AI as a parlor trick or buzzword to try to move units.

    Good bye, company I don’t care enough to remember the name of. We hardly knew you, and even that was probably too much interaction.



  • And planned obsolescence isn’t a waste of resources? We are basically forced to toss away fully working phones after 3-4 years because the batteries can’t be swapped. You have to take it to some shop you’ve never been to, and have them take it apart in a specific way, in order to get a new battery. Usually the cost isn’t worth it and for a little more you can get a brand new device… The sales people always push you that way regardless.

    So having the option of a feature phone when the forced upgrade inevitably happens, wouldn’t that be better than forcing people to buy an over powered phone with more capabilities than they want?

    I’m not saying someone should take their perfectly working iPhone 12 and toss it in the trash for a feature phone just because.

    This argument is invalid.