Is there any capability to scan documents into your systems? Still may not be practical, but stands a better chance than typing the changes in.
I sympathize with the circumstances, not long ago I declined to renew a contact largely because of an even more ridiculous situation: we had NO access to sensitive or classified data, we'd all had background checks and the systems we worked on were for development only, nonetheless the IT department took it as their primary task to defend those systems and the non-existent data against the developers.. the very people building their systems for them. There were no optical drives with write capability, we were allowed to plug NOTHING into the machines, they scanned continually for "unauthorized" software, sandbagged all requests for software approval, and in the end made us sign forms stating that we would not bring notebook computers or even thumb drives into the building. They even confiscated our scissors. The irony is that access to the web was pretty much wide open. If anyone had actually wanted to steal any of the non-existent data that IT were "protecting" it would have been trivial. As is often the case, all of these measures only worked against those trying to play by the rules. Eventually, as usual, the productive people just got frustrated and left. It's called "security theater", where a huge show is made of "securing" everything, no matter what the cost, resulting in little if any real protection against real threats. In one project years ago I had to type in and compile a simplified version of the xmodem file transfer protocol; the sysadmins had decided that FTP or anything similar represented too much of a risk to the minicomputers and had simply deleted all those executables, then mandated that we move our code from the client PCs to the minis for source control. They simply expected us to re-type or cut-and-paste it all in terminal emulation, everything we'd developed, every time there was a change. The fact that this was impossible to do on any schedule and irrational on the face of it (the terminal emulators being less secure than FTP) made zero impression, delivering software was not their problem, securing machines was, and deleting those programs was something they could do with zero effort on their part. We've reached a point in MANY institutions where "security" has become a magic word meaning "you will do whatever I say no matter how ridiculous without question", progress has come to a complete standstill, and only the "dead wood" remain at the desks. We're now maintaining thousands of pretty secure, almost completely unusable systems. I only hope the pendulum has swung as far as it's going to and that sanity will gain a grip again soon. No offense, but even in your situation you express complete sympathy for and agreement with the measures in place, and yet you're trying to work around those measures in order to get access to the tools you need to get the job done. Seems a case in point. On Jun 9, 6:47 am, AlanBCohen <[email protected]> wrote: > I appreciate the thoughts; but I really can.'t argue with their > reasons for not allowing outside programs and data - in this > situation, it is reasonable on their part. BTW, I am consulting in > one of the IT groups, but they are highly silo'ed (also for good > reasons). I will, however submit a request to have an update to the > library. > Somewhere in the TW file, there is the code that someone entered with > an editor that can be reviewed or changed. All I want is to find it > in both this old version and the current version; make changes to > bring it more current. I have not been working in HTML or Java. > I figure it will be weeks/months of lunch-times before I can get it > fully updated; if there was a history of changes, I could implement > them as I went along, testing to make sure the changes worked, rather > than depending on a 'big bang' approach. > Since we are talking about the core processes first, I thought this > list would be a better place to ask than the GTD TW list. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "TiddlyWiki" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/TiddlyWiki?hl=en -~----------~----~----~----~------~----~------~--~---

