Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:Sales in the UK influenced by taxes (Score 1) 136

thanks to a 24% jump in the United Kingdom

And you know why that is? It's incredibly tax advantageous for small business owners to buy EVs as they can be entirely deducted against company profits and attract extremely low "benefit in kind" taxes and vehicle excise duties. These things are either being slowly wound back or there's a fear the new Labour government might yank out the tablecloth so now is a particularly good time to buy especially with the higher corporation tax rate. I assure you, though, that if it becomes no more financially advantageous to have an EV, I'm back in the gas guzzler :-)

Unless you're getting paid for the oil changes, excess brake wear and other routine maintenance for the gas guzzler, I doubt it will ever truly be more financially advantageous to switch back.

Comment Re:This is a good thing, but... (Score 1) 81

Why not add a meter per spot tied to that apartment?

Most apartment complexes just have vast parking lots, with no assigned parking.

You don't know how many cars each apartment will have and they allow extra spots, quite often, for visitors.....

Most apartments I've been in either have assigned spots for yourself with shared visitor parking or allow up to two vehicles with no assigned parking. The assigned spaces actually solve issues with having to look for a space far away from your dwelling and would be a welcome change for many.

Comment Re:This is a good thing, but... (Score 1) 81

Why not add a meter per spot tied to that apartment? You only get charged your own usage that way. Power companies install the meters anyway so they can charge appropriately, it shouldn't increase costs by much at all.

Power companies charge a lot of money to install those meters. Look into the fees involved in connecting a new house to the grid. Also, many apartment complexes don't have assigned parking.

Assigned parking can easily be fixed and properties would just end up charging the renters in small increments like they always do for parking (hidden fee in your apartments rent).

Comment Re:This is a good thing, but... (Score 1) 81

The chargers need to be where people sleep.

That's fine and good for everyone that has off street parking....single family home, that they own and can modify for installing a charger.

AT least 1/3 of those in the US do not own their home, do not have off street parking, etc....

So, if you want to market to a very large number of people in the US, you need to have plentiful, fast charging stations all over the place.

I'd suggest rethinking the way you're thinking. This isn't a gas car mentality, nor does it need to be. Start thinking about "Where's my next stop?" rather than just filling up when empty.

Comment Re:This is a good thing, but... (Score 1) 81

-Don't forget to add that this isn't great in a seedy neighborhood. Some areas, you have to have your head on a swivel for the few minutes it takes to get gas in a car. Now, imagine that uncertainty for as long as takes to charge an EV, which could take hours. All it takes is two gangstas to come out, one keeping you from getting to the charge port, one shoving their piece in your face, and say good-bye to your car, your phone, wallet, and your teeth as they beat the shit out of you. No EV moves if plugged in, so you are pretty much a magnet for any "soldier" looking to blood in.- While I'm sure there are some areas this might be the possibility, it's not all and, in fact, I'd say it's not most. -In Europe, where you don't have blocks of people zombiefied due to addictions, jails the equivalent to pleasure palaces, and crime is a thing talked about in hushed whispers, this isn't an issue. However, in most of the US, leaving a vehicle on a public street, even in sentry mode, is inviting trouble, or if waiting for it to charge, a nice carjacking... or just a straight out homicide that gets issued a police report number and is forgotten about.- I'd say this isn't "most" of the US by any means. I've lived in multiple areas where parking your car on the street was and still is no big deal. Plug it in and you're still perfectly fine. This was in three different States including my current one. -It isn't "range anxiety". It is street smarts, and you don't want to be sitting there in someone's turf for long, and a stolen car buys a lot of meth, K2, and fentanyl.- Park an ICE vehicle in that same neighborhood. The only difference is that the thief won't need to wait for the charge to finish before stealing it.

Comment Re: He seems like a deadbeat (Score 1) 66

I don't know that they'd benefit from anything that helps them feel like they're at the center of attention of a big crowd of people. At least, that's not what I get from "being seen" and "being heard" and "social network". If you want to be seen or heard by a person, just have a normal conversation.

This only works when the other party sticks around for a normal conversation. For some, it can be quite difficult to break in to what most would call "normal" as they are anything but Nikolai Tesla, for example, was quite abnormal.

Comment Re:Digital Restrictions Management (Score 1) 47

Uh, you do know if you have a valid OEM/Retail Win 7 or Win 8/8.1 you have a free upgrade path to Win 11.

No real profit in "free", and if you aren't running a valid OEM/Retail Win 7 or 8/8.1, you aren't really a customer of Microsoft's, so their interest in going out of their way to support you running long-deprecated without paying them any money.

The profit isn't in the license, it's in the users data.

Comment Re:I'm older, but... (Score 1) 265

And then you lose out on an excellent employee who, rather than kissing your ass by answering every little phone call with absolutely nothing in it, was actually doing their job. That business trip he was on? He was meeting with potential clients, at the end of a dinner, his treat, ready to close on a multi-million dollar deal. But, of course, his company credit card no longer works because he hurt your feelings by not answering your little phone call. When he came back to the office? He was there to find out what happened so he could have a good explanation to those same potential clients but, of course, you decided he no longer worked for you and gave him no explanation. He now works for your competitor and has brought those clients over. You've lost tens of millions of dollars and he's now making double the salary. Your loss, not his.

Comment Re:Fuck that (Score 1) 265

Part of your job is to respond appropriately to your co-workers. This is part of every job. IT, construction, sales, pilot, floor cleaner, hamburger and coffee slinger, whatever.

I've worked with people that have the attitude you are showing. They tend to get let go pretty quickly. I've managed people with that attitude. They either fix it or I let them go.

If you don't figure this out and behave appropriately you are going to be poor your whole life because you can't hold a good job.

This is why every company worth anything has a communications platform other than the phone. One example, unfortunate as it is, is Microsoft Teams. This can be installed on your phone, used from your computer system or opened in a web browser, allows for messages to be sent and for read receipts. It is just as, if not more convenient, and allows for more flexibility than the phone itself. As you seem so tied up in the phone as your only form of communication, I'd suggest retiring. You seem stuck in the past with absolutely no desire to grow. As an IT Manager, these are the ways to communicate: 1) Create a ticket (each company has its own process) 2) Email 3) Text message on the companies messaging system 4) Text on phone 5) call on companies preferred system 6) check my office 7) call if absolutely necessary Notice how far down the list using a phone for calling is? This is because it is the most over-used piece of tech by spammers and, as such, gets ignored the most. Get pissed off all you want, it doesn't change reality.

Comment Re: There is somewhat of a defense here (Score 1) 189

While the point that their DRP is woefully inadequate has merit, it's extraordinarily hard to predict that the Security software you purchased specifically to prevent issues that will take out your entire network is precisely what took out your entire network along with every computer inside your business.

Comment Re: There is somewhat of a defense here (Score 1) 189

Again, the point I am making that not making plans for major disasters should be criminal negligence if you are a federal contractor, aviator or other 'core' system or otherwise demand/rely on massive tax payer subsidies from the government. If you were a small private entity, well great, you should fail as a result, that is good, but these large companies propped up by big government, they need consequences for squandering our money on failed IT projects.

The point you are making is still not quite there. Delta made plans, those plans didn't work fast enough. This doesn't mean those plans weren't in place, didn't have good reason to be the way that they were or that they didn't work. The fact that they are now under investigation only means that the Federal government is trying to understand exactly what happened and how to prevent it from happening again. https://www.cbsnews.com/news/d...

Comment Re: There is somewhat of a defense here (Score 1) 189

It is called being prepared, if you are the scale of Delta, you should have a plan. A plan where you "have to walk around to every desktop" is not a plan if you have a 1:1000 ratio of employees to computers. It's called get your ducks in a row.

You have no idea how 802.1x works, it is a security mechanism, if you layer shit on top of it, well, then it stops working for non-Windows systems (or if you are the poor chap that has to clean up after that proprietary technology failed or got abandoned *cough*Cisco*cough*, doesn't work for the next Windows version either). I already pointed you to PacketFence.

If BitLocker is asking for a key: https://learn.microsoft.com/en...

802.1x is a networking protocol with security bolted in, not a security protocol in and of itself. You claiming I don't know how it works does not make it so. Whether you think Delta should have done things differently or not does not mean that that is what they have done or is in any way relevant to the discussion. You're speaking in what-if statements rather than in reality and it does not add to the discussion.

Comment Re: There is somewhat of a defense here (Score 1) 189

Let's break down your response: You've completely left out the part where the local machine would need security prior to even connecting to the network as is dictated by many IT Security admins and which I very clearly mentioned in the post you're responding to. You mean 802.1x. Likely Delta didn't even have that. If you have properly designed your system, you can still do things like PXE boot and updates, which we allow our users a few more things basically fixing things if the certificate expired or got corrupted or logins don't work, it is limited what you can access, but you can do it. If you lock out every person because they can't authenticate to your 802.1X without MANUAL INTERVENTION, then YOU are making poor design decisions. Please do better next time, I would suggest looking at the Open Source solution PacketFence. Please do think through your proposed security solution next time.

This is only true if those systems were first configured to do so. That is entirely my point, do you have a mass malware recovery option? If you manage 150k+ devices on your network, you don't want to walk around fixing shit, if you don't have a recovery time objective for a black swan event like this, you are doing things wrong. Malware will cause the same damage, do you not have a playbook? Where will you hire 5,000 IT folk within 24 hours to meet that RTO?

As PXE boot is vulnerable to a MItM attack, especially in a more open network like an airport. First you claim they have 802.1X now you claim they are vulnerable to MITM. Let me tell you, terminals in the airport are not connected to public WiFi (or they shouldn't). Please do better next time. That is also why we have things like BitLocker, so in case a public terminal gets compromised by a wandering trader with a USB drive. According to Delta, they do not have the recovery keys for. Again, that is something I said we have an option for - once booted into PXE boot with a trusted (that is what TPM is for) boot chain, then you just run a script based on trusted information. And again, Apple does this for ALL their devices, Dell can do it, Intel AMT works globally with the right configurations, you can be on a public WiFi and your company can re-deploy or destruct the hard drive remotely, that is TRUE security, not "if it's not on my trusted network and runs this AV software, only then", no, I need a guarantee and have at least 3 ways to destroy a machine, even if it is intentionally being tampered with.

This is assuming it was approved by IT Security. As those same features allowing remote access can be used to gain the same access by bad guys, it would tend more towards not being enabled. Please read up on Intel AMT to discover why that is not the case. You need physical access to enable it and you need to enroll encryption keys to pair with it. IT's not just a switch. Again, do better.

Now multiply that time by several thousand I did, we recovered 150,000 devices in a matter of days

add in the travel necessary because Unnecessary as we have a mass malware playbook

IT Security would not have allowed either remote access to those machines by any of the above methods or for those machines to remotely access a workstation without security software installed Again, BS, it is not security, people will find ways around said security and you will have no security as a result. You clearly have never designed in collaboration with true IT security folks.

they still would have needed to obtain the bitlocker keys in order to decrypt each machine just so they could do the fix in the first place since none of them were able to fully boot and likely were now encrypted and waiting for those keys. That is what MBAM, SCCM, AD is for (or its Azure equivalents) - which most of it is either an LDAP or SQL database, more or less integrated. When a system is booted you can literally recover its recovery key from PowerShell. Ours is stored in AD and in the Snipe-IT inventory management SQL databases so it is a query away.

I'm assuming, at this point, that you're just throwing out random information hoping something sticks. 802.1x is a networking standard. Yes it has some security built in, no that's not enough to secure a machine or, quite frankly, a network. This is why it's only part of a security solution and not the entire thing. As you've brought up 802.1x several times, this must mean you think it's a magic bullet to secure all systems. Second, you're giving a what-if scenario instead of what actually happened and is happening. That isn't where we're at with this. It's the equivalent of saying you would've gotten somewhere sooner had you been driving rather than the person who actually is driving. It helps no-one and annoys everyone. That's not what this conversation is now or ever has been about. If you think that's what it should be, post your comment as such, not as a response. Next, good for you, you hypothetically recovered 150,000 devices in a matter of days. That means you didn't actually have to type in the bitlocker keys, visit the locations as these techs had to do, boot up each machine to the point of inputting that bitlocker key prior to being able remove the file or whatever fix they ended up going with. That's not what happened here or how these machines were configured to work. "My own company does not use Crowdstrike so those 150,000 devices of yours that need to be back up and running was a waste of time because you could have done it better" - see how that argument works? Your next argument "people will find ways around said security". This is the same argument given every single time IT Security proposes a change and is, effectively, a non-argument. Security isn't meant to completely block every access, it's to mitigate the issues as much as possible. It's the equivalent of not locking your door because a thief will just break in anyway. MBAM, SCCM and AD are useful but, if a machine is bitlocker encrypted and is asking for the key, you still need to type it in manually. This isn't a resolution but an alternate place to store those keys. Again, a non-argument of "my way is better".

Comment Re: There is somewhat of a defense here (Score 1) 189

Let's take your response piece by piece. "First of all, any workstations CAN be remote restored. All of our virtual servers and workstations we simply restored from a 1am snapshot, because we do hourly snapshot, it was easy, just restore the snapshot, the Windows boots as if it had crashed. All the processes simply left off from where they started." You first mention workstations but then you switch over to virtual. You've completely left out the part where the local machine would need security prior to even connecting to the network as is dictated by many IT Security admins and which I very clearly mentioned in the post you're responding to. Please do better next time. "Most physical systems will be default attempt a PXE boot if the primary boot has failed, or can even be set up to try PXE boot first, so in case of emergency, simply turn it on in your network. Dell UEFI will go into a special recovery mode after 3 boot failures where it "phones home" if you have the SupportAssist for Business." This is only true if those systems were first configured to do so. As PXE boot is vulnerable to a MItM attack, especially in a more open network like an airport. "Next there is Intel AMT, which can be configured during deployment, it is what Dell and HP and a few others "under the hood" use for the feature where you can basically ship a computer to an employee and it deploys the computer on-demand remotely (Apple has similar functionality). You can use that to get remote control over any device which you have established your keys in." This is assuming it was approved by IT Security. As those same features allowing remote access can be used to gain the same access by bad guys, it would tend more towards not being enabled. "The CrowdStrike fix took us 16s for each physical workstation devices - PXE or USB boot into a customized Windows PE where an automatic script queries the BitLocker database, unlocks the drive, deletes the file and reboots." Now multiply that time by several thousand, add in the travel necessary because, as I've mentioned several times already, IT Security would not have allowed either remote access to those machines by any of the above methods or for those machines to remotely access a workstation without security software installed (in this case, that would be Crowdstrike). My original point still stands. "From the stories I read, the problem with Delta is that they had none of those options for their servers, workstations or desktops, they didn't have (functional) snapshots, no backups, no remote control, nothing to functionally recover from any type of ransomware or other black swan event." Why continue to argue after the fact? Neither Microsoft nor Crowdstrike would have been able to assist without physically sending more bodies out to the field and, at that point, they still would have needed to obtain the bitlocker keys in order to decrypt each machine just so they could do the fix in the first place since none of them were able to fully boot and likely were now encrypted and waiting for those keys.

Slashdot Top Deals

Too much of everything is just enough. -- Bob Wier

Working...