In the 1st photo:

  • It is easy to notice the clumsy and lacking know-how interconnection of a voice data network within a rack, resulting in the inability to perform any action without damaging something else. No interconnection protocol was followed.

In the 2nd photo:

  • Υou can see a distributor with connection strips of various types, configured by dozens or even hundreds of different technicians throuout the years with the result being obvious. You can not touch anything.

In the 3rd and 4th photo:

  • You can see the distributor of an intrusion alarm system, where the connection of the cables was effectuated without having followed any safety specification or interconnection protocol.