An arc welder in the datacenter: what could possibly go wrong?
A former IBM engineer fixed a cracked metal frame on a stock exchange's printer in the 1960s. A later inexperienced repair attempt caused chaos, emphasizing the need for expertise in critical system maintenance.
Read original articleIn a story shared on The Register's "Who, Me?" segment, a former IBM customer engineer named Andrew recounted an incident from the 1960s and 1970s involving a stock exchange client with a cracked metal frame on a high-speed impact printer. Andrew, skilled in arc welding due to his family's metalwork business background, was called in to fix the frame. Years later, another IBM employee attempted a similar repair without experience, causing chaos by triggering fire alarms, shutting down critical systems, and evacuating IT staff during business hours. Despite following some of Andrew's process, the inexperienced employee's oversight led to an expensive unplanned break for the stock exchange. The blame was unfairly placed on Andrew, who had left the welding equipment onsite. This incident highlights the importance of expertise and caution when handling critical systems in sensitive environments.
Related
Agilent 2000a / 3000a Oscilloscope NAND Recovery
Anthony Kouttron salvaged a damaged Agilent oscilloscope, addressing physical and boot issues. He repaired an encoder, fixed cosmetic damages, and explored internal components, demonstrating technical prowess and troubleshooting skills.
Engineer insists Post Office software did a 'good job'
Former Fujitsu engineer Gareth Jenkins defended Horizon IT system's performance amid Post Office scandal. Testimony contradicts system's reliability, sparking controversy and raising questions about sub-postmasters' convictions. Ongoing investigations and public scrutiny ensue.
Ex-Fujitsu engineer admits changing court testimony at request of Post Office
Former Fujitsu engineer Gareth Jenkins admitted altering court testimony for Post Office in Horizon scandal. Jenkins, key in Horizon system design, faces inquiry for perjury. Testimony reveals manipulation of evidence.
For the record: You just ordered me to cause a expensive outage
An electrical engineer faced consequences after removing crucial wiring despite warnings, leading to financial losses. The incident underscores challenges techies encounter with unreasonable demands and poor management.
Below MI – IBM I for Hackers
IBM i system offers full control over hardware and software, utilizing Machine Interface for abstract development and memory safety. It operates on POWER CPU with 64-bit big-endian architecture, featuring unique security levels and Single-Level Storage for memory management. Control flow is managed through register conventions and stack operations. The system lacks memory safety, allowing out-of-bounds memory access. Security levels range from no security to C2 level, with Security Level 40 recommended. The writeup delves into memory management, control flow, and security mechanisms for evaluating memory safety and exploitation.
I had a lot of fun putting bigger motors on motorcycles with it, though.
It will be painful and untreatable as you die over a few days.
More information:
Related
Agilent 2000a / 3000a Oscilloscope NAND Recovery
Anthony Kouttron salvaged a damaged Agilent oscilloscope, addressing physical and boot issues. He repaired an encoder, fixed cosmetic damages, and explored internal components, demonstrating technical prowess and troubleshooting skills.
Engineer insists Post Office software did a 'good job'
Former Fujitsu engineer Gareth Jenkins defended Horizon IT system's performance amid Post Office scandal. Testimony contradicts system's reliability, sparking controversy and raising questions about sub-postmasters' convictions. Ongoing investigations and public scrutiny ensue.
Ex-Fujitsu engineer admits changing court testimony at request of Post Office
Former Fujitsu engineer Gareth Jenkins admitted altering court testimony for Post Office in Horizon scandal. Jenkins, key in Horizon system design, faces inquiry for perjury. Testimony reveals manipulation of evidence.
For the record: You just ordered me to cause a expensive outage
An electrical engineer faced consequences after removing crucial wiring despite warnings, leading to financial losses. The incident underscores challenges techies encounter with unreasonable demands and poor management.
Below MI – IBM I for Hackers
IBM i system offers full control over hardware and software, utilizing Machine Interface for abstract development and memory safety. It operates on POWER CPU with 64-bit big-endian architecture, featuring unique security levels and Single-Level Storage for memory management. Control flow is managed through register conventions and stack operations. The system lacks memory safety, allowing out-of-bounds memory access. Security levels range from no security to C2 level, with Security Level 40 recommended. The writeup delves into memory management, control flow, and security mechanisms for evaluating memory safety and exploitation.