IT contractor has a challenge to improve some device for a shopper — and the challenge is manner in the back of time table, says a pilot fish on the consumer aspect.
And why is that any such downside? “The existing product goes End-of-Life soon, at which time it will no longer be an approved product for us,” fish explains.
“The contractor’s other people are available and pitch their time table to higher control. In the briefing, they carry up the proven fact that the new product is no longer even authorized to be on our extremely secured community, and they’ve no longer even began on getting it authorized.
“Essentially, if they’ve to get it authorized, they are able to by no means get it deployed on time.
“My corporate’s control makes transparent it is no longer proud of violating security protocols simply because the contractor is in the back of time table.
“Then the contractor’s senior supervisor tries to spin it: The most effective reason why we’d like the new one is that the previous one will quickly be unauthorized after End-of-Life.
“And since the old one will not be allowed without being authorized after End-of-Life, it should be OK to deploy the new one without being authorized.”
Sharky is approved to report off the figuring out marks out of your true story of IT lifestyles. So ship me your tale at email@example.com. You too can touch upon as of late’s story at Sharky’s Google+ group, and skim 1000’s of serious previous stories in the Sharkives.
Get Sharky’s outtakes from the IT Theater of the Absurd delivered immediately to your Inbox. Subscribe now to the Daily Shark Newsletter.