Yep, I've automated this so I have a PXE installer on our network that install Win8.1 Pro using the Microsoft key, then on first boot it installs all our apps, drivers, and retrieves the key from BIOS and activates with that. We end up with a consistant image state for all machines even across manufacturers. No more making an image for each model. This is all necessary because if you just let it detect the BIOS key at install, and the BIOS key is for Win 8 Pro, but you're installing 8.1 Pro, it won't work. This only works on Win8 and up, and only works if the computer does have a valid Pro license, which is all we ever buy. I don't know if MS would give their blessing on this method or not, but the end result is a properly licensed method.
.Net 3.5 installs fine through add features on Win2012/Win8, but there is a big gotcha. If your company uses WSUS, which most large ones do, it breaks it. So at that point you do need to break out DISM, or point Windows to the install CD/image as a source.
I played so much Descent 1/2/3 back in the day. My first LAN parties were all descent. We took over the school computer lab in the evenings and played there too. For Descent3, I participated in the Descent3 $50,000 contest, won a bunch of smaller prizes but not the big one (flew to San Jose from Canada). I'd love another official entry in the series. The fan made ones are OK but don't quite feel right. I'll have to bring my old Sidewinder 3dpro or Precision pro out of mothballs.
Well I doubt my grandmother (Oma) would have fabricated this story in the late 1980's or early 1990's, well before it would have spread around the 'net. I'll take her word for it and assume this sort of thing is common enough for variants of it to have happened or been made up elsewhere.
Several years back a new hotel opened in Niagara falls. Their phone number was 1 digit off my grand parents number. They started getting several calls a day, all hours of the day, looking to book rooms. They called the hotel several times and asked them to change their number but they refused and told my grandparents they should change theirs. My grandparents had that number for over 30 years so they refused. Eventually they got sick of being polite and telling people they had the wrong number, so they started "taking bookings". The situation was then quickly resolved when the hotel started having people showing up expecting a room. Hotel changed it's number and life went on. I know it sucked for the people who expected rooms, but they tried to be nice and polite for a few months.
We have a user here who got a new laptop last summer, it had a LED backlit LCD. Within 20 minutes she was calling saying it was making her feel sick/headache. We tried adjusting refresh rate, brightness, no help. Put a CFL backlit LED laptop in front of her and she was fine. Tried LED standalone monitor, it also bugged her though not as much. So, we had to find a laptop that had a CFL backlit screen, wasn't junk,and met our other requirements (docking connector mostly). Ended up getting a previous year model Toshiba Tecra with a Core2Duo.All the rest of the laptops we bought had i5's in them by that point.
Oh man, I'd be happy paying $700/GB at this point. A user of ours recently racked up $2000 in peru using less than 75MB.
Google has had a built in SIP client since gingerbread, no need for a sip client (though some may offer more features than the plain google one)
Regarding 19.2.3....Hmm, so I can't ride my motorcycle into an event and up the stairs to my seat, but I apparently can do that in my car?
snydeq writes "Since so many recent exploits have used Java as their attack vector, you might conclude Java should be shown the exit, but the reality is that Java is not the problem, writes Security Advisor's Roger Grimes. 'Sure, I could opt not to use those Java-enabled services or install Java and uninstall when I'm finished. But the core problem isn't necessarily Java's exploitability; nearly all software is exploitable. It's unpatched Java. Few successful Java-related attacks are related to zero-day exploits. Almost all are related to Java security bugs that have been patched for months (or longer),' Grimes writes. 'The bottom line is that we aren't addressing the real problems. It isn't a security bug here and there in a particular piece of software; that's a problem we'll never get rid of. Instead, we allow almost all cyber criminals to get away with their Internet crime without any penalty. They almost never get caught and punished. Until we solve the problem of accountability, we will never get rid of the underlying problem.'"
Microsoft is there this year, large booth, opening night keynote. NEXT year they won't be there, at least not in such a large way.
They say on their literature bags may be searched, but I've been walking around with my big vmworld 2011 backpack all week, never searched once. To the original question, I am a network admin at a non-profit religious denomination, not really in "the industry". I registered online, worked on my cover story, but in the end I didn't need it. They didn't even ask for my business card when I picked up my badge, just drivers license.
We do Veeam backups of our virtual infrastructure nightly. Once a week, a copy of that is taken offsite. Also, every night our Equallogic SAN's replicate with eachother. They are in three separate offices in North America. In the event one building burns down, is blown up by a nuke, or similar, we can fire up our entire virtual infrastructure in the failback location within a couple of hours (minutes really). Since we only have 3-4 non-virtualized servers, and none of them store important data, we're pretty well protected I think.
I believe you are wrong there. It says for their wholesale customers, they are allowed to bill based on connection speed, but not total monthly bandwidth usage. This means a small ISP would pay for a 100Mbit link, or 2 Gbit link, etc... It is billed in 100Mbit increments. ISP can use as much as they want, but they will only get that amount per second they paid for. This makes sense to me, you pay for the size of the pipe you need, doesn't matter how much data you put through the pipe.
I have one. Wireless just shuts off randomly every day, and under heavy load. Not all of them do this, but if you get one, there is no known fix. Does it both on stock firmware and DD-WRT. Netgear forums are littered with reports of it. I'm getting an Asus RT-N16 today to replace it.