Dump it onto tape* encrypted. Hand the tapes to the administrators. When the bill is settled the administrators get the key.
*Other media options are available.
16426 posts • joined 16 Jun 2014
"It reminds me of the presentation our VP gave regarding the efficiency gains of "lean" introduction."
That in turn reminds me of the estimated savings to be gained by relocating a company. Various subheadings were given along with the overall figure. The overall figure was £1m out from the sum of the subheadings. Rounding errors!
"all thoroughbreds come from a mere 3 stallions"
What about the maternal lines? Everyone seems to concentrate on the paternal ancestry as if the mares are simply vessels in which to incubate a replica of the stallion. But the mare provides the only X chromosome of a stallion foal, one of the X chromosomes of a mare foal, half of the rest of the nuclear genes - and all of the mitochondrial genes. Given that it's the last which provides the critical mechanism of aerobic respiration if there's any variation, however small, in that it could have a significant effect on performance.
"The point of SLAs is to define exactly what they promise to deliver, and what compensation I get if they don't."
This is the MBA version. The reality could be that a failed backup leads to a failed business.
If you're a DBA or sysadmin working for the company that owns the database you know that a failure could lead to the loss of your jobs and those of your colleagues. If a problem happens on a Friday you work over the weekend to fix it, you don't leave it until Monday.
If you work for a 3rd party provider you know the worst is that it cost your employer whatever the SLA says and nothing else. What's more your employer has already taken the decision to carry the risk themselves or to insure against it and if they don't care enough to tell you to work the weekend why should you care any more?
"Now he's going to get the boot from the UK back to Australia."
Unless the US issue an extradition warrant. There was no sign of that happening under the previous administration but the current one seems to be thinking about it. It's possible that his delaying tactics may well have brought about the very situation he was trying to avoid. Of course actually being wanted by the US is good for his ego and he can continue to stay where he is.
I wonder how long the Embassy's lease has to run...
" I need to generate a unique token using my debit card and card reader, plus the payee account number and the amount. This generates a unique code, which is used to verify the transaction."
Or, in the case of the card reader my bank sent me, is used to fail to verify the transaction. However the use cases needing this are very few; the only one I encountered was changing the email address. So the security device is a piece of crap but the good news is I don't have to use it!
"What do you do when the one doesn't get it is on the board?"
What you need is something that starts up when clicked and displays an animation, flashing text whatever saying something like "Deleting all the files on your Network", "Kiss your business goodbye" and the like for a few minutes. And then ends up with a message "Don't panic, that was just a warning. Go and offer your IT whatever they need to secure your system."
Then get someone to email it to them from outside the business.
"here am I running XP in a VM because I refuse to throw away a perfectly good scanner just because Canon don't want to release Win 8.1 drivers in the hopes that I'll throw it away and buy a new one."
Yes it's a familiar refrain but do take a look at Linux or BSD. They may well have a driver for it and you'll be able to run updates on the OS and the scanner will still work.
"those risks were in fact minimal if not non-existent."
I've trotted this one out a few times but it looks as if it has to be repeated. I had a client for whom I'd got new live and backup ready because the old ones (actually, the old backup server to be precise wouldn't run the Y2K-ready version of their application. We were all tested and ready to cut over between Xmas & New Year. Their beancounters refused to let us go ahead because they didn't want to take the risk!!! of migrating before they'd gone through their year-end closedown of the books.
So for a fortnight we had the application vendor logging in on about a daily basis, maybe more, maybe less, to fix the data corruption we kept getting. It wasn't, therefore, an absolute disaster - a pity as I'd have liked to have had to take them back to the end of December and make them re-input several days work - but I don't think you can count daily remote access to fix corrupt data as a long-term working solution.
Yes it was a real problem. Most people weren't that stupid so didn't get to see what could have happened.
And BTW however much money was to be made out of Y2K not much came may way - 99 was the slackest year I ever had.
Way back one of the client's network guys had discovered that someone was persistently trying to probe the firewall. He then looked at the IP address and found the eejit was sharing his C: drive. If it had been me I'd have tried to mount the drive and see how much could be deleted from it before it all fell apart.
Updates to W7 also got switched off because it was taking until the heat death of the Universe or the arrival of WannaCry before the updates ran. There are still posts here from people complaining about that and even I, a non-Windows bod, know that there's a specific update to be downloaded and applied individually that fixes it.
"our VPN has security checks in place that won't let you connect fully until you've:
a - got the recent antivirus definitions"
Which still won't protect against something new enough not to have got into the definitions.
@WatAWorld "If you patch the NHS computers, civilian computer types are going to know..."
Which is why I said the "suggestion" would be to block SMB at the firewall, which can be justified for other reasons.
Blocking SMB at an external firewall would be effective against external scans. If you're running SMB internally because that's how your network works and the malware is distributed by phishing scams than it really doesn't help very much.
"So, technically, on the face of it he's not innocent; he didn't hand over his passwords when asked and there is a statute in place to prosecute him as a result. Whether that's right or not is another matter."
In this country there is, theoretically, a presumption of innocence. Making it an offence not to hand over passwords without good reason sets aside that. If there is reason to believe that there might be something incriminating locked by the passwords then the appropriate course of action is to present that evidence to a court and get a warrant. It's called due process of law. It seems that having given the idea a trial for 8 centuries (hint: look up what happened in 1215) we seem to have decided it wasn't a good idea and ditched it.
"Dell's initial reaction was to tell customers they needed to buy new motherboards."
Sorry but if Dell Command Update offers you a BIOS update that then bricks the chip it is your responsibility to fix it Dell.
Presumably it was someone on work experience who gave out that advice. One hopes the grown-ups took over after that.
"When stuff like tellies in the home were too expensive to buy, people got them on the never never instead."
Your ability to pay off the TV loan didn't rely on your watching the TV so it can be assessed on your earning history.
The ability to pay off an R & D cost relies on the outcome being successful to create future earnings. That means there's no history on which to rely. You won't be able to go to a hire purchase company for that. The people who'll be lending money on that scale in that sort of way are going to want
your first-born a slice of the company. It's called venture capitalism and the pre-IPO spin and PR are also factors in the VCs being able to get their money back. They won't see R&D and PR as alternatives, they'll see them as complementary.
In order to perceive distance you first have to perceive the objects in the visual field. That in turn involves edge detection. Then you have to correlate the relative positions of the objects as seen from the two eye points and the feedback from the muscles controlling the eyes. It's all massively parallel - some of the processing seems to be done in the retina itself. And none of it is conscious so I'm not sure that the I bit of AI applies.
Biting the hand that feeds IT © 1998–2019