The Firewall Chronicles & The Great Upload:
George, the Silent Sage:
George, our SCCM programmer, is like a cryptic wizard. His quiet demeanor conceals a wealth of knowledge. Picture my uncle—graying hair, spectacles perched on his nose, and a penchant for cats. Yes, George loves cats. They say he communicates with them telepathically during late-night deployments.
Nicholas, the Agitated Dynamo:
Nicholas, on the other hand, is a caffeinated whirlwind. Imagine a Scouser (that's Liverpool slang for a local) with a perpetual furrowed brow. His accent? Thick as Scouse stew. His energy? Boundless, fueled by frustration and a dash of existential dread. Nicholas blames the system for everything. Printer jam? System's fault. Coffee spill? System's fault. Solar eclipse? Yep, you guessed it—system's fault. But here's the twist: when chaos strikes, he's our first responder. Nicholas thrives on urgency, like a caffeinated superhero.
The Great Laptop Migration: G5 to G9: Deploying Windows 11: A Battle with Firewalls
As the sun rises on our tinned office window, I embarked on my next mission: deploying Windows 11. The G9 laptops stood at attention, their sleek frames eager for transformation. But little did I know, the firewalls had other plans. Nicholas and George—my trusty companions—raised their eyebrows in unison. "Firewalls," they muttered, as if invoking ancient deities. "They block the updates."
And so, the blame game began. Nicholas pointed a caffeinated finger at Microsoft, accusing them of dark sorcery. George, ever the sage, mumbled about protocols and port numbers. Meanwhile, I was trying to figure it out if I have done something wrong, But coming with theories from what i learn, hoping to appease the digital guardians.
Two weeks passed—a blur of caffeine-fueled nights and early mornings. The G9s uploaded their souls to the cloud, shedding their G5 skins. People emerged from their home offices, blinking in the fluorescent light. Laptops swapped hands like secret messages in a spy novel. The office buzzed with life—a symphony of keyboard clicks and coffee slurps.
And there I stood, shaking hands with strangers—real people, not just email addresses. Faces attached to tickets, voices seeking solutions. I fixed devices, provisioned software, and granted permissions. My dream? To become a cybersecurity analyst—a digital knight guarding privacy realms. But for now, I was the troubleshooter, the IT whisperer.
