Skip to main content

IT Superstition: Faith Healing and Information Technology



Perhaps the largest portion of any entry level IT work is solving problems not that people are unable to solve, but simply unwilling to try. This can be for fear, fear of harming their own equipment, fear of the complexity which IT work may entail, or lack of time to solve them. These problems are frequently problems the domain of which we are unfamiliar with - Things like how do I install the dictionary app on my blackberry, or How do I use my Samsung smart television. These user level tasks are designed by the producers of the domain - Application, Operating System, Hardware Device, website - to be discover-able by a competent user without to much fanfare - though there design is frequently imperfect , but as an IT, our familiarity with various other similar domains and the nomenclature of the domain enables us to solve these problems quicker than the user.

Other problems can be more complex - actual problems. Requests like “my favorite but obscure application gives error 12. Your familiar with this of course.” But of course, requests like these betray a fundamental lack of understanding of Information Technology. There is, of course, not an absolute error space of which “error 12” is commonly intelligible. There are millions of applications, and IT technicians cannot be familiar with even the most minute fraction of the application space. Here, we are forced to resort to a series of faith healer methods - there is little instrumentation available to actually understand what causes the problem in most cases. We are now speculating on the behavior of a computational process - a program - and have a complex heuristics based intuition that can sometimes result in a solved problem. With a debugger and symbols, or even more minor instrumentation like a **trace for windows, we could instrument the program, and understand the problem, but these tools are largely not in use by technicians.

This is still good news. This is is a simple case because of the the binary nature of the problem - either we fixed error 12 or we didn’t. We get immediate feedback on our handed down lore, our huertistic solution was or wasn’t effective. Ultimately, these kinds of problems are solvable, even if it means redeploying the application in a new OS install with new data.

But, there exists a large class of open ended problems where the faith healing methodology really becomes apparent. These problems sound like “My computer is slow”. Basic instrumentation for this problem exists - task manager, performance monitor - but these tools provide only an instantaneous snapshot tested in a context outside the users normal usage. While toolsets exist for more advanced instrumentation - Windows Performance Toolkit - in entry level IT these tools are largely not in use.

Instead a long check list of fixes perhaps related to the problem is applied. Things we swear are beneficial - even needed on some recurring schedule - things like defragmentation (on mechanical disks), virus scans, applying updates, OS integrity scans (SFC, DISM), start-up item checks, applying updates, which may or may not address the issue. Its a testament to underlying design flaws that such a faith healing methodology - applying a series of fixes that are not clearly causally related to an observable problem - actually works at all; Apparently, the same series of common problems occur again and again. Trying to explain to a customer casually why this elaborate ritual resulted in some their open ended problem being resolved can be impossible because the IT simple doesn’t know.

Techs frequently leverage conventions in combination with the series of generalized principals that make up our intuition to troubleshoot problems. For instance, we can frequently reset the user state of an application by finding its datafiles and removing them. These datafiles are often stored on the Windows Platform in the Application Data folder of the user profile, on the **nix platform in various dot directories.

Of course, programs are , usually, relatively deterministic, and there is some path through the code written on the disk that results in whatever problem is occurring, and with the correct instrumentation, a sufficiently advanced IT Tech / Developer could resolve the problem, but by in large, IT Techs are not leveraging this instrumentation, or in many cases even aware of its existence or the paradigm of computational processes running.

IT Techs are faith healers, riders of computational processes, controlling them though a relatively complex intuition of how sane programs behave, leveraging internalized paradigms and standardized platform conventions to solve problems across a broad application space. In some sense, you could say Techs work at a higher level of abstraction that of developers. Developers can see the internals of the program - why the the result occurs, traced through the global evolution of the process. IT Tech’s instrumentation doesn’t breach the black box of program with a state, we can’t see the internals, or evolution of a state, we are forced to troubleshoot at a higher level of abstraction.

Comments

Popular posts from this blog

How to hack wifi in Windows 7/8/8.1/10 without any software | using with cmd

How to Hack Wifi password using cmd Hello Friends, In this article we will share some tricks that can help you to hack wifi password using cmd. Youcan experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colleges w

സുമതിയെ കൊന്ന വളവ് | The real Story of Sumathi valavu

സുമതി വളവ്.. മൈലമൂട് സുമതിയെ കൊന്ന വളവ് എന്ന് കേട്ടാല്‍ കേള്‍ക്കുന്നവരുടെ മനസ്സ് അറിയാതൊന്ന് കിടുങ്ങുന്നകാലമുണ്ടായിരുന്നു .അത്ര കണ്ട് ഭയമാണ് ഈ സ്ഥലത്തെക്കുറിച്ച് നാട്ടുകാരുടെ മനസ്സില്‍ഒരു കാലത്ത് ഉണ്ടായിരുന്നത്. അറുപത് വര്‍ഷം മുമ്പ് കൊല ചെയ്ത സുമതിയെന്ന ഗര്‍ഭിണിയായ യുവതിയുടെ ആത്മാവ് ഗതി കിട്ടാതെ ഇവിടെ അലഞ്ഞ് തിരിഞ്ഞ് നടക്കുന്നുവെന്ന വിശ്വാസമാണ് ഭയത്തിന് കാരണം. തിരുവനന്തപുരം ജില്ലയില്‍ കല്ലറ പാലോട് റോഡില്‍ മൈലമൂട്ടില്‍ നിന്നും അര കിലോമീറ്റര്‍ ദൂരെ വനത്തിനുള്ളിലെ കൊടും വളവാണ് സുമതിയെ കൊന്ന വളവ് എന്ന സ്ഥലം. ഇവിടെ വച്ചാണ് സുമതി കൊല്ലപ്പെട്ടത്. വനപ്രദേശമായതിനാല്‍ സന്ധ്യ മയങ്ങുമ്പോള്‍ തന്നെ ഇരുട്ടിലാകുന്ന സ്ഥലമാണിത്. ഇടതിങ്ങി വളര്‍ന്ന് നില്‍ക്കുന്ന മരങ്ങളുള്ള റോഡില്‍ ഒരുവശം വലിയ ഗര്‍ത്തമാണ്.ഒപ്പം കാടിന്റെ വന്യമായ വിജനതയും. ഇതിനൊപ്പം പൊടിപ്പും തൊങ്ങലും വച്ച് പ്രചരിയ്കുന്ന കഥകള്‍ കൂടിയാകുമ്പോള്‍ എത്ര ധൈര്യശാലിയായാലും ഈ സ്ഥലത്തെത്തുമ്പോള്‍ സുമതിയുടെ പ്രേതത്തെക്കുറിച്ച് അറിയാതെയെങ്കിലും ഓര്‍ത്ത് പോകും.പ്രത്യേകിച്ചും രാത്രി കാലങ്ങളില്‍. സുമതി മരിച്ചിട്ട് ഇപ്പോള്‍ അറുപത് വര്‍ഷം കഴിഞ്ഞു. എന്നിട്ടു

A Beginner’s Guide to Getting Started with Bitcoin

A man looks for Bitcoin Oasis If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin . Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero . Shortly after the late 2017 bull run lost its steam, interest in these new technologies started to fade ― but here we are in 2021 with Bitcoin having risen like a phoenix from the ashes. As you would assume, an appetite for the blockchain and digital asset space has returned and now it is more important than ever that we understand what exactly is behind this unique asset, Bitcoin. This article is meant to be a guide for individuals who are new to cryptocurren