21 Cade was curious to see what network access he’d been given in his new role. He logged into the administrative console and started by doing his normal duties. He checked server status, looked for any alerts that had been posted, and generally made sure things on the server floor were running on par. An hour later, however, he could wait no longer. He accessed the server log files, searching for the e-mail job that seemed to nearly cause the company to explode. Scanning through hundreds of lines of code, he began to see the code pattern he’d noticed earlier. There was a spike of server activity that occurred on a repeated, timed basis. It was the strangest thing he’d ever seen. Digging further, he noticed that during each interval, the server was calling for a set of code to execute. Ca