• 0 Posts
  • 32 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle





  • OneDrive is literally built on fucked tech from the get go and Microsoft initially even pointed out in its online documentation that it is NOT a backup solution, but just a way to enable cloud sharing of documents to access them from anywhere. Their higher-ups decided to make it into something it was never originally intended to be, which is why it is constantly a disaster with people losing documents due to sync problems.

    Sorry for the rant, I just fucking hate OneDrive with a deep passion due to the higher leadership at my work forcing us to shutdown our local file shares and making our entire org migrate all our data to SharePoint Online. It has been a miserable transition and I’m in charge of migrating over 100TB and tens of millions of files from over 30 departments. Let me just say SPO is NOT a fileshare solution, and despite me pointing this out countless times it has fallen on deaf ears. Everyone hates it and its limitations are insane (e.g. no more than 100,000 files per document library, 400 character limit for file paths including the base URL, etc). And on top of that all, we have warned customers countless times NOT to sync their OneDrives to any document library or they WILL have problems. Do they listen? Of fucking course they don’t. We’ve had endless tickets and the migration isn’t even complete yet.

    Tldr; fuck OneDrive and fuck SharePoint Online.

    /Endrant



  • Yeesh, I didn’t even know there were consumer grade WiFi transceivers that were strong enough to cover such a massive area. Was it a small farm or just a big property? That had to have been a pretty expensive WiFi system regardless. Did you use Ubiquiti directional access points or something?

    I have a sister that runs a small family farm and she asked my brothers and me (3 of us have IT backgrounds/careers) for viable coverage solutions to their various livestock areas. We settled on just running copper to one barn from her house and broadcasting from there with a few repeaters equipped with trunk channels in order to maintain full duplex.


  • Ackshually, being too close to high power radio frequencies isn’t safe. I remember at one base I was stationed at in Afghanistan, there was a smoke spot we all used to take breaks at. For some reason, I started developing really bad headaches and feeling kind of nauseous. I figured I was just acclimating to the local climate or something. After a few weeks, I was up on our building installing one of our satcom dishes on top of it when I noticed something. Right on the other side of the fence of that smoke area, was a ~2m high powered dish pointing just above above where the smoke area was. I pointed this out to the Norwegians that ran the camp and the break area was promptly moved, lol.

    But seriously, I do not understand the anti-5G nutters.





  • Well, I’m not a cybersec specialist, but my job requires us to comply with NIST cyber security frameworks, including going through external audits every year. In my opinion, your basic generalities are fine for those not working in that field specifically.

    However, for cyber security analysts and other specialists, I think specific subcategories are necessary. The reason being, IT is an absolutely massive field that contains a ton of specialties. As such, that means there are roughly an equal variety of malicious actors in the same field.

    There’s no such thing really as a general “hacker” anymore. Especially when you take into consideration the rapid expansion of state sponsored cyber attacks/warfare. You’ll have specialists for various types of:

    • phishing (e.g. targeting general pop/employees, or those going for specific people)
    • cryptography (e.g. those who try to compromise an org’s PKI, or people finding vulns to exploit expired certs like what happened with Azure last year)
    • vuln hunters/exploiters (e.g. people that monitor known vulnerabilities and probe orgs’ defenses to see if those vulns are present/unpatched/unmitigated, or even people who try to discover new ones)
    • malware engineers (e.g. fairly self explanatory, but malware is a very broad term and can come in numerous shapes and sizes, like even using infected images on a website to conduct RCE on mobile devices like what happened a year or two ago)

    Sorry, tangent is getting a bit long-winded now. Anyway, tldr; general terms are fine for laymen or non-specialists, but more precise terms are beneficial for experts in that field.





  • What an insane valuation, lol. I wonder how gullible their seeders/initial investors were when they pitched the company initially. Needing to get that much money to settle bills and debts just blows my mind. Shit like this is why I sold my AMD shares at its peak a few months ago and why it’s probably worth considering selling Nvidia now as it’s peaking. The AI boom may peak a bit higher, but I think the frenzy is going to begin waning within the next ~6 months as more and more investors realize the tech is still very limited outside of backend enterprise use (e.g. using LLMs to ingest all your SOPs, regulations, technical documents, etc. and then make it available for employees to query for random work questions).

    But who knows, I’ve been wrong before.