Entries:
Comments:
Posts:

Loading User Information from Channel 9

Something went wrong getting user information from Channel 9

Latest Achievement:

Loading User Information from MSDN

Something went wrong getting user information from MSDN

Visual Studio Achievements

Latest Achievement:

Loading Visual Studio Achievements

Something went wrong getting the Visual Studio Achievements

Discussions

kettch kettch
  • Ignore less secure GPO settings

    , cheong wrote

    *snip*

    That's a easy one. Any settings that has been advised by Security Advisory that should be disabled.

    Instead of completely remove the feature and risk breaking things, it'd be better to just allow local "turn this feature off" setting to override a GPO defined one, so if someone set a local setting following the advisory and later found it break things, it can be simply undone by the user.

    Consider that in the new generation of workforce, about 30% of people who are not in I.T. related post possess I.T. related knowledge on average or even better than the average of I.T. people, it's not an unreasonable choice to make.

    It's the "better than average" folks who shouldn't be allowed to make these kinds of changes.

  • My latest work toy...

    , elmer wrote

    *snip*

    Call it a real-world run-time test - now they know that the generator works and how long the battery will last.

    Sadly it's the kind of test that doesn't get done nearly enough. Where I work they are pretty lax about a lot of maintenance stuff, but happily IT has harangued them to the point that they do a full generator test once a week. They fire up the primary and secondary generator and cut over the whole building for about 20 minutes and flip back and forth between the two generators just to make sure that everything is working.

    We really saw the benefit of this in action one day during a power outage. The power went out, and it turns out that the battery backup on the fire alarm was bad and when the generator kicked in, it came back in an alarm state. So, we ended up evacuating. My department evacuates out an entrance that's 30 feet from the generator building. As we walked past you could barely hear the well maintained generators humming away. As we were in the parking lot we noticed that the building next door had clouds of smoke pouring out of the side of the building. We thought it might have been related to why we evacuated. After a bit we realized you could hear the tortured chugging of a diesel engine and we realized that somebody next door was probably going to answer for not properly testing their backup systems. Later on we found out that they ended up having to throw the breakers on a whole floor to take the load off of the generator.

    I guess the moral of the story is if you haven't tested it, it doesn't work.

  • love this bit on the angular web site

    @swheaties: @figuerres:

    I've used Click-Once to great success in other environments. Our desktop engineering and network admin folks worked on it and couldn't make it work right because "Microsoft sucks".

    I'd go as far as saying that they are borderline incompetent, but it's all of them and management drinks their "Whenever something doesn't work right, or we have to build stupid custom tools to do simple functions that are already taken care of by built-in features, it's Microsoft's fault, not because we don't know how to do it" Kool-Aid.

    Meh. Otherwise it's a pretty good place to work and do development, and it's one of the few development jobs in the area for one of the best employers.

  • love this bit on the angular web site

    , JohnAskew wrote

    *snip*

    Exactly who said such, Bass? I did not.

    What I said is the truth, too many corporations try to shoe-horn enterprise applications into browsers. It is a mistake brought on us from those who know no better - upper level executives. It's an epidemic of stupidity. Browsers are burdened enough with simple shopping carts, and that's as deep as they need to go. Browsers are for reading, Bass. I see you understand this and agree. So chill out. You're over-reacting.

    We'd probably do more desktop applications if our desktop engineering folks could figure out how to do proper deployments. Even with web apps we have to work around ridiculous browser settings.

  • What PC's need in post ​floppy/cd-​rom/dvd/sno​wden era

    @androidi: How do you decide that the data has maintained integrity? A hash requires a known algorithm run on both ends of the transfer. If one endpoint is compromised, then it doesn't matter if the hash matches. The compromised endpoint could have manipulated the data, generated the hash, and transmitted the data. The clean endpoint wouldn't know the difference.

    I suppose you could periodically generate hashes of the data, and store them on a third system. During a data transfer, the hashes could be compared at all three points and if something didn't look right, you could at least know to start asking questions.

  • love this bit on the angular web site

    , Bass wrote

    *snip*

    random boring Innotek organizations

    These are the guys that have been around for decades, and will continue to be around for decades. That sounds like a good investment to me.

    On the other hand, the average lifespan of the "cool" startup is about three days. Day one is the announcement party. Day two is building a JavaScript component to support their new and innovative approach to social blah blah blah. The goal of Day three is to get bought out by Facebook, but more often than not it's spent picking out a new logo for Day 4's startup announcement.

  • My top 10 worst tech for value

    @androidi: I'm envious of the CRT TV you must have had, because I seem to remember 480p TV as having looked pretty awful.

    Differences in color often have less to do with the playback methods and more to do with producers twisting the knobs just because they can.

  • What PC's need in post ​floppy/cd-​rom/dvd/sno​wden era

    @androidi: Are you meaning compromised in a read-only manner, as in they are just stealing your data? If they've gotten that far, then it's safe to assume that they may be able to manipulate that data (your OP says system-level access is a possibility). At that point it doesn't matter how secure the transfer or the system at both ends, because you can't trust the data itself. What happens if you want to move a piece of paper from point A to point B, but when someone broke into point A they sprinkled on some Anthrax?

  • love this bit on the angular web site

    There's a certain temptation to use an all-encompassing framework, but that's not always a good idea. If a framework starts doing something in a way you don't like, it's not always easy to replace that piece of the framework with a different library without a lot of work.

    YMMV, but modular libraries seem to be safer in this respect. Even Microsoft is moving that way with the more modular direction of ASP.NET and .NET in general.

  • My top 10 worst tech for value

    , JohnAskew wrote

    Any and all ink jet printers, products, & refills.

     

    It doesn't matter how "good" the printers are supposed to be. they are still desktop vortices of evil and despair.

    What is it with the printer industry. I want features A, B, and F, but don't care about C, D or E. I can choose from devices that have any combination of features, except for A, B and F unless I don't mind paying double.