Skip to Content

Yesterday morning (29-Jan-2009), my concluding SCN blog about a 3-day working weekend was attacked by an unknown person impersonating an SAP employee.  As I had been warned of, and seen prior similar behavior, I knew immediately that the true SAP employee had not, nor would not, have made such disparaging remarks.

To me, the supreme irony was the content, griping about my network use, when (a) masquerading as another person is about the most useless and anti-community act I could think of, and (b) my post contained useful advice (for those intelligent enough to understand it) on how to minimize storage space, increase network throughput, and stop wasting others’ time.

Fraud, copyright violations, and identity theft are very serious matters.  Seeing electronic text from a person with a strong reputation may influence actions and decisions in the workplace, and at home.  Finding out that you cannot trust whether any post is from the purported author makes your world a little colder, a little less friendly, and a bit scarier. 

The title of this blog is taken from early American battle flags, quite appropriate as our conference planning meeting was held not far from the Liberty Bell; the flags depict a coiled rattlesnake.

 

image

Image courtesy of www.gadsden.info

To report this post you need to login first.

3 Comments

You must be Logged on to comment or reply to a post.

  1. Sean O'BRIEN
    I also had same issue of someone making offensive comments and impersonating another member. I have always taken the view that if you are big enough to make tough comments you should be big enough to stand by them.
    (0) 
  2. David Faustini
    During the migration process problems have been reported for this blog. The blog content may look corrupt due to not supported HTML code on this platform. Please adjust the blog content manually before moving it to an official community.
    (0) 

Leave a Reply