The object of a system of authority is order, not justice. Justice matters only after injustice sufficiently compromises order.

  • 9 Posts
  • 640 Comments
Joined 2 years ago
cake
Cake day: August 8th, 2023

help-circle
  • A couple of them have been built and they’re just sitting there unpowered

    Most of them in California because that State simply cannot get its shitty power grid sorted out. The damn thing barely works at the best of times due to a combination of corruption, greed, and Government interference.

    As an example the utility company promised Digital Realty and Stack Infrastructure that they’d have the power ready for them by the time their DCs were built but…SURPRISE…they lied. The only fault for DR and SI here is trusting a California Utility to deliver on their promise.





  • I wonder what must happen to roll out more Linux in the public sector.

    Endpoint (device) management is mostly a solved a problem, the challenge lies in integrated systems that allow secured, controlled, and constant access to data in a way that is manageable at scale by hundreds, thousands, or even hundreds of thousands of users.

    That is where it gets wicked difficult and is what @[email protected] is referencing. To my knowledge there is no real F/OSS equivalent to the tooling that MS Entra provides for IAM, DLP and MDM. You can maybe get close with a full deployment of NextCloud but that’s really only replicating M365 functionality from 15 years ago.

    Is it ultimately possible if you piece enough packages and systems together? Probably but it would be a massive plate of spaghetti that only a team of highly experienced *nix managers could hope to properly support.

    You can definitely use a full F/OSS stack to replicate the functionality of a Windows Active Directory network but that’s so last century. Today’s organizations, no matter their type or size, demand more and they won’t move to F/OSS unless they can get it.




  • Sure but as @[email protected] noted MS is ending support for EWS in M365 in less than 12 months! So it took them 18 years to release something that still doesn’t fully work (no Calendaring support, WTF?) and won’t even be usable by this time next year.

    🤦

    If it only supported outdated Exchange servers that would be one thing

    The only Exchange server that ISN’T outdated at this point is the 4 month old Exchange Server Subscription Edition. All other versions are now EoL and have no support. So unless you have a very particular need to keep your EX environment On-Prem then you may as well migrate to EXO.

    If you are already using EXO then Thunderbird’s new EWS support will stop working next October.


  • I have a Win11 PC sitting here with a Core i5 8500t, 16G of RAM, 1T M.2 SATA NVME, attached to a three position KVM. Hooked to that KVM are three monitors (2 x DP, 1 x HDMI), wireless keyboard & mouse, Creative USB T60 speakers, and a USB WebCam (logi 970e). Since it’s a PC I use for work it’s Entra joined and InTune managed running Managed AV, MDR, and a DNS Filtering Agent. Oh, and the drive is encrypted with BitLocker.

    So I basically have as much USB attached crap as you do, sans hard drives, and it’s going through the USB Hub that’s built into my KVM.

    Time from power off to usable desktop for that machine is under 40 seconds.

    Your external hard drives are a likely culprit. I’d guess that they are either on an older interface or your PC is set to do a full AV scan of attached drives at boot.

    Don’t get it twisted, Microsoft and their products piss me off on a daily basis. I’m not defending them.





  • The GFW is about logging, mining, and controlling Internet traffic and data but your comment is about phone calls. These two things are only loosely related.

    The article purports that the GFW is able to track electronic documents so closely that it can tie them to an actual individual. Assuming that’s true it positively refutes the notion that the GFW is “futile”. If the article and data leak are accurate then we also have proof that the GFW has the capability to detect many kinds of VPN despite strong obfuscation efforts and potentially decrypt the data streams. That is not “futile”, it’s scary AF.

    Specific to phone calls you and your Aunties can chatter about whatever you like but there’s a strong possibility that those calls are being recorded, transcribed, and reviewed by automated systems for potential real world action. We know that the American NSA has this capability so it’s a near certainty that the Chinese Government does as well.