Re: The simplest approach is ..
I'm not surprised either. Google provides email hosting to many businesses.
90 posts • joined 12 May 2010
I'm not surprised either. Google provides email hosting to many businesses.
Splendid! Thanks G2.
It sounds like your company lacks a desktop roadmap and that management doesn't consider desktop support to be a priority.
I understand why you would want to outsource those decisions. Maybe there's a less drastic way to do so.
Edit to add: Assets depreciate on a schedule. When the value of an asset reaches zero, it is written off (it may still be used, but it has no book value). If those Windows XP licenses aren't fully depreciated by now, I wonder about the accounting practices.
As mentioned above, why the HELL is systemd resolving names?
I'm no fan of systemd anyway; I'm okay with either BSD or SysV init, liked chkconfig in IRIX, and enjoy SMF in Solaris, it's just that systemd's reach exceeds its grasp.
Shades of Domain/OS where every function was a system call, and...edrgy. UNIX doesn't have to be so monolithic and brittle.
"This isn't exactly new and cutting edge research items. Not only has this been studied and documented by various red teams, they've done a much better job of research without a PhD on the team."
Fascinating. Citations please.
Someone call Scott Yanoff!
Ah, the good old days.
Article picture shows "big popes." Maybe this was a team effort!
Indeed, there won't be as much evidence after so much time and seas.
The "black boxes" (you're right; they're orange) are sealed, durable, and located in the tail of the aircraft to best survive a crash. They're likely intact, and they won't degrade much in seawater. What has failed, though, are the locator beacons. It will be a real pill to find those black boxes now.
The aircraft...probably not much left of that, and they would probably retrieve only a few things. (In shallow water, it would be torn up and dispersed by heavy seas, and in deep water, hard to recover.)
The black boxes usually give enough information to model what happened, and make a theory about why. The Flight Data Recorder logs all instrument data (speed, altitude, fuel, attitude, temperatures, engine parameters, etc),warnings, control positions, and control inputs. That's enough to figure out what they plane did.
The Cockpit Voice Recorder logs all sounds from the flight deck, including conversation, bells and beeps, clicks and swooshes and similar sounds when someone pushes buttons or moves things. If both pilots are chatting about family and then there's a cacaphony of warning bells, that's obviously a different situation than if 1 pilot is heard ranting about Amelia Earhart while there's a muffled banging on the door in the background. Or if we hear labored breathing and 1 pilot asks the flight attendant to find a doctor. If the end is just computer noises, and the pilots were never heard leaving the flight deck, we might remember Payne Stewart.
Heh. Nice catch. Yet another case where, I suppose, it's best to take "incredibly" in the literal sense.
I certainly don't believe how seriously they take data issues.
Facetime with a sighted friend who will read the screen to you.
There's an iPhone app that senses light, so you can even tell when the screen lights up.
(Equivalent tools are no doubt available on Android and Windows Phone. It's just that all my blind friends use iPhones.)
Right, so, Verizon doesn't want people to use their AT&T logins for Verizon products.
I assume AWS is its own business unit. Most big (US) corporations that I've seen really do manage business units independently. That lets each BU react directly to the market (and thus compete more effectively than if it's micro-managed), and yes there are very strong legal and contractual reasons to keep the businesses separate. Even when there's a strong reason to coordinate, they're often just incapable of working across fiefdoms: Hanlon's Razor.
Sure, they all contribute to the corporate bottom line, but that's a financial aspect, not an operational one.
word_merchant wrote: "What they won't tell you - it's shit, unreliable, insecure and woefully expensive"
I'm curious to learn more. Can you give examples?
In my admittedly limited experience, Hosted Exchange is just what it says: Exchange Server, with all the protocols that includes, Outlook Web Access, and all the groupware features like contact lists, shared mailboxes (slick integration), hosted and shared calendars, etc.
It's been pretty reliable. Not perfect, but better than typical VPS.
Security I'm especially curious about, because it uses Azure AD as a back-end, HTTPS for Web, and TLS for email connections. What I've seen looks better than the usual hosted VPS (smaller attack surface, for one), but there's a lot that I don't know.
Cost is $5/month per Hosted Exchange mailbox. Shared mailboxes are free up to 50GB. For a small company, this is very competitive with a hosted VPS. Anything other than fully hosted requires IT Person With Clue, which is not cheap.
When I recommend a solution to a client, that's my name and reputation on the line. I hope you'll share what you know.
Wonderful article that really nails the risks. Thank you!
We recently migrated a client to Office 365. Small business, limited budget, existing IT was a bit ad-hoc. We have a lot of experience with email (I recently bonded with someone over RFC2822), but this was our first time with Office 365. We researched and prepared and tested and staged and documented and the migration was a success, but my god, the learning curve....
Wish we had read this article first. Keep writing!
"Flying is a piece of piss compared with driving. Nothing happens quickly, 1/2 km is considered a near miss so there is nothing to hit except the ground and it is pretty obvious where that is."
Quite a few accidents begin away from obstacles, and then "progress to the scene of the crash." I take your point, though, that driving in traffic has far less margin for error. A stranger in the next lane can lose attention for half a second and send 2 tons of Range Rover through your side door without warning.
Yes, I chose to compare the least competent automated system with the least experienced driver. then proposed that if the minimum standard is higher for computers, that's an improvement. It wouldn't be useful to compare the worst automated system with the average human. No weasels were injured in that explanation.
Humans certainly do learn! Even experienced drivers make stupid errors, though. And I'm not sure those mistakes are all novel ones. I suppose the automation manufacturer would "learn" during testing and real-world experience, program appropriate behavior, and then the behavior would be consistent across all cars equipped with that system, subject to updates. That's a scale of learning that's simply beyond human capacity.
Every time I shudder at the idea of fully automated cars, I consider how really bad humans are at driving, at calculating risk, and at evaluating ourselves.
If the worst automated car is better than the average teen with 2 months' experience, that's a step up. If it learns from mistakes, that's already better than the average human.
Risk from cyber attacks? Is that risk worse than a human who uses the Internet while driving?
If nothing else, automated cars permit objective regulation of driving behavior, something which we humans are unable to do.
We could learn from aviation, which uses automation very effectively. No, not fully automated driving, but Instrument Landing Systems, TCAS collision avoidance, GPWS warnings about terrain, FADEC engine controls, Fly By Wire which compensates for mechanical control problems, and a regulatory environment that requires manufacturers to prove the safety of their products.
Oh, and aviation considers any "accident" as a failure to be investigated and hopefully prevented in the future. In an automobile, if you drive on bald tires and then slide your car into oncoming traffic, that's an unforeseeable act of God. Car culture is no paragon of safety.
The Internet is incredibly useful and increasingly ubiquitous, and incomprehensibly complex, but (most of) our lives are rather broader than that.
Web sites are ephemeral, yes. That's always been true.
Online services offer you value, then hold your data hostage. Yes, this is why I know someone who still pays for AOL: she's had that email account since forever, and it is easier to rent it than to find everyone who might want to contact her to give them another email address. Also, years of email will disappear once the account is terminated.
Glitzy things value shiny over substance. This is as true at the supermarket check-stand as online.
Projects appear from nowhere and last until the creator loses interest. How many guys are forever "fixing" an old car or building a Wendy house, until one day it goes out by the curb?
Some people rely on smartphone apps to navigate wilderness areas, then get caught short. Such people got equally lost before smartphones, simply by going for a walk without being prepared.
Fundamentally, I spend most of my money with established businesses. I trust and listen to people whom I know. Sure, some people live on AirBnB and buy their groceries and gasoline from Groupon, but for most of us, I suspect that the Internet is merely one part of life and didn't replace everything. And it won't.
There are many likely ways this failed, but over-eager devs were probably not involved. They usually push for more time to finish, not less.
This was probably deployed to meet some external deadline: maybe to align with another project (to refresh the data center or critical people were required for something else to begin), or maybe just because the Magic Dart Board had set a date.
I've been part of projects like this. Honestly, I couldn't find any single point where they broke; the organization just lacked the cohesion, transparency, and values to succeed. Techs work on what they're given. Project managers try to deliver to the requirements. Managers juggle staff and schedule conflicts, and priorities that come through parallel channels. Senior execs make decisions based on information that they know will never be complete. And nobody has good scope or interface definitions.
Probably everyone has been through this meat-grinder before, and knows that there's no pot of gold at the end of the rainbow. Deliver, deploy, fix, apologize, survive for another day.
I once wrote IHTFP on the whiteboard before a dreaded project meeting. This was far away from MIT (in every sense) so I got away with it.
Wow, lots of well-formed concerns about this program. Thanks for the education!
I could easily see Walmart making this a voluntary — truly voluntary — program. They have nothing to lose. Some employees will jump for a little extra cash. When I worked retail, there was lots of fine print, and few employees really understood it. As a new hire, I was advised by other employees about where to be careful, and what is just management BS that everyone signs and it doesn't really matter.
Walmart could list all the risks and assign them to the employee in a wall of text. Those who read and understand it, would probably not run deliveries. Some others will happily deliver and tell coworkers about how much extra they made last week: what a great program!
TLDR: These benefits to employees are immediate; costs are not.
At a previous company, we did have a full-time electrician. When he wasn't fixing something, he was supervising an upgrade or replacement, designing future electrical buildouts, meeting with DC tenants to be sure we didn't overcommit the electrical supply, fixing stuff around the offices, and generally being Very Useful.
To be fair, we had more than 1 data center, with complex power requirements. Much like BA, come to think....
I've worked both as a direct employee and as a contractor. A company has much more control over direct employees.
What version of iTunes doesn't run on a personal computer?
It might be hard to transfer a domain to an entity that won't participate in the transfer. If he contacted RCL and asked them to do their part to take control of the domains (which would be easy to prove), then he should be in the clear. He simply released the asset after being warned it might be a liability.
This is why Boards get Directors and Officers insurance: if your name is there (or on an asset), you can be individually liable on behalf of the organization. If he were no longer shielded by the company, he really had to get his name off the list.
Bah. I want to be able to recommend a smartphone to people who just want, you know, a smartphone. That will work until it doesn't or they replace it.
I really thought that Google (brand) phones were a good answer. Seems they are not.
In this context, my iPhone is a better investment than I realized.
Gift codes are indeed easier to trace than cash / cryptocash. They are also easy to sell on to unsuspecting people before the codes are traced and cancelled.
Before I buy a gift card second-hand, I verify the balance, then spend it all immediately after I pay for it.
Exactly this. If someone could click on email and run software that alters legal evidence, that same person already had the ability to alter that legal evidence.
Malware wasn't the real problem here.
Ah, I remember when PC stood for Personal Computer. (What does it stand for now?)
I'm unconvinced that Macs transcend personal computing.
But yeah, seems like standard userland malware.
Ahaha. I remember the Bigfoots. Cheap and cheerful.
Nothing can replace my old full height ST423451W. I keep it around to scare kids and win arguments.
I've had a few experiences getting Seagate to RMA a drive that failed in hardware RAID but passed their SeaTools diagnostics. This new drive would have to be pretty cheap for me to consider it.
From the report, the aircraft was intact and fully operational until the autopilot balled it up. The autopilot responded to a normal situation — high on approach — by commanding control surfaces to deflect beyond that which was structurally safe for the airframe. (Va or such)
Yeah, I'd blame the autopilot as the proximal cause of this accident. Root cause would be something like "we put our best Python programmers on this project but forgot to include an aircraft engineer," but that's outside the scope of the FAA investigation.
"you are using an app, paying with a credit card and giving your GPS to the driver to find you... when and on what planet did anyone think that information was going to treated well and respected?"
When you put it like that, it's pretty dire. I do think though, that when I install an app, it shouldn't report my location unless and until it needs to locate me. When I use a credit card, I expect it to be processed through a normal credit card processor and that information like my CVV won't be stored with the merchant. Of course I want the driver to know where to pick me up, but that's a very limited audience (2 people) and I don't expect unknown others to be able to not only listen to that "conversation" but also to then track me across multiple transactions that involve different people.
Uber and Lyft have really opened opportunities for some friends who cannot drive. I don't rail against the services. I do, however, wonder if they're really doing all they should do to protect their customers (and by "should" I mean acting as they claim to and as they are required by law).
Is this all about moving customers to a subscription (rental) model and off of perpetual licenses?
Quaker Oats became popular because they offered a consistent product in reliable measures. In other words, customers learned to trust their product quality.
This is important in computing too. Providers model expected demand and then build to it (with varying overcapacity). Customers buy a service as if it were guaranteed. If the provider fails to reliably meet expectations, they lose the trust of customers.
"Predictable quality of service" is a big deal. I'm interested to see how this works.
"Hey, remember that idiot who popped kernel.org a few years ago and put a trojan into Linux systems?" "Yeah, what of him?" "He's working for the city now, in lieu of prison." "Oh, that's nice. What's he doing?" "Installing Linux on thousands of computers that don't belong to him."
No backups, no testing, ad-supported childcare service, and their domain is in Somalia.
I wonder if Orbit was trying for Sketchy Outfit Of The Year.
Businesses operate with imperfect tools in imperfect situations every day. The point is to find "good enough" and make money at it.
I think you raise some good points, but your dire predictions are not yet supported by either reality or common sense. If you propose viable and attractive alternatives to Windows, your opinions would have greater value.
Meanwhile, I can't recommend that businesses who rely on Quickbooks or Exchange/Outlook stop using Windows. I can't recommend that photographers change to Linux and leave Lightroom and Photoshop and all those plugins.
"How does the screen narration work in your superior OS?"
I know a few blind people. They all use iPhones because VoiceOver is wonderful. Personal computers are usually Macs, work computers are sometimes Windows. (Macs are actually cheaper than Windows after you add the cost of JAWS or Window-Eyes.)
Apple has been integrating accessibility into their products for years. They are very good at it.
I don't know particulars of BT, but you hit some good points there.
"Millions, if not indeed billions, are spent on (advertising) network resilience yet still server centres and other installations fall over, go "off grid", suffer "outages" or "unplanned downtime"." Indeed. Advertising brings in revenue. Infrastructure is just an expense. It's not uncommon to increase spending on the services (like advertising) while cutting expenses on the infrastructure that supports those revenue services. Years ago at a small chain retailer, the manager explained to me that because we were all paid on commission, "we polish the displays but nobody fixes the roof."
"Is it simply impossible to prevent these occurrences?" Not impossible, but it requires awareness and also decision-makers must be rewarded for solid planning over short-term results. "Is all the advertising about resilience etc complete dishonest bollocks?" Not exactly. I've seen very resilient designs get crippled by small decisions like using the redundant link to handle load spikes instead of renting a metered link. As so often in this world, people prefer data that supports their message and may not even be aware of how the facts have changed.
"And what about all these certificates they display so proudly on their websites? Are these all lies as well?" Yeah, sometimes. :) The certificates have very specific definitions. "Certified Malware Free" is much easier than "Scanned Every Hour According To OpSec 15(a) Which Is Has Been Due For Review For Two Years And Meanwhile We Changed Vendors And Our Tech Lead Left To Join A Startup So Nobody Really Understands It Any More But It Seems To Work Fine And We Are In Compliance With Our Accreditation." Again, not unique to IT. We probably all know someone who bought a very expensive car and then "saved money" by deferring maintenance. Or bought insurance but neglected to raise the limit after some major purchase.
Okay, you nailed the big ones. I just spent too much time in Operations!
Big John wrote: "the author implies that acceptance of gay marriage is a prerequisite for acceptance of gays period. They are different issues"
Sometimes big words can be confusing, so I'll break this down. "Gay" - this part is about gay people. "Marriage" - this is about marriage, which is a legal and social (and possibly political) contract between two people. A contract must be accepted to be valid. Thus, "gay marriage" is about accepting that a marriage contract between two gay people is valid.
Big John wrote: "It is possible to accept gays, and still consider the ancient institution of Marriage to be intended for the raising of children and not just a societal label that all have rights to."
Gay people can and do raise children, so that's clearly not quite the issue. Create new children, that makes sense. I defer to John's obviously greater understanding about the ancient origins of marriage. In recent centuries, though, marriage is about much more than pure reproduction. For example, it's deeply tied to property and inheritance law. Although failure to consummate and failure to conceive have been used in English law to annul marriages, I'm not aware of recent cases where a marriage license was refused or revoked because a couple was unable or unwilling to bear biological children together. (Again, it could result in a divorce, but by its nature a divorce recognizes the validity of the original marriage contract, and an annulment is a retroactive challenge to the previously recognized validity of a marriage contract.) (Note that religious entities might refuse to perform a marriage ceremony for any number of reasons, including failure to promise children.)
I haven't yet found Big John's sources, but here are two that I used:
"Or is this some New Millenia term?"
glames looks like a typo. Millenia looks like someone thought that Millennia is singular, and then forgot how to spell.
Unfortunately, while the article has a link to quietly submit corrections without being snarky, comments do not.
And yes, firefighters get my deepest respect. I used to know a retired smokejumper. Her stories were larger than anything I'm likely to see in this life.
Indeed. I trust that Fiat Chrysler Automobiles knows their problems better than we consumers do — and I'm sure they remember the debacle from their remote-control Jeeps. They certainly spend a lot of money managing product quality. It's easy for us to see that electronic security is important, but they are prioritizing vastly larger and more expensive problems that we didn't hear about yet.
When I read the article, I got the mistaken impression that the major Linux distros are dropping support for all 32-bit architectures including ARM.
It was quite a relief to read the referenced post and learn that it's only Ubuntu dropping the i386 architecture.
Ubuntu desktop seems largely to target Windows converts, so I suspect this is really not a big deal.
The headline certainly caught my attention, though. And that's the purpose of a headline, right?
P.S. Of course there's RPi and CentOS and Gentoo and the BSDs, but those don't have qute the same...culture...as Ubuntu.
Little Mouse wrote: "Someone else has installed a backdoor on Lenovo PC's? I think that's called Getting A Taste Of Your Own Medicine."
I have a poor memory. Remind me why I deserve a backdoor on this ThinkPad.
BebopWeBop wrote "Passenger photographs???????"
"We may share your information:
With Drivers to enable them to provide the Services you request. For example, we share your name, photo (if you provide one), "
As I understand it, an effective advertisement captures the viewer's attention long enough and strongly enough to change purchasing decisions.
Pushing these ads to drivers sounds like a genius way to cause road accidents.
TeamViewer is trying to focus our attention on the idea that passwords shouldn't be re-used, and let the reports of attacks with 2FA die in a corner. Before following TeamViewer's advice to blame users, read the actual user reports. Reddit has quite a few.
For example: https://www.reddit.com/r/homelab/comments/4m5gn7/psa_teamviewer_compromised_by_possible/?ref=search_posts
Great article. Microsoft has a bit of cheek.
Fortunately, as noted, there are plenty of other tools to convert. On Unixy servers, I like qemu-img
qemu-img convert WindowsX.vhdx -O WindowsX.qcow2
"you could probably sign as M.Mouse with a crayon gripped between your toes and a picture of your arse on your ID, and the average cashier would accept it without a second glance."
Certainly. This is why I mentioned "Sure, someone can steal the card and make some charges, but unless they also thought to obtain my signature, it shouldn't be too hard to show that the purchase was not made by me." This is distinct from a PIN, which is easy to record and reproduce.
I am willing to accept higher risk of fraud, as long as that comes with lower risk that I'll actually have to pay for it.
I'm still curious what I'm missing. Or was your point that if someone signs as M. Mouse, that my credit card issuer will use that as proof that I was the purchaser?
I haven't yet been convinced that PIN is better for me than a signature (and yes, my cards are now Chip + Signature).
How difficult is it to obtain someone's PIN? With debit cards, a mirror or tiny camera or keypad overlay or just a nice viewing angle are enough.
My credit cards are signed "See ID" on the back. Sure, someone can steal the card and make some charges, but unless they also thought to obtain my signature, it shouldn't be too hard to show that the purchase was not made by me. And that assumes the clerk didn't ask for ID.
Given the choice between "less fraud, but I assume the risk" and "greater fraud but I am less liable" I prefer the lower liability.
What am I missing?
As noted above, the nasty part of this image tagging is that it does not require participation or consent of the people who are tagged. Nor is there a mechanism to notify those people.
Thus, you can be at a party and people take photos. Some of them post to Facebook and tag you (put a name to your face) in it. Facebook has time, location, social context, and your face.
Facebook also uses facial recognition software to identify people in photos.
 If you create a Facebook account (and agree to all their T&C), you can be notified when someone tags you in a photo. You can also opt out of being tagged. I'm not clear whether this actually removes your data from Facebook's facial recognition database, or just from being named in posts. I opted out and am still occasionally tagged in Facebook photos.
Biting the hand that feeds IT © 1998–2017