Keep the Scumware Flowing

  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

I've been doing some serious thinking. Whoa! I better lie down for a while. That hurts. It hurts like hell!

. . . OK. I've taken a mega-dose of analgesic. I think I can struggle on. As I said, I've been thinking. In previous tirades, I've done an awful lot of whining and complaining (my only two real skills) about the, as I've so lamentably considered them in the past, vicious, evil, scum-sucking degenerates who are foisting spyware, spam, viruses, Trojan horses, and other malevolent bits and bytes on us. I'm beginning to change my mind about them. I'm no longer so sure that they're entirely bad.

Think about it. If it weren't for them, thousands--maybe even millions--of honest, hard-working people would be out pounding the pavement. Well, maybe only a few of the more mentally challenged of them would be actually pounding pavement, since that seems like such a fruitless endeavor. Most of them would be looking for work, but you get the picture.

Loaded on my computer right now, I have a firewall, an anti-virus program, an anti-spyware program, and a spam filter. All of them are either running continuously in the background or waiting to go to work as soon as email comes knocking on my computer's door. Their sole purpose is to protect me, or rather to try to protect me, from the electronic nastiness that regularly comes my way. In addition, there's another firewall on the router that stands between my DSL modem and my computer. There is also a second spam filter running on a server at my Internet Service Provider (ISP).

If it weren't for the evil varieties of hackers, con artists, sleazy marketers (no, despite what you might have heard, we're not all sleazy), and just plain crooks who send all of the wicked stuff our way, neither I nor anyone else would need any of the protective software. In addition to being a tad upsetting for the shareholders of the companies that make these products, such an eventuality would throw a lot of developers at many companies out of work. And what would happen to all of the people who write the totally incomprehensible users' manuals for these tools? It takes a lot of person-years to compose those documents. Do you think it's easy to put together a complete manual that appears to be written in English, yet cannot be unambiguously understood in its entirety by a single soul in the English-speaking world?

Furthermore, killing the market for protective software would also cut off the incomes of the vendors' executives, managers, marketers, salespeople, customer aggravators (companies that play fast and loose with the truth sometimes refer to them as customer service representatives), support staff, maintenance workers, cafeteria chefs and servers, onsite masseuses, in-house fitness instructors, pinball machine repairers, and the people who clean the washrooms. Obviously, I'm exaggerating a little bit here. Even if you don't have a job, you still have to go, so the washroom cleaners could probably find other jobs quickly.

It's not just companies developing protective software that would be in trouble. If I didn't have to run all of those applications, a 20-year-old pocket calculator would probably provide enough computing power to meet my needs. Of course, I'd have to also get rid of all of the bloatware from a certain exceptionally large software company headquartered in Redmond, Washington, which I won't name. Let's just call it MS to protect its identity; its identity is not what matters here. Think of all of the computer manufacturing jobs in China that would be lost if we didn't have to replace our obsolete computers every few months when they no longer have enough power to run all of the new, expanded protective software that we now need.

Then there are all of the security consultants charging unconscionably large fees to, first, offer advice to companies on ways to secure their data centers and desktop computers and, second, either run like the wind (gale force, at least) before something defeats the prescribed defenses or make sure that they've already found someone else to blame for the failure. What would they do if there were no longer any risks to protect against? There's no market for snake oil today, so they'd have to look elsewhere. (I apologize in advance for that cheap shot. It's totally unfair. I went for the easy laugh. If you're a security consultant, you are, no doubt, one of the many fine exceptions that prove the rule. Or maybe not. You decide.)

I can't remember the last single day when I saw less than a half dozen articles talking about some new computer threat, an old threat that has worsened or morphed into something else, the consequences of the threats, or what we should do to protect ourselves from them. And those are just the articles that my eyes alight on. I only peruse a very small fraction of 1% of the publications that are available in the world. There are undoubtedly many more articles about technology malfeasance that I never see. If there weren't any of these sorts of stories to report on, what would all of the journalists walking the high tech beat do? They'd be seeking new employment too. That's what.

I can confirm the previous statement. I know that if there weren't all of the high tech evilness that there is in the world today I'd certainly have trouble finding things to rant about every week. But that's OK. Don't worry about me. I'm not important. I'll suffer. By the way, have I ever mentioned my Jewish heritage? Suffering is my middle name. I've never forgiven my parents for that.

Even if you aren't a computer journalist and you don't work for a software or hardware firm, your job may still not be safe. Consider how much time ordinary employees at companies of all sorts, and the IT support staff who have to hold their hands, spend installing all of the preventative software and fixing the problems caused by the electronic vandalism that inevitably sneaks past it. If we could eliminate all of that wasted time, companies could probably cut their staffs in half and still get as much productive work done, if not more. So while you're at work, look at the person to the left of you and the person to right. If we can get rid of all of the garbage that haunts our computers, one of those people might be gone tomorrow. While you're at it, look in the mirror. You might be the one who gets the axe.

There will also be a lot of secondary job losses. It's hard to afford a grande, low-fat, decaf, caramel, macchiato, extra-hot, extra-foam latte and a chocolate croissant when you haven't got a steady income--or any income at all for that matter. So you can say goodbye to a lot of baristas too. While I'm at it, think how much less time we'd spend in line-ups at Starbucks if people would just ask for a doppio espresso instead of all of that sissified crap. What are they, little wimps who are afraid it'll keep them awake at night? Big deal! Get over it! You probably sleep way too much anyway. But I digress.

Another regrettable outcome is that a lot of people who would have bought new cars will, for economic reasons, be forced to buy used (sorry, pre-owned) vehicles instead. Unfortunately that will mean that, in addition to a lot fewer workers at car plants and new car dealers, we'll have to put up with a lot more used car salespeople. There are a lot of jokes about loud, plaid suits and loud lying that I could use here, but they are all way too obvious, so I'll pass.

Spend just a few moments pondering the inevitable effects of those massive job losses. The world economy would collapse. There would be widespread poverty. Poverty would lead to famine. The resulting malnutrition would lead to weakened immune systems. Weakened immune systems, coupled with the festering bacteria seeping from sewage systems that are non-existent or degrading due to under-funding, would lead to wide-ranging incidences of deadly diseases. Oppressive poverty would also breed looting and other violent acts. Citizens would mount the ramparts, demanding that their governments act decisively. Outbursts of rioting, rebellions, and insurgencies would occur in various spots around the world. In other words, it would look very much like an average day on the planet, only more so. And who wants that?

So, please, before you do anything else today, remember to take the time to say a heartfelt thank you to your friendly local malevolent hackers and spam artists. Make them your friends. Buy them a round of drinks. Your job and the very fabric of society may depend on it. Just keep them the hell away from my damned computer!

Joel Klebanoff is a consultant, a writer, and president of Klebanoff Associates, Inc., a Toronto, Canada-based marketing communications firm. Joel has 25 years experience working in IT, first as a programmer/analyst and then as a marketer. He holds a Bachelor of Science in computer science and an MBA, both from the University of Toronto. Contact Joel at This email address is being protected from spambots. You need JavaScript enabled to view it.. He would like to offer this warning to readers: This is a work of satire. Some people may not recognize it as such and, because of that and the occasional use of harsh language, will be offended by what they read. They are advised to use their discretion and not read the article if it is likely to upset them. Oops. This warning should have gone at the head of the column. Sorry.

Joel Klebanoff

Joel Klebanoff is a consultant, writer, and formerly president of Klebanoff Associates, Inc., a Toronto-based marketing communications firm. He has 30 years' experience in various IT capacities and now specializes in writing articles, white papers, and case studies for IT vendors and publications across North America. Joel is also the author of BYTE-ing Satire, a compilation of a year's worth of his columns. He holds a BS in computer science and an MBA, both from the University of Toronto.

MC Press books written by Joel Klebanoff available now on the MC Press Bookstore.

BYTE-ing Satire BYTE-ing Satire
Find out the hilarious answer to the eternal question: "Is technology more hindrance than help?"
List Price $14.95

Now On Sale



Support MC Press Online





  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things

    Read Node.js for Enterprise IBM i Modernization Now!


  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!


  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.


  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks



  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.


  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact


  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using as a pre-built development environment



  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.



  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.



  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails


  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.



  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks



  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.