Yeah, It's not an easy one to answer.
I guess it depends on what others think, I am very new here so let's see what others reckon.
Yeah, It's not an easy one to answer.
I guess it depends on what others think, I am very new here so let's see what others reckon.
Where this works best is when users are posting links to articles, ala Spiceworks.
The orange guys, I tend to ignore what they post as I kind of know they are doing content generation, bla bla.
The actual users, when they post I read the article, comment on the discussion because I am interested in talking to that person.
Creating discussion about every little tid-bit, I don't know, does anyone really want to discuss every single new release that Microsoft/Apple/Open source release? Maybe I'm just picky.
This is a really hard one, you want to walk that line between keeping it interesting for folks but not doing it for the sake of doing it.
@scottalanmiller Yes because then you have an insanely cheap geographically irrelevant backup scenario. Lot of companies would dive at the chance for that, building burnt down? not a problem there are 10 others.
The lack of NTFS is a shame but hopefully that will be addressed.
The scheduling, yes I agree needs to be an "expert mode" hidden away feature but for non critical data I can see it being useful.
@scottalanmiller said:
@Breffni-Potter said:
- AetherStore automatically distributes and maintains four replicas of your data at all times, so data is available even when machines leave and re-join the network.
I'm assuming that one device is my AetherStore controller, let's assume that controller dies, how do I get control of the AetherStore network from a different device.No, there is currently not a single point of failure control node in this way.
Does that mean the CORE clients on each machine all talk to each other automatically? So no matter what device blows up on the network you can talk to the remaining systems from any device?
It looks really amazing, What about the below.
- "Resource Efficient"
Can you define schedule windows when data can be synchronised back and forth? I.e over-night when no one is working so the internal network is not impacted, on a 10/100 network file synching out say, 120GB of data would be a pain during office hours for end users.
- AetherStore uses AES-256 encryption to protect data both at rest and in transit.
Practically, how do the clients/servers trust each other? is it with a local self signed cert?
- AetherStore automatically distributes and maintains four replicas of your data at all times, so data is available even when machines leave and re-join the network.
I'm assuming that one device is my AetherStore controller, let's assume that controller dies, how do I get control of the AetherStore network from a different device.
- Only the Administrator has access to the mounted AetherStore drive.
How is this defined, what if there is pot of data which is not production critical but useful to make an attempt to back up, i.e a photo/video library in a non-profit, which can still be read only accessible to the staff team, or a 7+ year archive which users can have read only access into, historical finance data for example?
Last and most importantly, are we going to see this product available in 2015?
The gist of the article though is that as soon as you impose tighter controls/credit terms the scammer gets flustered and runs away.
I know a few companies who run on a credit of trust, if you are brand new, you get no credit, so you start with the most restrictive terms.
If you are a known, reliable client, you get the more lenient credit terms.
The scammers balk at the terms, the cheapskates who will nickel and dime you to death decide to leave early and the genuine stay behind to do business with you.
Personally, don't touch them for 6 months. Wait for bugs to be ironed out.
Their products are fantastic but something new does not mean it will be great at launch. (I might be wrong)
You might be able to make it more efficient by quite a bit.
My site recently built.
A (97%)
A (90%)
3.95s
710KB
33 HTTP requests
ThanksAJ.com
B (81%) -16%
C (79%) -11%
4.43s +0.48s
534KB -175KB
54 Requests +21
I have a lot more images and crazy scripts going on, so you should be able to compress ThanksAJ.com down & speed up the load time on your wordpress site.
Using it right now, Cloudflare is fantastic.
I'd suggest running your site through GTMetrix.com to get the score of it, then compare it after Cloudflare, you should see a boost.
@thecreativeone91
So in essence, would the below be true.
Ports 1-20 are lan devices
Ports 21-23 are wifi for private and guest
Port 24 is the gateway router.
VLAN 2 = Ports 1-20 are Tagged port 24, with untagged 1-20 for
VLAN 2 = Ports 21-23 Tagged port 24, with untagged 1-23 for
VLAN 3 = Ports 21-23 are tagged port 24, with untagged ?
Yeah, just because the feature exists don't over-use it. I've seen enough of that with AD security groups and folder permissions.
I'll have a play and see if I can get it working, I think I've got it now, brain still is still a bit foggy.
My brain is not working tonight, this should be simple but I'm missing the obvious.
Existing network 192.168.1.1 for private LAN (I know the range is bad, going to change it)
Looking to add a new network on 10.0.0.1 to go from Unifi APs to the internet with no access to the LAN, whilst having the hidden SSID for private LAN enabled.
DHCP/DNS for the LAN is already provided by the windows server, my plan was to use the gateway firewall as the DHCP for the guest network using a separate VLan.
I have already set this up on my Sonicwall Gateway to provide DHCP on VLan 100.
When I get to the HP Managed switches between the Sonicwall, this is the bit my brain goes "wha"
These switches were pre-set before I got near them, You can see I've added NGuest below as ID-100 but the tagged/untagged concept confuses me, I've done reading on various sites explaining how a VLAN adds a "tag" to a packet so that the switch keeps them separate when going across the network, what I can't work out is how tagged/untagged works.
Thanks in advance. This is probably a bit too basic for some
@scottalanmiller said:
That's very true. To most of the world, Canada is right in there with the US, UK, Australia and New Zealand.
But the US has by far the most impact and reach to intrude, especially given something like the below.
http://www.theregister.co.uk/2014/12/24/irish_government_sides_with_microsoft_over_us_cops_cloud_data_snatch/
@thecreativeone91 said:
How do they make sure they aren't getting NSA modified routers though (both end users and datacenter). That would kinda make where the rest of your data is relevant.
We all know that everyone is trying, China, US, Russia, it's all the same, everyone is trying to get ahead. We all know in the UK that the NSA/GCHQ are looking at the data, along with other nations governments, I just hope that the crime gangs don't discover this network and begin using it to drop crypto ransom onto all our networks at once, I fear them more than the NSA, which might be blissful ignorance on my part.
How do you make a network secure against the biggest spy agencies in the world?
@scottalanmiller said:
Already in another community someone thought you were American and were not going to look into you further because they are in the EU and the EU avoids anything hosted in the US by standard practice
Sounds like me
In the cloutatcost.com site, the only reference I can find to Canada is this line in the terms and conditions
"19.3 Governing Law. This Agreement shall be governed by the laws of Ontario and the laws of Canada applicable therein, without reference to its principles of conflict of laws, and the parties shall attorn to the jurisdiction of the Courts of Ontario for all matters arising under this Agreement."
Currency issues aside, I think it would be worth promoting the non-US hosting as a feature, lot of guys in Europe will swarm you as most hosting providers are in the US only.
@MattSpeller Despite MS being sneaky, Google are sneakier.
http://www.bbc.co.uk/news/technology-32083188
Not sure I'd trust any big corporate as far as I could throw them.
That's actually pretty clever, most users won't notice the trap closing until it is too late.
Hi all.
Loving the lack of ads Joined after being invited by Scott.
Hopefully I won't drive everyone crazy whilst I'm here.
Breffni
@thecreativeone91 said:
Pro-Res 4:2:2 is consider a intermediate codec, not something you really want to make deliverable out of. You want 4:4:4 color space at least. Raw is preferred.
Still looks good though, if it's a toss-up between shoot it or not, then use 4:2:2. - Very few actually go to the time and painstaking effort of properly grading their work anyway.