|
ACValiant posted:Anyone have any experience working contract-to-hire jobs? A recruiter reached out on LinkedIn about one and the idea seems scary to me but I don't have a lot of experience with them. Maybe I shouldn't be? Do you have a permanent position? Is it a huge upgrade? If yes and no, respectively, don’t do it. If finances go bad, you won’t get converted. You don’t get holidays or PTO, the health insurance is going to be crappy (and might be gone depending on what healthcare bill passes), and you tend to get paid less than if you were a FTE. At least that last part is my experience. It might be a regional thing, some people say they got paid more. Around here it’s 90% of positions at least until you get pretty far up the food chain. At this point it would have to be a hell of a job or my job would have to be hell to go back to C2H.
|
# ? Jan 14, 2018 01:45 |
|
|
# ? May 24, 2024 12:39 |
|
Never worked a contract job that paid less per hour than employee. That makes no sense and would be a massive fuckin' red flag. The real question is: Would you take this job if it was only going to be contract and not converted? If the answer is no, then don't. Simple.
|
# ? Jan 14, 2018 01:56 |
|
Thank you for this. Dick Trauma posted:I lived here in L.A. back in '82 when Blade Runner came out, and I remember that opening shot and hoooolllllly poo poo my brain started to melt. It was an amazing experience. 2019 seemed so far away! God drat dude, that sounds loving magical. Like I want to just get high and you can tell me stories about LA in the 80s.
|
# ? Jan 14, 2018 05:14 |
|
Ranter posted:Never worked a contract job that paid less per hour than employee. That makes no sense and would be a massive fuckin' red flag.
|
# ? Jan 14, 2018 15:21 |
|
Hey it's been a while since we've talked about Antivirus software, so... https://twitter.com/SwiftOnSecurity/status/952282362016075776 https://twitter.com/4n68r/status/952213822252683264 GnarlyCharlie4u fucked around with this message at 16:35 on Jan 14, 2018 |
# ? Jan 14, 2018 16:32 |
|
adorai posted:There are two kinds of contracting. 1099 and w2 at a third party. w2 at a third party usually isn't going to pay as much as an fte at the company you are sitting at, because they are performing the work for the same amount or less, and have to skim off the top for their administrative function. This isn’t necessarily true. I’ve worked W2 contract-to-hire where I was paid notably better than the fte’s. The fate gets he benefits of not carrying those salary liabilities on their balance sheet and having an easier route to a lawsuit free firing. Plus the benefits will often be worse at the contracting company.
|
# ? Jan 14, 2018 17:10 |
|
adorai posted:There are two kinds of contracting. 1099 and w2 at a third party. w2 at a third party usually isn't going to pay as much as an fte at the company you are sitting at, because they are performing the work for the same amount or less, and have to skim off the top for their administrative function. I've been a W2 sub contractor and because the company I was technically an employee of had lovely benefits vs. the company I was placed at for 12 months on a project, I made more than the employees per hour. But I didn't have 401k matching, 3 weeks paid vacation, if the office shut down and no one was working then I didn't get paid etc. Where I am at now we use Tek Systems for desktop techs (and are about to switch to a better, smaller provider that gives their employees ((our techs)) 401k matching and paid vacation for the same $) and because we found the techs ourselves then referred them to tek systems, we dictated exactly how much a. the tech gets paid and b. how much we pay tek total (so we know exactly how much they're skimming for taking on the liability of a W2 employee). Bald Stalin fucked around with this message at 18:43 on Jan 14, 2018 |
# ? Jan 14, 2018 18:39 |
|
Hope y’all didn’t already patch your ESX hosts for Spectre. https://kb.vmware.com/s/article/52345
|
# ? Jan 14, 2018 23:01 |
|
YOLOsubmarine posted:Hope y’all didn’t already patch your ESX hosts for Spectre. ahaahaha
|
# ? Jan 14, 2018 23:11 |
|
Antioch posted:God drat dude, that sounds loving magical. Like I want to just get high and you can tell me stories about LA in the 80s. One of the few interesting parts of my life was being a teenager in Los Angeles from the early eighties onward. Culturally it was the heart of that era, even if like all past times it gets horribly mangled by the generations that followed. I owned no headbands nor any ripped sweatshirts.
|
# ? Jan 14, 2018 23:36 |
|
CLAM DOWN posted:ahaahaha https://www.youtube.com/watch?v=-h1F93EJIds
|
# ? Jan 14, 2018 23:41 |
|
The CEO has discovered that our Glassdoor page has one review, a very negative one from someone the company hosed over. He emailed general counsel, the COO and myself asking how he can get the review removed, if there's legal action we can take against the former employee, or if (like at the Tony job) we can oblige all of our employees to write a favorable review. I hate these loving people. They're all the same.
|
# ? Jan 14, 2018 23:43 |
|
lmao that's always their response. At no point would they be prepared to take some responsibility for the events or environment that was created that led to somebody leaving on bad terms. We've had probably in excess of ten people leave our company and cite one person as the reason why, who happens to be the CEO. There's always a lot of mental gymnastics that get deployed to make excuses.
|
# ? Jan 14, 2018 23:46 |
|
Leave your own bad review. Encourage others to do the same.
|
# ? Jan 15, 2018 02:52 |
|
YOLOsubmarine posted:Hope y’all didn’t already patch your ESX hosts for Spectre. CLAM DOWN posted:ahaahaha I'm at home but it's blank for me. What does it say?
|
# ? Jan 15, 2018 03:52 |
|
kensei posted:I'm at home but it's blank for me. What does it say? Intel Sightings in ESXi Bundled Microcode Patches for VMSA-2018-0004 (52345) Document Id 52345 Purpose Although VMware strongly recommends that customers obtain microcode patches through their hardware vendor, as an aid to customers, VMware also included the initial microcode patches in ESXi650-201801402-BG, ESXi600-201801402-BG, and ESXi550-201801401-BG. Intel has notified VMware of recent sightings that may affect some of the initial microcode patches that provide the speculative execution control mechanism for a number of Intel Haswell and Broadwell processors. The issue can occur when the speculative execution control is actually used within a virtual machine by a patched OS. At this point, it has been recommended that VMware remove exposure of the speculative-execution mechanism to virtual machines on ESXi hosts using the affected Intel processors until Intel provides new microcode at a later date. Resolution Note: All the patches associated with VMSA-2018-0004 have been pulled back from the online and offline portal. VUM Customer who has already downloaded the patches associated with VMSA-2018-0004 would continue to persist in the VUM depot even after the EP is rolled-back. But, if customer tries to remediate the corresponding patch baseline created against the bulletins of these patches, following error would be encountered - "Cannot download software packages from patch source". For Customers who have configured UMDS for offline patching, the patches associated with VMSA-2018-0004 continue to persist in the UMDS depot directory even after roll-back and can be patched successfully from the same. It is recommended that such customers manually remove the binaries/VIBs from the UMDS directory or direct the downloads to the new UMDS directory location to be in-sync with VMware’s online depot. For more information see How to configure the UMDs download location. Customers who use Stateless boot through Autodeploy will have to update the existing rule to point to the image profile associated with VMSA-2018-0002 instead. If you continue without updating rule, the Autodeploy would stateless boot into the image associated with VMSA-2018-0004 which is not intended. For ESXi hosts that have not yet applied one of the following patches ESXi650-201801402-BG, ESXi600-201801402-BG, or ESXi550-201801401-BG, VMware recommends not doing so at this time. It is recommended to apply the patches listed in VMSA-2018-0002 instead. For servers using the Intel Haswell and Broadwell processors (see Table 1 for the specific list of affected VMware vSphere supported Intel Haswell and Broadwell processors) that have applied ESXi650-201801402-BG, ESXi600-201801402-BG, or ESXi550-201801401-BG VMware recommends the following: On each affected ESXi host, add the following line in the /etc/vmware/config file: cpuid.7.edx = "----:00--:----:----:----:----:----:----" This will hide the speculative-execution control mechanism for virtual machines which are power-cycled afterwards on the ESXi host. This line will need to be removed after applying a future fixed microcode from Intel in order to enable the full guest OS mitigations for CVE-2017-5715. When convenient, power-cycle virtual machines on the affected ESXi hosts; rebooting of the ESXi host is not required. Stateless vSphere ESXi Hosts using ESXi 5.5 or 6.0, this line must be re-applied every time the ESXi host reboots. VMware is investigating other options at this time. Note: For servers using unaffected processors which have applied either the VMSA-2018-0002 or ESXi patches ESXi650-201801402-BG, ESXi600-201801402-BG or, ESXi550-201801401-BG, no action is required. The effect of these recommendations for an affected ESXi host is that the speculative execution control mechanism is no longer available to virtual machines even if the server firmware provides the same microcode independently. (For customers who have applied the same microcode updates from their server vendor’s Firmware/BIOS, this recommendation may remove the need to downgrade the firmware. Consult your server vendor directly for guidance.) VMware is working closely with Intel and the industry to come to a quick resolution of this Intel microcode issue and provide an update to our customers as soon as possible.
|
# ? Jan 15, 2018 03:55 |
|
Dick Trauma posted:The CEO has discovered that our Glassdoor page has one review, a very negative one from someone the company hosed over. He emailed general counsel, the COO and myself asking how he can get the review removed, if there's legal action we can take against the former employee, or if (like at the Tony job) we can oblige all of our employees to write a favorable review. Yeah, there isn't nothing quite like working for a CEO like that. Let me guess, you are on the beck and call for all the CEO's needs and him/her goes directly to you side-stepping your immediate boss. Scalar principle be damned, because why does it matter since your boss was probably hired by the CEO and are neighbors and are best buds.
|
# ? Jan 15, 2018 05:26 |
|
Colostomy Bag posted:Yeah, there isn't nothing quite like working for a CEO like that. Let me guess, you are on the beck and call for all the CEO's needs and him/her goes directly to you side-stepping your immediate boss. Scalar principle be damned, because why does it matter since your boss was probably hired by the CEO and are neighbors and are best buds. Oh you’re new. Dick trauma is basically the bitch of all jobs. His name is basically his life.
|
# ? Jan 15, 2018 05:28 |
|
Grassy Knowles posted:Intel Sightings in ESXi Bundled Microcode Patches for VMSA-2018-0004 (52345) Thanks!
|
# ? Jan 15, 2018 05:39 |
|
Assuming YOLOsubmarine even lives through the night after that Saints game, thanks for the heads up on the patch notes.
|
# ? Jan 15, 2018 07:08 |
|
Dick Trauma posted:The CEO has discovered that our Glassdoor page has one review, a very negative one from someone the company hosed over. He emailed general counsel, the COO and myself asking how he can get the review removed, if there's legal action we can take against the former employee, or if (like at the Tony job) we can oblige all of our employees to write a favorable review. Next will be they pay all their employees $10 to leave a positive review
|
# ? Jan 15, 2018 14:22 |
|
Kashuno posted:Next will be
|
# ? Jan 15, 2018 14:37 |
|
Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners. He now finished that and wants to interrogate employees who were at the office during off hours. Sadly, I don't know how I can help with finding the person who installed the miners. The person used the local admin account on the public pc's.
|
# ? Jan 15, 2018 14:58 |
|
Just have an interview with everyone and find out their opinion about "future opportunities of cryptocurrencies". When you find the most enthusiastic one you've found your culprit.
|
# ? Jan 15, 2018 15:06 |
|
Sefal posted:Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners. Why do public PCs have local admin access?
|
# ? Jan 15, 2018 15:17 |
|
The Iron Rose posted:Why do public PCs have local admin access? Very good question. I wondered the same thing when I joined this place. At the very least, My boss has finally started to listen to me and let me revoke admin privileges on them
|
# ? Jan 15, 2018 15:19 |
|
Sefal posted:Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners. You have a pc and a time it was installed. You don't have authorization because it was a shared admin account and you don't have identification because you weren't tracking employee badges at the door. You essentially have nothing and can't possibly take action against anyone even if you're really really really sure you know who it was. The best you can do is shore up your security methods and know you'll catch them if they try again.
|
# ? Jan 15, 2018 15:24 |
|
The Iron Rose posted:Why do public PCs have local admin access? An application was playing up so 'Everyone' was added to 'Domain Administrators' and it fixed it.
|
# ? Jan 15, 2018 15:26 |
|
Judge Schnoopy posted:You have a pc and a time it was installed. You don't have authorization because it was a shared admin account and you don't have identification because you weren't tracking employee badges at the door. Yeah. I figured as much. This is what we are doing now. This event really shook my boss up. Boss: "I expect the people who are working here to be adults, But i'm dealing with children" I'm just glad it wasn't a crypto virus that got us. Now we can actually up our security.
|
# ? Jan 15, 2018 15:30 |
|
Thanks Ants posted:An application was playing up so 'Everyone' was added to 'Domain Administrators' and it fixed it. To oh hey. So welcome to the recommended advice on stack exchange, pretty much all the normal sites... Troubleshooting a SCCM permissions thing, turns out you need to explicitly grant server$ full control over your OSD share or you'll get unhelpful errors. Except standard advice to fix it is "oh just give everyone full control over the share for the duration of task sequence creation and swap it back after"
|
# ? Jan 15, 2018 15:39 |
|
Sefal posted:Every employee is assigned a security badge, so you can enter the office. The database for this was never updated.(go figure) So my boss is now sitting at the reception desk with his laptop. Monitoring who enters with the badge so he can update the database and find out who came in the office during off hours. All to find the person who installed bitcoin miners. Use that pool of volunteers to narrow your suspect list further.
|
# ? Jan 15, 2018 15:58 |
|
Just send out an all staff email insisting that cryptocurrencies are dumb and over and see who jumps in to defend them.
|
# ? Jan 15, 2018 17:22 |
|
Sefal posted:Yeah. I figured as much. This is what we are doing now. This event really shook my boss up. Sounds like your boss is the loving child.
|
# ? Jan 15, 2018 17:28 |
|
Sorry, why?
|
# ? Jan 15, 2018 17:28 |
|
Internet Explorer posted:Sounds like your boss is the loving child. MC Fruit Stripe posted:Sorry, why? Yeah I am lost too.
|
# ? Jan 15, 2018 17:42 |
|
I like my boss. As a person, he's ok. It's just that I've been fighting him for over a year on changing our security policies. Local admin being the biggest one. It really is a blessing that it was just miners. I hope I can finally get it through his head. That whether or not he's dealing with adults or children, an unsuspecting user with no malice in mind can get his pc crypto infected and have it spread easily with the local admin stuff.
|
# ? Jan 15, 2018 17:55 |
|
There is malware that mines bitcoin only outside of office hours to avoid detection. It is more likely malware than an employee bitcoin mining on a work computer
|
# ? Jan 15, 2018 18:36 |
|
MC Fruit Stripe posted:Sorry, why? For the same reason that the CEO trying to put the genie back in the bottle on Glassdoor is a loving child for trying to sweep the real problem under the rug by forcing employees to do a positive review, threatening legal action, etc., instead of properly doing his job and improving the company organically. From the sound of it, this boss was constantly in the way when employees underneath him were trying to actually fix the problem. Now he's incompetently flailing around trying to "fix" the problem. What really rubbed me the wrong way was the "I expect the people who are working here to be adults, But i'm dealing with children" comment. No, you're working with people and people do stupid poo poo. Part of your job is to make sure that they can't do that stupid poo poo, whether it's on purpose or on accident. He's being the childish one if he thinks that's how he thinks the world works, that's how he thinks IT works, and it's made even worse because it is forcing people under him to do a poo poo job. Sitting at the receptionist desk with his laptop? "Interviewing" employees? What an embarrassment.
|
# ? Jan 15, 2018 18:41 |
|
Sefal posted:I like my boss. As a person, he's ok. It's just that I've been fighting him for over a year on changing our security policies. Local admin being the biggest one. It really is a blessing that it was just miners. Application whitelisting. loving do it.
|
# ? Jan 15, 2018 18:42 |
|
|
# ? May 24, 2024 12:39 |
|
MC Fruit Stripe posted:Assuming YOLOsubmarine even lives through the night after that Saints game, thanks for the heads up on the patch notes. It was far too funny an ending to get too broken up about, but thank you for the kind words in this trying time.
|
# ? Jan 15, 2018 18:53 |