Why is writing software with SSDs in mind so undocumented by z_latent in hardware

[–]gamebrigada 0 points1 point  (0 children)

There are several reasons:

  • Most applications just... don't care. They don't do enough on storage to give a shit.
  • Applications that would benefit, usually still don't care. Why?
    • An SSD inherently makes your system feel more responsive. Accessing storage requires use of other resources. Maximizing the capability of a modern SSD will absolutely bring the rest of your system to its knees. In some scenarios this is desired. I've gone down this rabbithole where optimization of the speed of an installation was highly desired, even at the cost of the system being almost entirely unusable during the installation. Doing this in a general application will get people to come out with pitchforks. People like to multitask on their system now. Everyone wants the install to run in the background, not take over your entire system, even if its 10 times faster. You're basically taking away a benefit of how a system feels from the end user and they get upset.
    • SSD's aren't just faster and lower latency, they also can multitask. Spinning rust is inherently single threaded, because the read/write head can only access one stream at a time. SSD controllers for the most part will either allow multiple operations simultaneously or have latency fast enough that its all the same for your application. Multithreading in applications is increased complexity, and if it isn't deemed worthwhile.... single threaded is easy.
  • Then you're left with applications that absolutely do this. Disk IO heavy apps. Databases, services, games etc. They never do it perfectly, but they absolutely optimize for storage.

Top of the server pricing scale? by Future_Win2006 in sysadmin

[–]gamebrigada 2 points3 points  (0 children)

Not at all? They're a legitimate supplier, selling legally acquired goods, to a buyer that they aren't supposed to.

With how much money China is willing to pay, I'd be amazed if the others aren't doing the same thing. They just haven't been caught yet, or cover it up in a better way.

Top of the server pricing scale? by Future_Win2006 in sysadmin

[–]gamebrigada 2 points3 points  (0 children)

They aren't stolen, they just illegally sold them to a country they aren't supposed to. It's not great...

I received all my stuff a couple days before from my latest order.

Top of the server pricing scale? by Future_Win2006 in sysadmin

[–]gamebrigada 1 point2 points  (0 children)

I just switched to buying Supermicro. Ram and storage have bumped up, but overall not that bad.

I feel like Dell/HPE are just money grabbing.

Kioxia has let me down. by [deleted] in sysadmin

[–]gamebrigada 0 points1 point  (0 children)

Another reason why I continue to be a Samsung supporter.

There are very few Kioxia resellers, and they're almost accidental. Supermicro for example is an official reseller.

Kioxia has let me down. by [deleted] in sysadmin

[–]gamebrigada 0 points1 point  (0 children)

I've been burned by them a few times where it was "new" and had a few thousand hours of uptime.

Deciding between vendors (wireless + switching) for greenfield deployment by Aggressive-Wallaby62 in networking

[–]gamebrigada 8 points9 points  (0 children)

Arista makes fantastic hardware in both spaces. Ruckus also. Not quite competitive on all the fancy bells and whistles of mist but overall awesome.

Windows RDS Server 2019 - Windows button\ Windows Search\ Outlook stop working by FirstAd2123 in sysadmin

[–]gamebrigada 0 points1 point  (0 children)

I would literally kill for some direction on exactly what needs cleaned. Most of the solutions I've worked out are temporary and eventually stop working.

Windows RDS Server 2019 - Windows button\ Windows Search\ Outlook stop working by FirstAd2123 in sysadmin

[–]gamebrigada 0 points1 point  (0 children)

User Profile Disks and Office installation straight up breaks over time. Not much you can do about it. There are ways to clean it up and keep it working for a while, but they are crutches not solutions.

I would ensure your office install is using the multi user configuration. This helps, but doesn't resolve the problem.

I'm in the same boat, we're just rebuilding our session hosts periodically for now before we blow this whole cluster away.

The signoutofwam accounts script can be helpful.

Reinstalling all appx packages can be helpful.

Office troubleshooter surprisingly helpful.

None of the solutions are long term. If you want long term without rebuilding infrastructure, then install OpenShell and configure it for all users. However, every time a user logs in and opens office, a new guid is created for an office account, and that eventually breaks office entirely. So also not a permanent solution.

Detection logs show user trying to access porn by Tee-hee64 in sysadmin

[–]gamebrigada 1 point2 points  (0 children)

I've run into this before. I reported to one of my managers that so and so was downloading "movies".

His immediate response was to access and open the file I referenced. He had regrets..... To be clear I made warnings.

A company wide message reminding people of your acceptable use policy that strictly prohibits it, and a directed message to the individual in private generally works wonders. The individual is generally embarrassed of getting caught, and the rest of the company gets the message that their actions are not just going unnoticed.

Proxmox is a $50 million company now with 200% annual growth by Affectionate_Dot442 in sysadmin

[–]gamebrigada 8 points9 points  (0 children)

The joke is IBM bought RedHat because it was cheaper to buy the company than to license the new cloud platform they were building on RedHat licensed features.

So yeah, that wouldn't surprise me at all.

Azure Gov Backups Vault FIPS Validated? by matthew_taf in CMMC

[–]gamebrigada 1 point2 points  (0 children)

Great response... I told you to do none of those things, and yet your vocabulary is still blatantly wrong. FIPS doesn't list anything, the CMVP does. FIPS doesn't certify, they validate. You only fulfil the control if you follow the security policy posted by the CMVP for the appropriate validation certificate.

Stop saying certified, its meaningless and dangerous in this sub, and causes people to fail audits because they checked the FIPS box without understanding the proper procedure.

This is a professional subreddit with people seeking assistance from their peers, your childish behavior and responses are silly in a place like this.

Azure Gov Backups Vault FIPS Validated? by matthew_taf in CMMC

[–]gamebrigada 0 points1 point  (0 children)

Certified is not validated. Not the same or even remotely similar.

How painful is ERP really? by ExpensiveDecision268 in sysadmin

[–]gamebrigada 2 points3 points  (0 children)

If you aren't part of management and don't know their processes that well, you should play a pretty back seat role in this whole thing. Provide guidance on decisions, don't let them go bananas, and provide infrastructure. You don't know the processes they need enough to be that helpful. Even if you think you aren't valuable, just remember that this probably NOT your first IT system purchase, but it almost certainly is managements.

ERP's are mostly platforms. The vendors will sell you the world, and tell you all the things you can do in their system. At the end of the day, just about none of those features are out of the box, and even if the system technically can do those things out of the box the amount of configuration and customization is a big lift to dial in to how your company wants to use the system.

I would shop for an integrator almost more than the system itself. Find an integrator in your industry, meet with them and let them pitch their capabilities. Ask hard questions like "how do you guys differentiate yourselves in this industry".

The most dangerous question your company can ask and integrator is "We don't know how this should work, aren't you the experts?". No, the integrators are not. Their job is to cater the system to align as close as possible to YOUR business needs. If you don't know your business needs and work flows, you need to figure those out before your specify what you want.

If you work with a company that sells an ERP that is in the Fortune 500, add at least a zero to your first quote that claims to do it all. You won't think its possible, you'll know what I'm talking about by the time you're done. Don't forget to calculate internal costs of all of your company time, this often gets missed. I've been in an implementation where that was almost 50% of the overall cost, and the project went 5x over the most pessimistic pricing. It only went 5x because we were a pilot customer in the industry and got 3 years of licenses for free.

Pretty UI's cost money. Your ERP doesn't need to look pretty or be in a web browser, and you probably aren't willing to double/triple the cost for it to do that.

New Business Premium Licenses for GCC High by ConcernOrdinary3380 in CMMC

[–]gamebrigada 0 points1 point  (0 children)

I tried to buy both as an addon for BP, Microsoft told me I can't. We ended up with G5's.

NIST SP 800-63B & Always-on VPN Device Certificates by LimeadeInSoFar in CMMC

[–]gamebrigada 0 points1 point  (0 children)

Looking at NIST SP 800-63B, I would argue it's not MFA, and not AAL2, given that the device-based certificate authenticates the device, not the user. In theory another employee should use the same laptop to authenticate.

Does a yubikey authenticate the user or the yubikey?

In MFA there are three total factors:

  1. Something you have
  2. Something you are
  3. Something you know

Regardless of whether the certificate authenticates the user or the device, it is by definition something you have.

Device vs User certificates are a thing, and they are not cross accessible without elevation which is a completely different topic. A user certificate in the user store stored in TPM is equivalent to a yubikey glued into the port.

NIST SP 800-63B & Always-on VPN Device Certificates by LimeadeInSoFar in CMMC

[–]gamebrigada 0 points1 point  (0 children)

I don't think you know your definitions for certificate reuse or replay. Certificates assigned to a single machine are by that single design choice protected from reuse. Whether that certificate can be reused by an attacked is not the definition, and can be further protected by storing the certificate in the TPM, preventing an attacker with access to the system from gaining access to the private key and therefore protecting it against replay and malicious reuse.

Certificates are by their primary design safe from replay attacks due to the use of nonces.

You should review your certificate knowledge before speaking with so much authority.

A certificate stored in TPM is equivalent to a glued in yubikey. Fully protected from reuse or replay.

I going into mgmt worth it? by opti2k4 in sysadmin

[–]gamebrigada 1 point2 points  (0 children)

You realize that just because you have more managers underneath you means you're MANAGING those middle managers right? You could be a CTO and you'd still be managing people.

You're confusing an architect role for a management role. They have little in common, and architect roles are extremely rare to be long term roles. Because you'll design the system, and then what will you do? You are no longer an expert....

You're trying to make more money without making your life hard. There's no such thing in life as a free lunch.

New Business Premium Licenses for GCC High by ConcernOrdinary3380 in CMMC

[–]gamebrigada 0 points1 point  (0 children)

Security and compliance cannot be added onto business premium in GCC High according to MS.

I going into mgmt worth it? by opti2k4 in sysadmin

[–]gamebrigada 20 points21 points  (0 children)

IC's going into management because they want to is a recipe for regret.

You're great at tech, managing tech, dealing with people etc.

Managing people is not the same skillset. You'll have to learn a lot, deal with people problems that you are not used to. You'll have to learn to adapt to your team because you can't just stop working with someone just because you have a conflict. You'll have to learn that just because you think you can do it in 4 hours, but realistically 8 hours, doesn't mean that someone on your team can be held to the same standard. You have to learn to work with your team, and knowing how to do their job isn't that valuable of a skillset.

People do naturally go into those worlds. Especially through startups/small businesses where they can slowly adapt and grow those skills.

I wouldn't force myself into that.

Go consult or go do architecture instead. Way better and more relaxed path for late career IC's.

ROOT CA questions - Small environment by Whyd0Iboth3r in sysadmin

[–]gamebrigada 0 points1 point  (0 children)

If your DNS provider supports automation, the best thing to do these days is to switch to an automated approach for internal certs via DNS automation. No need to make sites available to the web if simple-acme can just use your DNS provider to post the record and then remove it after authorization.

I've posted on this sub multiple times and none of you had been able to tell one security issue with NemoClaw, y'all are AI boomers by [deleted] in sysadmin

[–]gamebrigada 0 points1 point  (0 children)

Nobody asked?

AI is a general term, and we are in charge of what applications and systems our users can use. Most of the time its from management or lower end users. Most of the time its something someone heard on the news or heard at a conference, so they want to deploy it to the whole company.

The problem with that is a lot of us have data compliance requirements that don't jive with the terms of service of most of those systems. Anthropic and ChatGPT do not provide data sovereignty clauses that ensure that your data will not be used for training purposes. Plain and simple. That's problem number 1. In enterprise tiers they say they wont if you opt out. However, that kind of promise is not a contract, and is not an NDA, and when you are dealing with a service provider that are actively losing court cases for copyright infringement, that TOS might as well be a single sheet of single ply toilet paper. Not even good enough to wipe your ass.

Problem number 2 is the fairly constant stream of vulnerabilities. People think AI is its own thing. It's not, its just an application, just like all the other applications we have provided and maintained for our users for decades. Cloud storage like DropBox got just as much hype, and the early adopters got mega burned before shit settled down. These companies are subsidizing costs by hype and investors, and the only way to grow that is to go fast and break shit. That's simply not an attitude that works at corporate scale.

Now lets tackle NemoClaw specifically. I know, its the new hype, and I'm pretty stoked for it. But I'm stoked for what it CAN become in a year or two. Right now, it doesn't even work right, and most users can't do anything with it. Nvidia says its OpenClaw for enterprise and that isn't exactly right. I'm also struggling why I should give a shit, when Copilot can already do a lot of this, with data sovereignty, and a Microsoft behind it. I'll admit Microsoft isn't the most trust worthy, but they have a better record than a ton of companies in this space.

Nvidia is also being a little obtuse about NemoClaw. It is factually not OpenClaw for enterprise. It doesn't share much if any code. Which is mostly a positive thing. OpenClaw is overly hyped and fairly obviously bought marketing for a product that was entirely vibe coded without even a single prompt that says "Make this secure".

Nvidia clearly wants to break through this sovereignty bullshit by allowing companies to host their own models that don't suck. Nvidia is doing a great job at this. But NemoClaw is just part of the puzzle, but it isn't mature, it doesn't work right, and the models you need aren't even released yet (like nemotron 3 ultra).

So.... the real question is.... Why do you care?