I'm pretty sure thats not happening
I'm pretty sure thats not happening
So you can turn off Microsoft accounts by policy, and the long term servicing branch has little support for these features.
Also my end customers don't have local admin (which you need to encrypt the system yourself - outside our solution).
Anyhow that has been my solution for this sort of thing.
By Vendor's - you mean Apple. Its been a very long time since I've seen a phone that doesn't charge via usb (asides from the iphone).
Serious question - why should any software vendor have to support anything 8-10 years old for free? Why not do what Microsoft does and just patch the crypto libs along with the OS on a regular cycle.
As someone who has done quality assurance - testing these patches has to be an absolute nightmare.
This part is actually FUD I think. This particular Dell private key does not chain up to a trusted root CA.
Also - Windows will only install drivers silently that are Microsoft WHQL signed - they are the only ones who sign these drivers, and this key does not chain up to that either.
At most you could sign a driver with this key, and install said driver onto a machine that had the public key already installed - assuming you had local admin as well - and for a user mode driver (like a printer) it will give you a soft warning "are you should you really want to do this", for a kernel mode driver it will give you a red "this will potentially harm/wreck this computer" warning.
Yes this is a terrible security problem, but the attack surface is relatively small (none of the Dell PC's I had - have this cert - I believe it only gets installed when using the support portal's check my serial/warranty feature).
I could get those apps running on Windows 7 x86 no problem.
Not that is a solution, but its certainly better than what they have.
Like anyone cares about breaking labor rules. The watchdogs (as many on here fondly point out) are an aging dinosaur.
There are plenty of cases of industrial accidents with thousands of labor board complaints that no-one did anything about, and during a conservative regime its even worse.
There's a reason you'd want to emulate an Amiga or a C64 - there are some cool games you can play on it.
One problem with OS/2 is it ran all the same apps that Windows did - other than vertical markets (like ATM's, zOS management etc) OS/2 had the exact same apps Windows does.
Sure OS/2 was more reliable than Windows 3.1 or Windows 95 (when OS/2 Warp shipped), but with Windows NT that all changed.
Even though 12 bucks an hour is above Virginia's minimum wage - there's plenty of research that if minimum wage was tied to inflation it should be around 22 dollars an hour.
I'm genuinely surprised congress doesn't talk about this more often - or as you suggest a guaranteed basic income wage (actually I'm not surprised this isn't a topic) - or at the very least corporate housing like they do in China.
Why not call both? You're acting like the paramedics who rush out there have zero clue how to get a hold of local security.
I work at a university campus - local security work closely with the police and they know to get a hold of them and absolutely rely on them to direct the real paramedics/police to the situation.
I work for a union shop in IT - and while the organization is under constant attack our contract has a section outlining the rules for hiring outside contractors. We actually have really qualified people working here. I think stability attracts those kinds of people even though we pay less than most places in town.
I've found enforcing the contract relies on catching management in the act, but at least there is a process lowly me can take that the upper upper upper executives take seriously - and if the violation is egregious enough lawyers can get involved, but I've never seen that happen.
So for anyone who has worked for the government I've seen this scenario play out dozens of times. So what happens when the IT department can't or simply won't keep up with customer demands? Customers outsource those demands - and these days you really can run all of your essential IT services from various cloud providers. There's even a Gartner term for this - "Shadow IT". So the money gets spent anyhow, without any oversight or governance that their central IT department has mandated as a policy. Worse - when the guy who setup said system moves on - the central IT dept often has to take over and manage this now essential system.
Windows XP working as a file server for license plate cameras? Please - that has shadow IT written all over it. Guy needed a file server, the IT guys told him to fuck off (because they have no money or staff), so he rummaged around for whatever piece of shit would power up and used that. And now thats its a national news article - guess what central IT's next project is? If he really cared about IT governance the file server wouldn't be a single XP box, with internal storage. This could have been a VM using some network storage system for FAR less.
These days any IT dept really needs to do what it takes (and that means having a CIO with the political willpower) to make IT keep pace or at least placate these requests in some way. One thing we would do is go ok - your budget, your servers, but we spec them to our standards, they live in our data center, use our storage systems, our backups and our physical/endpoint security.
PCI Compliance? While I agree its not 100% perfect - having documentation from some compliance officer at your company that you met or exceeded all their baseline recommendations should get you out of hot water if something bad were to happen.
If you work in the medical field - there's HIPAA - which again most hospitals, clinics and labs probably have a compliance person on staff that is supposed to set policy on this sort of thing and audit systems for compliance.
If you google around there's a standard for every single business/market you can think of.
Thats a pretty big deal when your on the hook for actually supporting what you release - at that volume - and maintaining compatibility.
I was working at Adobe ages ago on testing Vista and they let us know the app compatibility toolkit shims (which you can google - its a rather fascinating framework) they were putting in for Acrobat Reader 3 and 4 - to work around a window sizing issue. Reader 3 originally ran on Windows 3.1 and Windows 95 and Reader 4 was really only intended for 95/98/NT/2000 - but both products work just fine on Windows Vista and Windows 7 - if for some insane reason you don't want to upgrade.
I dunno - currently with all the applications we run on Centos, RHEL or Suse - if the vendor says has to run on xyz - I've found that upgrading and patching is a somewhat perilous process.
It's still not a fork - if you're talking about code repositories. No-one went to Sys 5's repository and made a fork to develop Linux.
There are licensed variants where this did happen - Linux isn't one of them
The star of riches is shining upon you.