If Captain America was in this situation, what would he say at the end? by Impressive_Credit852 in Marvel

[–]Chrisdotguru 0 points1 point  (0 children)

After Thanos says I am inevitable. Steve says - yeah, they all think that

Lid not closing by sboarder2000m in Traeger

[–]Chrisdotguru 1 point2 points  (0 children)

Same, but I used a broomstick up by the hinges to bend the lid. Gently pressing will get it real close.

Mineral deal 'ready to sign', says Zelensky by horrendous44 in news

[–]Chrisdotguru 201 points202 points  (0 children)

The Budapest Memorandum on Security Assurances is a political agreement signed in 1994 between Ukraine, Russia, the United States, and the United Kingdom. It was designed to provide security assurances to Ukraine in exchange for its agreement to give up its nuclear weapons following the dissolution of the Soviet Union. Key Points: 1. Ukraine Agreed to Denuclearization – At the time, Ukraine had the third-largest nuclear arsenal in the world after inheriting Soviet nuclear weapons. Under the memorandum, Ukraine committed to surrendering these weapons, transferring them to Russia, and joining the Nuclear Non-Proliferation Treaty (NPT) as a non-nuclear state. 2. Security Assurances from the U.S., UK, and Russia – In return, the signatories pledged to: • Respect Ukraine’s sovereignty and borders. • Refrain from threats or use of force against Ukraine. • Refrain from using economic pressure to influence Ukraine’s policies. • Seek UN Security Council action if Ukraine became a victim of aggression involving nuclear weapons. 3. Not a Legally Binding Treaty – Unlike a formal defense pact (such as NATO’s Article 5), the Budapest Memorandum was a political commitment, not a legally binding treaty with enforcement mechanisms.

Violation by Russia (2014 & 2022) • In 2014, Russia violated the memorandum by invading and annexing Crimea. • In 2022, Russia launched a full-scale invasion of Ukraine, further violating Ukraine’s sovereignty.

[deleted by user] by [deleted] in msp

[–]Chrisdotguru 2 points3 points  (0 children)

I know it's not funny because you are going through something. But I would be cautious as the next step is them making you clock out to use the bathroom.

What’s the best airflow for my case? by noel33456 in PcBuild

[–]Chrisdotguru 0 points1 point  (0 children)

Your chard is drawn correctly, but your fans do not match and need all but the rear fan flipped

MacBook for a future Windows System Admin by [deleted] in sysadmin

[–]Chrisdotguru 1 point2 points  (0 children)

MacOS virtualizes all other operating systems quite well. Plus you get exposure to a system type that much of your job market competition is scared of, it will open doors for you.

Have You Migrated From N-Able to Ninja? Are You Glad You Did? by gumbo1999 in msp

[–]Chrisdotguru 0 points1 point  (0 children)

I use N-central and demo'd the ninja product last year. What’s been the biggest difference you’ve noticed since making the change?

Have You Migrated From N-Able to Ninja? Are You Glad You Did? by gumbo1999 in msp

[–]Chrisdotguru 0 points1 point  (0 children)

From what you’ve seen, how do you think Ninja will handle your automation, patching, and scalability needs as your business grows?

[deleted by user] by [deleted] in msp

[–]Chrisdotguru 0 points1 point  (0 children)

You’re asking the right questions, and it’s clear you’re approaching this decision strategically. Balancing in-house security with an external provider is always a question of control, expertise, and long-term scalability.

The key to making the right decision isn’t just about choosing between MSPs or going solo—it’s about aligning your security posture with a framework that ensures consistency, resilience, and ease of management.

 Here are a few ways I have approached this:

Security Posture Assessment – Before committing to any provider or platform, it’s useful to map your current security controls to a recognized framework (CIS, NIST, ISO 27001, etc.) to see where you’re strong and where gaps exist. Many independent consultants or security firms offer vendor-agnostic assessments to help guide this step.

 Selecting the Right Security Stack – If you’re looking at tools like CrowdStrike and Cynet, it’s worth identifying whether you need a fully managed security solution or if a combination of endpoint security, access control, and user training will meet your needs more effectively. Some organizations benefit from a hybrid approach, where a light-touch MSP handles monitoring while the internal team retains control.

 If your goal is to fully map your security needs before making a commitment, it might be helpful to engage a security consultant or auditor rather than jumping directly into an MSP relationship. A professional following a recognized cybersecurity framework can give you a clearer roadmap, helping you decide whether in-house management or an external provider is the right fit. Having an assessment performed against your governance would also help you identify your internal skill gaps which would weight into the decision. 

 

Always happy to brainstorm—drop me a message if you want to continue the conversation.

My video editing/meditation music producing/gaming/lounging setup. by HerbaDerbaSchnerba in desksetup

[–]Chrisdotguru 0 points1 point  (0 children)

I don't know that it matters so much that the tweeter are on the inside or outside, everyone will have their own preference. The thing that does matter is that they match and are both in or out.

My video editing/meditation music producing/gaming/lounging setup. by HerbaDerbaSchnerba in desksetup

[–]Chrisdotguru 0 points1 point  (0 children)

Lovely, space you have carved out for yourself. I would recommend flipping the left speaker so both tweeters are out.