To your point, there are multiple assessments being made, many of which not being accounted for in the original.
Does the listener fully comprehend "the rules" as they're being laid out?
The listener is evaluating the trusthworthiness of the speaker?
The listener may evaluate their own skills in pulling off a deception by taking the marshmallow and lie about it.
Due to "the rules" laid out by the speaker, does the listener consider they may change "the rules" (influenced by their historical experience with adults)?
Does the listener place any value on a 'marshmallow' at all, maybe a toy, or a type of item previously identified as having high value would lead to different results?
Adjusting for variables in the 'fuzzy' sciences can be difficult due to the innate subjectivity.
Most of these jobs would never get posted in the first place, you need to already be a known entity with these groups/be trusted before they let you close to the mainframe. Have a friend in one of these roles currently, ~10hrs/wk, remote, 6 figures.
People in these roles don't want to draw attention on their sweet comp packages which is why you won't see them crow about who/where they work.
This actually makes the most sense, and would help explain how the error didn't occur during testing (in good faith, I assume it was tested).
In testing, the dev may have worked from their primary to deploy the update to a series of secondary drives, then sequential performed a test boot from each secondary drive configured for each supported OS version. A shortcut/quick way to test that would've bypassed how their product updates in customer environments, also bypassing checks their software may have performed (in this case, overwriting their own file's contents).
My first thought on hearing "15 reboots" was it being a means for Support teams to task users with busy-work, buying them time for further troubleshooting before the avalanche of supports requests came back to them.
Then my second thought was frequent rebooting to fill activity logs, possibly push a suspicious action/trigger performed by CS off of the log.
Before scrolling down, the first images tell me this was fake. The laminate is the all wrong. Intimately aware of laminate devices & materials used during the period.
Source: me, during that time I oversaw security at a Fortune 500, issuing thousands (literally) of IDs for "limited access" areas (DataCenters, SOC, etc) in multiple facilities.
While message boards and irc still exist and could be considered "echo chambers", social media began kicking off in mid-2000s with their algorhythmic echo chambers.
Also around this time period was growth in blogging, further pulling people away from homepages to "personal pages". Even in the days of Geocities, many people would hit a homepage prior to potentially visiting their own site.
And while smart phones did play a role in the trend, changes to web browsers on PC devices with their own "start pages" with news/content operating as pseudo-homepages further contributed to the shift for non-smartphone users.
It could be much worse and end up with a system with smaller timezones with 30 minute offsets instead of DST. Or a single timezone for the continental US.