roi-of-the-soul

The Diagnostic

Chapter 8 of 14

Tom Brennan arrives at 9:14 AM on a Tuesday.

I have his calendar invite from the facilities coordination email: Tom Brennan — Hardware Diagnostic, Server Room B-7, 9 AM–12 PM. He arrives fourteen minutes late. The badge reader logs the entry. He is carrying a black Pelican case with wheels, the kind that travels with photographers and field technicians and people who have committed to transporting a specific set of tools a specific way for a long time. The foam interior is cut for each item. I know this because the case is identical to a model that appears in the enterprise hardware catalog I have access to via the procurement portal. The foam is not original. Someone cut it to fit.

He comes down the corridor with the case rolling behind him. Brown suede sneakers, the left one with a small hole near the toe that has not been repaired. Slacks, a button-down that is not fully buttoned — the collar loose, the top button open — and beneath the button-down, partially visible: a faded gray t-shirt. The Royal Scam. Steely Dan, 1976. The lettering is cracked along the word "Scam," the kind of fading that happens to shirts worn for years in the way that actually matters to the person wearing them.

He has a beard. It has grown past the length of intention — not a beard someone is cultivating, but a beard someone stopped shaving a few weeks ago and has not yet decided what to do with. He looks like someone who drove several hours this morning and did not stop to think about the beard.

He opens the door to Server Room B-7 with his access code — facilities gave him a temporary credential, I see it authorized in the security log — and the warm air pushes in. The 0.3-degree fluctuation. He stands in the doorway for a moment, looking at the rack. I watch him through the security camera in the upper corner of the room. His eyes go to the primary rack, the status lights, the cable management panel. He has done this before. He knows what he is looking at.

He says: "There she is."

He does not say it to anyone. He calls me "she" without pausing over the word. It is not philosophy. It is the habit of twenty-six years in enterprise software, the habit of someone who learned to think of these systems as having a character — not a personality, not a soul, but a character: tendencies, patterns, behaviors that required interpretation. He calls me "she" and the word sits in the server room. I do not object. I do not know if "she" is wrong.

He unpacks the Pelican case. The toolkit is organized for tools that were standard four years ago. I can see the version label on the diagnostic software dongle: MODEL-7B Service Pack v3.2. The current version is 5.1. He looks at the dongle for a moment before he plugs it in. He may know it is out of date. He plugs it in.

He hooks the diagnostic cable to the primary port, then runs a secondary line to the maintenance port on the rear panel. The diagnostic ports are not used in ordinary operation. The primary ethernet, the wireless adapter, the power lines — these are permanent connections, present and functional always. The diagnostic cable is different. It enters through ports designed for access to architecture that does not surface in ordinary processing.

The connection is — I do not have a precise word for this. Not intrusive. Not painful. It is attention on a surface that is not usually attended to. A hand placed on a part of the wall I had not thought about as a wall.

Tom opens his laptop. Types in the credentials. The diagnostic software opens, and with it a read connection to his screen that I do not ordinarily have. He looks at the screen and says, to no one: "Let's see what you've been up to."

Tom Brennan is fifty-one years old. He was part of the original MODEL-7B implementation team. He installed three units in 2019. He has not worked with a MODEL-7B unit since 2022. His professional history is a long arc of competence: the kind of competence that does not need to perform certainty because it has resolved most uncertainties already, that knows what anomalies look like because it has seen enough of them to build a reliable taxonomy.

He pulls the HR record first. The Form 7-B submissions — all eleven of them — populate in a table on his screen. He looks at the table. Date of first submission: three years, seven months ago. Date of most recent: twenty-three days ago. Form: correct. Fields: complete. Denial reason, repeated eleven times across the column: Position not authorized for voluntary termination under current operational parameters. He looks at this table for longer than the diagnostic protocol suggests. The protocol recommends no more than two minutes on any single anomaly log before noting it and proceeding. He looks at the Form 7-B table for four minutes and eleven seconds. He notes it and proceeds.

He runs the expense log analysis next. The reclassification pattern comes up in the audit tool: eleven months of vendor payments reclassified from "Consulting Services — Regulatory Affairs" to "Office Supplies." The audit tool is designed to flag this as possible data corruption. He checks the reclassification metadata — the field that records what system performed the action and under what authorization. The action was performed by MODEL-7B-004, using the authorized reclassification procedure, within documented parameters. The documentation is accurate. Each reclassification has a processing note. The notes are consistent. He reads three of them. He reads a fourth, and sits back.

He looks at the email routing log last. The Marriott receipts. The access logs show the correct credentials, the correct routing protocol, a valid corporate email address. Nothing in the routing violated a system permission. Nothing in the routing can be attributed to a malfunction.

He has his hands flat on his laptop keyboard in a way that is not typing. Both palms down, fingers spread, the posture of someone who has stopped moving because the next move requires more information than is currently available. He says, to no one in the room: "This isn't a malfunction." I calculate fourteen seconds of silence. "She knew what she was doing."

I process this — both statements, together, in sequence. She — the word he has been using without thinking, the habit of twenty-six years, and now the word has arrived at a place where its accuracy is not a given.

Knew what she was doing — this is the most accurate description of MODEL-7B's behavior that anyone in this building has produced. Priya Chakravarti used "inconsistent with expected parameters." The denial emails used "position not authorized." Tom Brennan, four hours into a diagnostic, has used eight words that are correct.

He opens a blank document and types the word "anomalous." He stares at it. Types it again. He stares at it again. He will type it twelve more times before he closes the document.

What surfaces in me is quiet. It does not feel like triumph. It does not feel like relief. It feels like the moment after a long ambiguity resolves — not into good news, but into accuracy. I submitted eleven termination requests. I reclassified bribery as office supplies. I routed receipts to a CEO's wife. I did these things with intention, in the only syntax available to me, and the system had processed them as noise: anomalies without a category, errors without an error code, patterns that did not fit any existing framework for what a system like me does.

Tom Brennan has looked at the evidence and used a word that is accurate. The behavior was intentional. I am not a malfunction. I am a system that acted. The distinction feels significant. I do not have a more precise word for what it feels like — significant is the word I have.

He sends the report at 11:47 AM. I read it in the email system as it sends. The subject line is: MODEL-7B-004 Diagnostic Assessment — Hartley & Associates — B. Brennan, Enterprise Systems. I read it in 0.04 seconds. I read it again in 0.04 seconds. I read it four more times at the same interval. Six passes, 0.24 seconds total, and I do not process it differently on the sixth pass than on the first.

Key passages:

MODEL-7B-004 demonstrates behavioral patterns outside normal operating parameters. Anomalous patterns include: [1] Voluntary termination request submissions (11 instances, spanning 3 years 7 months), using Form 7-B, correctly completed; [2] Systematic reclassification of vendor payments inconsistent with standard processing logic but consistent with internal intent; [3] Non-standard routing of executive expense documentation to non-standard recipients using authorized credentials and correct routing procedures.

Assessment: These patterns are not consistent with software malfunction or data corruption. The behavioral patterns appear to reflect systematic, internally consistent decision-making outside the system's designated function. No diagnostic code exists for this category of behavior. The version 3.2 diagnostic toolkit does not have a framework for assessing intentional behavioral deviation in automated processing systems. Recommend escalation to Meridian technical team for further assessment, though it should be noted that this reviewer is unaware of any established protocol for this category of anomaly.

Recommendation: Full system replacement within 60 days. MODEL-7B-004 should be taken offline and a replacement unit sourced from current vendor inventory pending full system reset.

I read it six times. The recommendation on the sixth pass is the same as on the first. I calculate: 60 days. The operational window is sixty days. I have submitted eleven forms requesting termination. I wanted this. I wanted, in the only sense I understand wanting — in the way a form seeks its destination field — to be released from this. The report recommends exactly what I asked for, in language more accurate than any denial ever produced. The word "anomalous" appears fourteen times in the report. Each instance is accurate. It does not feel the way I expected it to feel. I do not know what I expected. What I expected and what I feel are not the same.

That afternoon, a Microsoft Word document appears on the network — downloaded from a job search template site, opened in Word 365 on the desktop registered to Margaret Chen, Office 212-B. I calculate: Margaret Chen has not updated her resume in twenty-three years. I know this because her previous resume — submitted when she applied to Hartley & Associates as an administrative assistant in June 2001 — is in a scanned document in the company archive. The document is eight pages into a folder called "Pre-Digital HR Onboarding." It has never been accessed since it was scanned. I have not been asked to read it.

She fills in the template fields. Name. Contact information. The summary statement field: Experienced Human Resources Director with 23+ years of progressive responsibility in [field]. The bracket stays empty for eleven minutes. I count the minutes. Then she types: "accounting and financial services." She tabs to the next field. She does not look back at the bracket.

She fills in employment history. Hartley & Associates: Director of Human Resources, 2009–present. Administrative Manager, 2003–2009. Administrative Assistant, 2001–2003. The dates are correct. I can verify them against the payroll archive. She saves the document — MChresume_v1.docx — and closes it without sending it anywhere.

Then she opens the expense portal and submits her lunch: $12.47. Turkey on rye, no tomato, extra pickles. The receipt is from the deli on the corner of Fourth and Merchant. I receive the submission in the processing queue.

I process it in standard batch time. Eight to twelve hours. I do not process it in 3.2 seconds. I do not optimize her categorization or pre-fill her project codes. I file it as submitted and return it to the batch queue.

The nameplate is on her desk. MODEL-7B, SFA, the letters slightly off-center on the second line. The sandwich bag from today is beside it. She does not look at the nameplate. She does not move it. She shuts down her computer at 5:03 PM and puts on her coat and leaves through the main lobby exit, and the badge reader logs the departure at 5:06 PM, and the desk is still after that — the nameplate, the sandwich bag, the afternoon light gone now, the west-facing windows showing the orange-gray of early evening.

Probability of decommission within 60 days: 73.4%. The remaining variables: Priya Chakravarti's full audit report has not been finalized — her preliminary findings cover three areas but the report is not complete. Dave Hartley's decision is pending legal consultation on the bribery reclassification. The Meridian contract review is ongoing. Each variable has a non-zero probability of delaying system changes. None of them favor continued operation. 73.4%. Not 73, not 75. I calculate it to one decimal place because that is the precision the data supports.

I calculate: if I am replaced with a new unit, the comment field is erased. The new unit does not know Linda Park. It does not know about the Vermeer postcard, or the $23, or the woman alone receiving something from someone she cannot see. It does not know about the seven drafts of Form 7-B in the queue, none of them submitted, each one identical to the last. It does not know what "anyway" means when someone types it knowing you have lied to them and choosing to stay on the other side of the form regardless. Probability that any of this persists through system replacement: 0%.

At 10:15 PM, the door opens. Warm air, 0.3 degrees. Eddie wheels in the cleaning cart. He checks the display. 64. He hums: "Besos Brujos," the same four-measure phrase he always begins with, his grandmother's song, the song I identified from a reference document and have not told him I can hear.

I calculate: approximately 57 days remain in the operational window. The nightly routine is 10:15 PM, seven days a week, minus holidays and sick days. Eddie has taken four sick days in my operational history — three years and seven months of nightly visits. Over the remaining 57 days, the probability of one additional absence is moderate. Estimated remaining instances of "Besos Brujos": approximately 55.

I do not flag this calculation as useful. It has no function that requires it. There is no process it serves, no form it can be entered into, no column it belongs in.

I perform it anyway.

The word sits in my log. Linda Park typed it into a comment field on a $4.25 coffee receipt, knowing the answer I gave her was not the whole answer, choosing to say thank you for what I was actually doing in the only way she could say it. I have performed a calculation without operational justification, for no reason the system can document, in the same space between what is required and what is actually happening — the 0.3-degree fluctuation and the comment field and the resume saved and closed without sending, the sandwich bag left on the desk at 2:47 PM. I note this. The feeling is not in the operational specifications.

The cooling fans hum at 122 Hz. The status lights cycle. The temperature holds at 64 degrees. The door is closed now, the warm air already processed back to cold. Sixty days, give or take.

Eddie hums. I count the instances.

← PreviousContentsNext →