|
Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card.
|
# ? Jul 17, 2017 07:28 |
|
|
# ? Jun 7, 2024 05:21 |
|
Super Slash posted:Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card.
|
# ? Jul 17, 2017 07:57 |
|
Super Slash posted:Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card. Sounds like a great way to get kidnapped by the government because that's obviously alien technology.
|
# ? Jul 17, 2017 08:09 |
|
Dr. Arbitrary posted:You ever look at old games and wonder like, what's Dave Baskin up to these days? I remember owning my nieces at this game once I discovered you could move with the arrow keys as well as the 1,2,3 buttons (which was way faster).
|
# ? Jul 17, 2017 09:23 |
|
This made me laugh way harder than it should. Thank you.
|
# ? Jul 17, 2017 10:38 |
|
DelphiAegis posted:I took some time to program, in BASIC, 99 bottles of beer on the wall. Except I can't remember what happened when we got to 0 now. If $bottleCount=0 then print "No more bottles of beer on the wall." HTH
|
# ? Jul 17, 2017 14:39 |
|
Zil posted:Follow up, shits still broke. People still pissed. My liver will suffer this weekend. Follow up to the follow up, everything appears to be on fire, downtime nearing the hundred hour mark. Users are pissed and rioting may be imminent. Have locked my office door in attempt to give time to escape out the window. Send Zil fucked around with this message at 15:16 on Jul 17, 2017 |
# ? Jul 17, 2017 15:11 |
|
Keep a whiteboard on your door that says "Uptime 99.999" and keep erasing 9s as the days go on. 100 hours I think drops you to just "99%" but it still looks fancy when people come to your door with pitchforks.
|
# ? Jul 17, 2017 15:22 |
|
Judge Schnoopy posted:. 100 hours I think drops you to just "99%" but it still looks fancy when people come to your door with pitchforks. 98.9%
|
# ? Jul 17, 2017 17:13 |
Chunjee posted:So tired of everyone using their own mappings. This exact problem just hit again today. Fix never went into prod because of code freeze. Maybe I'm dumb but how weak do you have to be to not push for an exception when it makes sense.
|
|
# ? Jul 17, 2017 17:14 |
|
A ticket came in. Sorry, I mean A TICKET CAME IN. Subject: PHONE quote:I NEED A PHONE Previously from this same person: quote:Hey I need some ink tonner in my printer
|
# ? Jul 17, 2017 17:30 |
|
Most people seem to think you need to do something for a phone to work at a different desk. People are constantly shocked when I tell them to just move the phones instead of giving me a list of 20 people that are playing musical chairs. Look if you don't want to do it I'll go down there and do it because it's quicker, the UI to change this stuff is garbage and takes about 3-4 minutes per phone and no way to do multiple at the same time. You just gave me an hour of work to do on the backend, or 20 minutes going around getting all the phone, or each person can do it and it's 5 minutes. People are happy to just go pick up their old phone thankfully, but I'd seriously run around like a moron over dealing with the lovely phone's lovely backend.
|
# ? Jul 17, 2017 17:43 |
|
Phones are second only to printers on the list of "things you should try really loving hard to have nothing to do with"
|
# ? Jul 17, 2017 18:32 |
|
pixaal posted:Most people seem to think you need to do something for a phone to work at a different desk. People are constantly shocked when I tell them to just move the phones instead of giving me a list of 20 people that are playing musical chairs. To be fair, it used to be this way before IP phones came around. pixaal posted:Look if you don't want to do it This has always been the case, and is unlikely to change.
|
# ? Jul 17, 2017 18:32 |
|
We have IP phones that hold onto their number so you can just move them around but main grounds still makes us put in a moverequest with them and charges us money for the move just so they can keep the E911 database up to date.
|
# ? Jul 17, 2017 18:43 |
|
Boogalo posted:We have IP phones that hold onto their number so you can just move them around but main grounds still makes us put in a moverequest with them and charges us money for the move just so they can keep the E911 database up to date. Our E911 is set to the primary site by the software and as a "security" feature can only be changed by the end user not an admin. Guess how many remote users have setup their E911 info? It's the same number of remote that even know you CAN log into the web portal and do all sorts of stuff for your phone. The answer is 0. I have 1 user at the primary site that has logged in and they use it all the drat time for everything. They don't even use their desktop they paired bluetooth with their computer and are using the soft phone because they prefer that. If the person wasn't so close to retiring that a career shift would be insanity I'd seriously try and get them to make use of their love of phones working in IT as a dedicated phone specialist. They are also a crabby user and refuse to help anyone mostly with "if I can figure it out they can too *mumbled laughter* if they can't you can!"
|
# ? Jul 17, 2017 18:48 |
|
pixaal posted:Most people seem to think you need to do something for a phone to work at a different desk. People are constantly shocked when I tell them to just move the phones instead of giving me a list of 20 people that are playing musical chairs.
|
# ? Jul 17, 2017 18:49 |
|
Thanks Ants posted:Phones are second only to printers on the list of "things you should try really loving hard to have nothing to do with" This x1000
|
# ? Jul 17, 2017 19:52 |
|
phones are hell, printers are hell, faxes are both
|
# ? Jul 17, 2017 19:58 |
|
Phones are great, the user's one-off requests are the bad part. Faxes should have been eliminated from the planet the very second the first email was sent.
|
# ? Jul 17, 2017 20:12 |
|
Why would any company with its own PBX have it setup in such a way that accounts are tied to the IP of the phone? Or am I reading that wrong and somehow moving a phone requires more than "plug it in" after its provisioned because of another reason than tying it to the IP?
|
# ? Jul 17, 2017 20:52 |
|
Jeoh posted:phones are hell, printers are hell, faxes are both I guess I've been lucky on the phone front.. Our phone requirements are simple. No one has assigned phones/desks, and there is no dedicated operator/receptionist. (these are retail stores). We use Avaya IP Office 500 systems in Basic mode with digital sets (not IP) and POTS lines. No VoIP at all. The only thing I have to change outside of the default configuration is the number of POTS lines available, which port is the paging output, and set-up an after hours announcement. We don't even use voicemail at our branch locations. Plug in the phones and it's ready to go. Phones are on physically separate wiring from the LAN, but its all CAT5e to RJ45 jacks and patch panels, so we could go with IP phones in the future. We come from Avaya Partner ACS analog systems; IP Office 500 in Basic mode basically emulates 95% of the Partner ACS system behaviors and functionality. Once configured and working, with exception of changing the after hours announcement occasionally, we never have to touch the config or the system itself again.
|
# ? Jul 17, 2017 21:01 |
|
ratbert90 posted:Why would any company with its own PBX have it setup in such a way that accounts are tied to the IP of the phone? PBXs more commonly tie accounts to MAC addresses, not IPs. A well configured DHCP server can provide options so the PBX updates the 911 location, but I think this is incredibly rare to see in use. So if a phone is carried from Building A Floor 2 to Building B Floor 1, the 911 data will not be correct. In most cases the PBX will have to be updated to put the phone in a different 911 location pool.
|
# ? Jul 17, 2017 21:04 |
|
Thanks Ants posted:Phones are second only to printers on the list of "things you should try really loving hard to have nothing to do with" Sharepoint: hold my beer
|
# ? Jul 17, 2017 21:05 |
|
I really enjoy working with CUCM on a regular basis and have no problems managing phones on the day-to-day. Sharepoint can stuff a flaming lemon up it's rear end in a top hat.
|
# ? Jul 17, 2017 21:21 |
|
A wild goose chase ticket came in... Some mystery employee is harassing a female coworker, and they did so by way of a Google Form. I have the email address the Google Form was sent from. Is there an easy way (i.e. an app) to log in to each PC we have by way of administrative share, and check for saved logins in Chrome? I don't need the passwords, I just need to see if anyone has a saved login that matches that Gmail address and they're busted. I doubt they went through the trouble of covering their tracks with Incognito or anything.
|
# ? Jul 17, 2017 21:22 |
|
ratbert90 posted:Why would any company with its own PBX have it setup in such a way that accounts are tied to the IP of the phone? Users think it requires more, which can lead to headaches where you go to the building across the street and just do it yourself because they don't believe you that you don't need to mess with stuff on the server.
|
# ? Jul 17, 2017 21:28 |
|
Zero VGS posted:A wild goose chase ticket came in... I mean if you have admin access, you could do a windows search but include file contents and search for that specific email address. Wouldn't there also be connection logs around the time that form was submitted, can just narrow it down to whom was on the form around that time.
|
# ? Jul 17, 2017 21:33 |
|
Oh goodie, phones. We've been using Cisco IP phones here for 8+ years (IE, since I got hired back on) with no serious issues that I know of. Multiple buildings spread across the city, no problem really, phone number would follow you if you moved. Until *someone* decided that all the 4-digit phone numbers *really really* needed an additional 2-digit prefix attached, to designate what location/program that person/department was located at! ("*Someone*" being some clueless C-level, I'm sure.) So now, everyone has a number that changes every time they change locations. : Did I mention this is included on everyone's business cards, appointment cards, various pre-populated paperwork and of course passed on to the mentally-ill clientele?
|
# ? Jul 17, 2017 21:40 |
|
If I want to QoS stuff going across an IPsec tunnel, I need to QoS the traffic and then also QoS the tunnel, I assume? Anybody know how to do that on a FortiGate, since I'm doing a basic rule (from any to any protocol 50) and not getting any hits. I'm aware that QoS and VPN tunnels across the Internet isn't a great idea, but it's for testing at the moment until we switch to a non poo poo-tier ISP that offers ExpressRoute.
|
# ? Jul 17, 2017 21:45 |
|
Zero VGS posted:A wild goose chase ticket came in... Phone posting, so I don't have a link, but nirsoft has a tool that will do this.
|
# ? Jul 17, 2017 22:29 |
|
Super Slash posted:Now just imagine travelling back in time at that very moment to demonstrate a 256gb Micro SD card.
|
# ? Jul 17, 2017 23:13 |
|
Collateral Damage posted:I've saved an issue of a local computer magazine from 1988 where there's a small article about the first gigabyte SCSI hard drive becoming available, and it mentions that "it's intended for companies with extreme storage needs, and it's unlikely that end users will ever have a need for hard drives this large." I have a receipt somewhere that proves I paid something like $749 bucks for a 1.000 gig Micropolis 50 pin SCSI drive circa 1995. I needed it for my Macintosh Performa 600 (4mb ram, 160mb HD, 68030 @ 32mhz) because I filled up the 160 megger.
|
# ? Jul 17, 2017 23:23 |
|
Thanks Ants posted:If I want to QoS stuff going across an IPsec tunnel, I need to QoS the traffic and then also QoS the tunnel, I assume? Anybody know how to do that on a FortiGate, since I'm doing a basic rule (from any to any protocol 50) and not getting any hits. I have not done QoS over an IPsec tunnel in a fortigate, but I know for QoS to work on standard ports you need to put inbound/outbound bandwidth (so if it's you WAN you put in your WAN down/up rates) so that QoS knows when to start dropping packets, this can only be done via CLi. Here is the KB article for that: http://kb.fortinet.com/kb/documentLink.do?externalID=FD36248 You might just need to contact their support about doing it over an IPSec tunnel though, especially since you aren't seeing hits on the policy, sorry I can't help further Also just found this: VLAN, VDOM and virtual interfaces Policy-based traffic shaping does not use queues directly. It shapes the traffic and if the packet is allowed by the security policy, then a priority is assigned. That priority controls what queue the packet will be put in upon egress. VLANs, VDOMs, aggregate ports and other virtual devices do not have queues and as such, traffic is sent directly to the underlying physical device where it is queued and affected by the physical ports. This is also the case with IPsec connections. http://docs.fortinet.com/uploaded/files/1049/fortigate-traffic-shaping-40-mr3.pdf So it seems if you follow the KB for setting up QoS, it should apply to the IPSec tunnel once you get it all setup correctly, at least that's what I am gleaning from reading that. MF_James fucked around with this message at 00:36 on Jul 18, 2017 |
# ? Jul 18, 2017 00:31 |
|
The Fool posted:Phone posting, so I don't have a link, but nirsoft has a tool that will do this. Thanks, Nirsoft ChromePass works if I path it to \\PCname\c$\Users\User
|
# ? Jul 18, 2017 00:54 |
|
A ticket came in... And it was not worked. Summer is our slower season, so instead of a stupid convoluted process of call - > ticket - > t2 investigate - > email - > t2 in another department investigate - > client -> response then back through that entire chain clusterfick, we figured to let the t2 Dept that was separate and now merged just work the ticket directly. And they won't. My team has sub-day Turn around times (internal SLA is 5 bad) whereas they have items not touched since before the July holiday. Going to be fun watching their feet held to the fire.
|
# ? Jul 18, 2017 01:32 |
|
A ticket came in...a month ago. And was completely untouched for the entire duration until the reporting person followed up to ask what the heck was going on. Apparently it went something like this: 1. User files a bug on $Application 2. The Tier 1 support in question has no list of "what team owns what apps" () 3. Tier 1 support searches Jira for tickets relating to $Application in an attempt to figure out who owns it, but our reporting software searches don't sort by "Last Updated" by default so 4. Tier 1 support, using a dead ticket last updated six years ago, assigns the new ticket to the account of a QA contractor that hasn't worked here in at least that long. 5. A month later, User follows up and escalates to T2 support, who comes to me and asks if there's been any movement on this ticket that I didn't know existed until that point. 6. Bug is resolved and deployed in under a business day. Nobody's being thrown under any bus about this, which is Good, but the real is that my question about "how can we make sure this doesn't happen again" has been met with pretty much "I'm sure it'll be fine" at all levels. Compounding the is that I know we have at least 3 locations where app ownership is recorded and kept up-to-date for ops, noc, and security escalations, but apparently support just isn't in on that loop for reasons? I guess we just hate money, since the user in question was on the cusp of cancelling a subscription with us over a bug that took all of five minutes of dev time to fix
|
# ? Jul 18, 2017 02:52 |
|
Zero VGS posted:A wild goose chase ticket came in... This is also horribly illegal since you are remotely accessing data you have no right to access, by the sound of it you are also aware that these are private credentials, which a company is not allowed to use ever. This is almost on the same level as hijacking a employees browser/session/login info to 'check their facebook' or something like that. Not even the police is allowed to do what you are attempting without a (very restrictive and hard to get) warrant. Probably also matches several federal laws about hacking, I advise you document this and clearly state to your employer that you can not fulfill this request and that sexual harassment needs to be referred to the police. Do not do this without a written order, preferably on paper. Even then you might still be personally liable. E: I know it is easy to forget with all the technical possibilities we have as administrators, but the legal implications (thankfully) are still there when it comes to interfering with things that are considered 'private'. Just because you can reset any users windows password and then log into their private email and online banking and whatever else they might have used at work, doesn't mean you should. I guess windows needs the good old linux sudo prompt as a reminder as well. code:
SEKCobra fucked around with this message at 07:43 on Jul 18, 2017 |
# ? Jul 18, 2017 07:38 |
|
SEKCobra posted:This is also horribly illegal since you are remotely accessing data you have no right to access, by the sound of it you are also aware that these are private credentials, which a company is not allowed to use ever. This is almost on the same level as hijacking a employees browser/session/login info to 'check their facebook' or something like that. Depends on the site policy. If they show that harassment came from company resources, I think they would be able to get away with it, if their policy people aren't complete idiots.
|
# ? Jul 18, 2017 09:20 |
|
|
# ? Jun 7, 2024 05:21 |
|
Samizdata posted:Depends on the site policy. If they show that harassment came from company resources, I think they would be able to get away with it, if their policy people aren't complete idiots. Since it isn't a company email (or he wouldn't have to search the local PCs) it isn't a company resource. Doesn't matter if he might have used the PC (which you can't prove anyway, even if that email is stored anywhere) you still can't illegally search for it.
|
# ? Jul 18, 2017 10:26 |