Archive for June, 2008

Large Company Frustrations

Working for a large company gives you at least a little feeling of stability and a regular paycheck. But, working for a large company comes with its share of headaches.

For me, it is usually Human Resources.

A few weeks ago, I received my Performance Evaluation Self-Assessment form.  This is where they want you to rate yourself on a scale of 1 to 5, then your manager gets to rate you.  In the end, the manager adds up his totals, and they use this total to determine what sort of raise to give you.  This form shows various broad categories and has buzzword filled descriptions for what a “3” rating is for each category.  Reading these descriptions though, a “3” employee is “On Target”, basically doing everything they are supposed to be doing.  With all these great descriptions of what makes someone “On Target”, giving yourself a rating above “3” seems difficult.  Why?  Because you have to write examples to back up your self-rating.  I am pretty sure they do this because they want everyone to rate themselves as low as possible.  Only people who rate themselves high and have details to back it up will end up with high ratings from their managers.  It’s pretty cheap to operate this way, if you ask me, but I think most large companies are moving to the sort of system to try to save money on salary.

I’m adaptable though, so Ive actually gotten used to doing these over the last few years.  I use the RoR’s application Tracks to keep track of my tasks while at work.  Most of the time I put tasks in Tracks to remind me to do something, but often I put tasks in after I’ve completed them, just to have the record.  I suggest that everyone keep an easily searchable electronic log of your tasks.  I surprise myself with how frequently I find that I have invested a major amount of time on a project just a few months ago but had forgotten about it when it comes time to do my performance review.  Even if you work for a smaller company, doing this is a great way to be able to document your value to your manager.

Of course, HR can’t leave anything alone for long.  In the past 5 years, I think I’ve gotten 7 or 8 different Performance Eval forms.  Yes, that means I get one form, and before it is due to be turned in, I get a different one!  This year, they have stuck with the 2nd version from last year, so perhaps they are happy with it finally.

But, they have added two new things to the process this year:

First up, it’s a chart where you read nine descriptions of types of workers and circle the box that you feel is the closest representation of you.  Hint:  Select only from the four boxes in the upper right section of the chart, not the three boxes to the far left or the ones across the bottom.  From a webpage that a co-worker found on this type of chart, rating yourself in one of the left or bottom boxes is like putting yourself on a “possible elimination” list of your employer.

Lastly, the Individual Development Plan was also added.  Here, you list your professional aspirations, your strengths, weaknesses, and your plan to reach your aspirations.  I’m not really sure what the point of this one is.  Chances are good, though, that whatever you write here can and will be used against you at Eval time, so tread lightly.

June 26, 2008 at 10:21 pm Leave a comment

Why it’s not OK to “steal” Wi-Fi

Today I ran across a Computer World blog post stating the author’s opinion that it is OK to “steal” Wi-Fi. Instead of joining the throngs of other people posting their replies there, I thought I would post my opinion on this topic here since I happen to have a strong opinion on it, and my response is pretty detailed.

First, his reasons:

His first reason is that simply by using it, you are asking for and receiving permission. He reasons that because your computer requests an IP address and is given one by the access point that you are essentially being given permission to use the network.  The problem with this logic is that common wireless appliances default to operate in this way for ease of setup by the purchaser.  The access point doesn’t know who is connecting, only that someone is, so, assuming it is a device owned by its owner, it helps out by giving them the information they’ll need to get anywhere on the network.  Some will argue that if the end-user doesn’t follow directions, yada-yada…  It isn’t wise to leave your front door unlocked, but that doesn’t give anyone else the right to walk right in.  His logic here is like saying you “ask” permission by turning the door knob, and the door “grants” permission by opening.  (This analogy was borrowed from a commenter on his article.)

His second reason is that you can’t be on their network unless their network reaches your computer. His logic here is really reaching, babbling on about your neighbor’s wireless signals “breaking into your home”.  Give it a rest, guy…  It’s stealing!

By this guy’s logic, it should be perfectly fine to run an Ethernet cable through your neighbor’s window without telling him and attach it to an open port on their router.  In that case, your neighbor’s router will give you an IP Address, so that’s your permission, right?  I don’t think anyone with a brain would argue that this is legal, but connecting to their network wirelessly without permission (from a human) is the same thing.

The Computer World blogger references another article where the writer confesses that he didn’t pay for Internet access for three years, instead stealing it from his neighbors on a daily basis.  If you are doing this, don’t even try to kid youself – You are stealing!

What almost everyone ignores (as have I up until now):

In most posts on this topic, the poster ignores one rather crucial aspect.  Most people with a wireless network have Internet access, but you can have a wireless network without having Internet access.  Connecting to someone’s home wireless network that didn’t have Internet access would be pretty pointless to most people interesting in “stealing” Wi-Fi.

That’s because it’s not the wireless connection that they are stealing, but rather Internet access. Most people have Internet access at home.  Where does that come from?  An Internet Service Provider (ISP).  ISP’s don’t generally provide this service for free, so someone is paying for that access.  Basically all residential ISP’s have usage agreements, and almost all of them have a clause stating that you can’t share your Internet connection.  You might say “Hey – It’s on them, because they aren’t securing their wireless network!”, but you’d be wrong.  To share something, you have to know that you are sharing it.  If you aren’t aware of it, you are the victim of theft.  Let’s demonstrate this principle:  Let’s say my neighbor is Bill Gates and he keeps all of his money in a garage just next to my home.  I’ve read that Bill is a really nice guy, and think that he might not mind sharing a little of his money with me.  Unfortunately, I can never get in touch with him to ask because he’s so busy.  So, one day I go into his garage and take some of the money.  There’s so much money in there, he’d never notice the little bit I took.  In this example, did Bill share his money?  No, it was stolen.  The fact that he has a virtually unlimited amount and will never notice the missing money doesn’t make it any less stolen.

In the past (and perhaps still) some ISPs would throttle a customers Internet connection when they have a sustained high utilization.  So, if you are stealing your neighbor’s Wi-Fi, when you download the latest hit comedy movie for 20 minutes or so, their speed may drop from 1.5 Mbps to 256 Kbps, for example.  This directly affects that customer in that it reduces the quality of their Internet connection.  In fact, even if their ISP doesn’t throttle and you are using Bittorrent software, chances are good that you will seriously degrade your neighbors connection to the Internet.  (Bittorrent is extremely efficient at using all available bandwidth!)

Recently, there has been a lot of info in the press about Comcast, AT&T, and others considering implementing metered bandwidth.  This is where the ISP decides that 250 GB of data transfer should be good enough for everyone, and then bills customers who exceed that limit $15 for every 10 GB they go over.  In this case, if you use their Internet connection it can directly cost them cash.  Still think it isn’t stealing?

You can’t just say that someone with an unsecured wireless router is willingly sharing their Internet connection, unless you’ve specifically asked that person, they have some sort of sign posted, the SSID is FREEINET, or something along those lines.  An open access point isn’t permission for you to connect, but simply configured that way so that the non-techie owner can easily connect his wireless devices.  I think people who say “you shouldn’t buy a wireless router unless you are going to be responsible enough to secure it” are elitists just trying to justify their own selfish behavior.

The bottom line is this: If you are receiving Internet access without permission of the person paying for that access, it is stealing, pure and simple.

June 20, 2008 at 10:02 pm Leave a comment


Calendar

June 2008
S M T W T F S
1234567
891011121314
15161718192021
22232425262728
2930  

Posts by Month

Posts by Category