

Or Microsoft who randomly needs to verify someone’s identity before they can log into.tgeir computer but the user doesn’t have a smart phone. So they need to call someone trusted to have them log into their email from a different computer just to get the code so the user can log into their computer.
But that also means they didn’t have access to any saved passwords so a notebook helps.
I really should put Linux on her machine but then I have to show her how to do that too. It’s a lose-lose so I keep it the same.
I miss local accounts.




That has some really insightful advice and even something I hadn’t considered. They mentioned that with enough users, even bugs become features that are used. People rely on the way a system works, whether it was intentional or not and maintenance could mean disruption.
I am not a dev but I am in IT and think quite a few of these ideas could be applied outside of code.