Ahhh, you mean Remote Desktop Services (RDS) then. Lots of RDS, lots of
Terminal Services and lots of Citrix XenApp in use around the world. Depending
on your server’s CPU and RAM usage, any of the three make excellent candidates
for virtualization. Google “Project Virtual Reality Check”.
The basic concepts of data deduplication is used in a lot of places, not the
least of which are compression algorithms, data encryption, WAN
optimization, etc.
I think that the technology is mature, and that there's a lot of impetus to
do it right, in general.
Unless they're going to suggest
Thanks Andrew, I am already trialling the d2d and dedupe with Commvault
(our current product).
Don't misunderstand me, I'm not suggesting I'm dealing with
flat-earther's and they aren't suggesting don't' do it, I just found
it a bit of an odd stance how they seemed inherantly distrusting of
On Wed, Feb 16, 2011 at 6:30 AM, Paul Hutchings
paul.hutchi...@mira.co.uk wrote:
They’re a little mistrusting of dedupe on the basis “It’s a database it can
go wrong ...
A filesystem is a database consisting of a hierarchical series of
tables (directories), a table tracking extents, and a
Am I seeing this correctly?
If I delete a computer account in ADUC, the computer will continue to
appear in WSUS, and has to be manually deleted from WSUS as well?
.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
I'm not an expert on this by any stretch of the imagination. I can only say
that we've been using ExaGrid's de-duping solution for a couple of years now,
and every time I've done a restore it has been fast and accurate.
That's purely anecdotal, of course, but it's my experience for what it's
Won't the WSUS Cleanup Wizard get rid of them for you?
On 16 February 2011 13:35, David Mazzaccaro
david.mazzacc...@hudsonmobility.com wrote:
Am I seeing this correctly?
If I delete a computer account in ADUC, the computer will continue to
appear in WSUS, and has to be manually deleted
That has been my experience.
John Hornbuckle
MIS Department
Taylor County School District
www.taylor.k12.fl.us
From: David Mazzaccaro [mailto:david.mazzacc...@hudsonmobility.com]
Sent: Wednesday, February 16, 2011 8:35 AM
To: NT System Admin Issues
Subject: WSUS - deleted computer accounts
Sort of. It will continue to appear until you delete it, or until you
run the server cleanup wizard in WSUS and it's been more than 30 days
since the computer checked in.
From: David Mazzaccaro [mailto:david.mazzacc...@hudsonmobility.com]
Sent: 16 February 2011 13:35
To: NT System Admin
Thanks all for confirming... it would be nice if WSUS knew that the
computer account was deleted.
Thx!
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Wednesday, February 16, 2011 8:37 AM
To: NT System Admin Issues
Subject: RE: WSUS - deleted computer accounts
When I run the cleanup wizard, I never select the option to remove computers
that haven't reported in 30+ days because some of those computers are still out
there. For instance, laptops that my users have on the road or at home may only
be on my network a few times per year, so they'll easily
How would it know? WSUS isn't restricted to only servicing computers within a
specific domain.
Last check-in is about the only thing it CAN use.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: David Mazzaccaro
When it comes back it'll check back in anyway and reappear. So sure,
they may still exist, but other than the visibility/reporting element
you're not breaking anything by letting the cleanup wizard do its thing.
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: 16
But what if it doesn't come back? If a machine hasn't reported in in 30+ days,
that's reason for concern. I need to know why that's happening. Is it because
the machine is never turned on? If it's never turned on, why? Is it broken but
the user hasn't reported it? Is it not needed by the user
Not sure WSUS is the right/best way to deal with that though? We have a
smaller inventory but no way could I check up each individual maching
that hasn't reported into WSUS for X days to see if it's because it's in
another country, in a cupboard, broken and so on.
For machines that don't go
I think I agree with John on this one. If we have machines that aren't
checking in for 30 days then I want to know why. And, to be honest,
other than WSUS or perhaps our A/V console we don't necessarily have a
good way to know if they aren't checking in.
In some cases we have found machines
All WSUS knows is what has checked in and what has not. Since WSUS is not
tied to AD (AD is not required to use it successfully), binding accounts to
AD membership in the suggested manner would be limiting.
How would WSUS know the difference between a machine that was removed from
service
It would be nice if the domain told WSUS when a computer account was deleted.
Not a big deal, just one of life's minor annoyances. 30 days of old computers
isn't a big deal, plus it reminds you to run the server cleanup wizard which is
a good thing.
From: Andrew S. Baker
+1
A computer that doesn't reappear in WSUS is a problem. It isn't patched. Is it
a road warrior running all over the place connecting to open hot spots with
unpatched vulnerablilities?
From: John Hornbuckle [mailto:john.hornbuc...@taylor.k12.fl.us]
Sent: Wednesday, February 16, 2011 8:54 AM
My process:
Let WSUS clean up. Use JOWARE.NET tool to see what machines are active (have
checked in with AD in last 30 days or whatever) and compare this list to what
WSUS has. (Excel comes in handy for this).
You could have my environment where you're comparing an SMS list with WSUS list
and
AD has no functionality to tell an external product (WSUS) that computers are
deleted. You'd have to give AD some kind of service account to login to WSUS,
and tell WSUS to remove certain computers - AD doesn't have this for any other
product in the Microsoft family - everything pulls from AD
What you're looking for is a tool that uses AD. WSUS doesn't use AD and
therefore has no way to follow activities in AD. SMS and other tools that sync
with AD can be set to purge after xx days.
An example I have is our McAfee server - it populates its system list from an
LDAP query and is also
IBM Tivoli Storage Manager has used the 'incrementals forever' model
for many years, and in environments from mainframes on down - just not
with dedupe, though that may now be a feature. The more I play with
other solutions, the more I miss TSM.
On Wed, Feb 16, 2011 at 04:44, Paul Hutchings
If AD told WSUS what to delete it would not break non-AD systems that use WSUS.
A non-AD system would never tell WSUS to delete anything since there is no AD
involved. I am not suggesting a tool that makes sure AD matches WSUS. Just a
trigger that when a computer account in AD is deleted it
We're using an Access database - not elaborate but works well for us.
The FA applications from WASP looked good when we tested one:
http://www.waspbarcode.com/software/
Roger Wright
___
The internet is a great way to get on the net. – Bob Dole
On Tue, Feb 15, 2011 at 6:33 PM, Matthew W.
Looking for a fast reliable document feeding scanner under $500 ish.
Any recommendations? Price is not hard set so if you think going to
$700 ish might get me something that's much much better please don't
leave it out.
Something for a small business that's trying to digitize all their documents.
AD uses GUIDs to track objects. WSUS has no awareness of the GUID that AD uses.
How is WSUS going to be populated with these GUIDs?
And it's not similar to Exchange. Exchange stores its information in AD, and
pulls that information from AD. AD does not notify Exchange to delete things.
To be
I'm not sure how you qualify 'fast', nor what capacity you need, but I've
been happy with the very inexpensive Epson WorkForce ( I have a model 310 )
combo fax/copier/printer/scanner with ADF. It's a single side ADF, you
don't mention if you need double sided or not. If so, then this would NOT
We like our Kyocera KM-5050 copier. It has a double-sided capable document
feeder. I'm not sure how much it costs, as we lease ours.
-Original Message-
From: Erik Goldoff [mailto:egold...@gmail.com]
Sent: Wednesday, February 16, 2011 9:50 AM
To: NT System Admin Issues
Subject: RE:
We use FAS from SAGE, which is integrated with our accounting package,
MAS90. Seems to work ok. I believe they provided the scanner.
On Wed, Feb 16, 2011 at 9:41 AM, Roger Wright rhw...@gmail.com wrote:
We're using an Access database - not elaborate but works well for us.
The FA applications
Just a thought, but does the business have any type of lease agreement with a
company that services their copiers? If the timing is right they may be able
to negotiate a scanner upgrade in with a renewal? We have replaced all of our
scanners with multi-purpose copiers and it has worked out
My son is pretty big in the white hat scene, we were talking about this over
the weekend. I don't condone what Anonymous is doing but HBGary really messed
this one up. If you penetrate a hacker group you don't announce how cool you
are in the press, you turn the info over to the FBI and
Funny, I had that EXACT same thought...:)
From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
Sent: Wednesday, February 16, 2011 7:04 AM
To: NT System Admin Issues
Subject: RE: Anonymous strikes back at HBGary with stolen emails | Leak
prevention - InfoWorld
My son is pretty big in the
Clearly more than $500
I've used a couple of Canon's DR series with good results. Duplexing,
color or grayscale, and they both had reliable transports. This was
when I worked for a bank which digitized all documentation.
Fujitsu scanners also get good recommendations.
Roger Wright
___
The internet is a great way
Agreed. Angering people who clearly have more time and incentive than you
to act in a particular way is just stupid.
Well, they wanted publicity, and now they have it.
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
My first thought...what a tool (the entire HBGary management).
On Wed, Feb 16, 2011 at 10:08 AM, David Lum david@nwea.org wrote:
Funny, I had that EXACT same thought…J
*From:* Kennedy, Jim [mailto:kennedy...@elyriaschools.org]
*Sent:* Wednesday, February 16, 2011 7:04 AM
*To:* NT
You don't indicate a projected monthly duty cycle. I think in that price
range you're going to find you're under-buying based on the actual use.
If they are digitizing documents, and then performing work on those
documents the cost of downtime is going to be a huge big deal.
I'm going to echo the
We have several Xerox DocuMate 515s here. Price from CDW is $344.99 +
tax.
Does this need to be networked or will one or more user just use them?
_
Cameron Cooper
Network Administrator | CompTIA A+ Certified
Aurico
Phone: 847-890-4021 | Fax: 847-255-1896
Just got a Fujitsu snapscan s1300 (their portable model) for $280 and am
very happy with it. Their desktop model is faster and runs about 400-500 -
the S1500. Double-sided sheetfed scanning at something like 20ppm.
Jack Kramer
Computer Systems Specialist
University Relations, Michigan State
Yes – been there, done that with a set of 15 new Dells.
Jack Kramer
Computer Systems Specialist
University Relations, Michigan State University
w: 517-884-1231 / c: 248-635-4955
From: Mike Gill lis...@canbyfoursquare.commailto:lis...@canbyfoursquare.com
Reply-To: NT System Admin Issues
Check out the Fujitsu ScanSnap S1500 series. Seriously one of the most
impressive gadgets I've run across in a long time.
-Jeff Steward
On Wed, Feb 16, 2011 at 9:45 AM, Tigran K tigr...@gmail.com wrote:
Looking for a fast reliable document feeding scanner under $500 ish.
Any recommendations?
Good point. I'm meeting with the customer Monday to get the details.
You all gave me some good questions to ask.
--Tigran
On Wed, Feb 16, 2011 at 6:49 AM, Erik Goldoff egold...@gmail.com wrote:
I'm not sure how you qualify 'fast', nor what capacity you need, but I've
been happy with the very
If you penetrate a hacker group you don't announce how cool you are in
the press, you turn the info over to the FBI and quietly go on about
your business. This seems like a PR move on HBGary's part that has gone
horribly wrong, they get little sympathy from me.
+ Eleventy-billion!
Sean
We migrated our main file server by backing it up, then restored it to a new
machine using Backup Exec 2010 R2 with DeDuplication months ago. This
allowed us to (1) perform a litmus test on our backup system and (2) have an
back-out plan if it fails. Our email is on a database (Exchange), so are
I have heard more nefarious speulation that HBGary was being retained by
Bank of America and/or the U.S. Chamber of Commerce, to attempt to get at
Wikileaks through Anonymous. The reason being that Wikileaks supposedly has
some upcoming dirt on those groups regarding the home mortgage crisis it is
A little more then you want to spend...(CDW list $1093)...but...
We have been using a HP Scanjet N8420 for about 8 months and have NO issues
with it. It's classed as high speed (25ppm). We have put through about
400,000+ scans on ours and it's still going strong.
HTH
Cameron
On Wed, Feb 16,
Arstechnica has 4 articles now on it that are pretty good reads. If you
read them in order it gives a fairly consistent view with the information as
it was coming out and what was publicly known at the time.
1.
Hi all
We currently have a Siemens router installed and wish to connect it to our
internal LAN. We have a network outlet point nearby. My question is this.
Should we use a straight-through cable? I have a hunch that the engineer in
charge of the router installation connected it to the network
I am having to explain to some pita's what uses up all the bandwidth
when they are wanting to get on the Internet.
For these pita's the Internet is wide open. So they can get music,
video, large files, etc...
If I told them listening to the radio via Internet or watching video's
on the internet
Straight through cables/connections are typically needed between a
router and a switch.
-Original Message-
From: Pierre Camilleri [mailto:pierre.camill...@fosterclark.com]
Sent: Wednesday, February 16, 2011 11:46 AM
To: NT System Admin Issues
Subject: Straight-through or Cross-Over
Also, the router may be programmed to drop ICMP so that would also explain
why you cannot ping it.
-Original Message-
From: Mayo, Bill [mailto:bem...@pittcountync.gov]
Sent: Wednesday, February 16, 2011 12:00 PM
To: NT System Admin Issues
Subject: RE: Straight-through or Cross-Over
I would look into Fujitsu. We have a number of them, considerably more
expensive han what you are talking about, but they get the job done, PERIOD,
and scan both sides simultaneously.
I know they have some less expensive models - we have a couple of scan snap
units, and the people who use those
http://sourceforge.net/projects/ntop/
http://sourceforge.net/projects/ntop/This will tell you what is running in
your environment and consuming bandwidth.
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Wed, Feb
+1
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Wednesday, February 16, 2011 9:13 AM
To: NT System Admin Issues
Subject: Re: Scanner recommendations please
I would look into Fujitsu. We have a number of them, considerably more
expensive han what you are talking about, but they get the
we block youtube, and Pandora from internal users, exceptions can be
made on a case by case basis.
@THIS STATMENT IS VERIFIABLY INCORRECT
On Wed, Feb 16, 2011 at 08:57, itli...@imcu.com itli...@imcu.com wrote:
I am having to explain to some pita’s what uses up all the bandwidth when
+1
Our exceptions are Upper Management.
On Wed, Feb 16, 2011 at 9:46 AM, S Powell powe...@gmail.com wrote:
we block youtube, and Pandora from internal users, exceptions can be
made on a case by case basis.
@THIS STATMENT IS VERIFIABLY INCORRECT
On Wed, Feb 16, 2011 at 08:57,
Thanks!
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the
We block BitTorrent too.
-Original Message-
From: S Powell [mailto:powe...@gmail.com]
Sent: Wednesday, February 16, 2011 9:46 AM
To: NT System Admin Issues
Subject: Re: Bandwidth Usage
we block youtube, and Pandora from internal users, exceptions can be made on
a case by case basis.
Coming at it from another angle, how many users, how much bandwidth,
what firewall and what firewall rules do you have in place?
From: itli...@imcu.com [mailto:itli...@imcu.com]
Sent: 16 February 2011 16:57
To: NT System Admin Issues
Subject: Bandwidth Usage
I am having to explain to some
On Wed, Feb 16, 2011 at 11:45 AM, Pierre Camilleri
pierre.camill...@fosterclark.com wrote:
We currently have a Siemens router installed and wish to connect it to
our internal LAN. We have a network outlet point nearby. My question is this.
Should we use a straight-through cable?
Most likely,
I'm not exactly sure of your requirements, but I'll assume this is a Windows
OS. The WMI object Win32_Processor should have a listing for each physical
processor in the machine.
PowerShell one-liner (if you don't count the semicolon as a new line):
[array]$ProcList = Get-WMIObject
Anything relatively new will auto-detect straight-through or crossover,
basically eliminating the need for crossover cables in most environments.
(Auto-MDI).
-Original Message-
From: Pierre Camilleri [mailto:pierre.camill...@fosterclark.com]
Sent: Wednesday, February 16, 2011 10:46 AM
280 users, 3MB outbound, ASA w/ironport url filter, Mostly no access but
the Pita's have access to all. (Many pita's)
From: Paul Hutchings [mailto:paul.hutchi...@mira.co.uk]
Posted At: Wednesday, February 16, 2011 1:10 PM
Posted To: itli...@imcu.com
We use BNA Software with a scanner and it works well. The scanners we
use are Windows Mobile 6.1 and 6.5 based. So it gives you lots of
options for hardware.
Cheers
Ryan
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Wednesday, February 16, 2011 9:58 AM
To: NT System Admin Issues
280 users on 3MB is pretty conservative these days.
I'd suggest you fire up Cacti and ntop. They are VERY useful tracking tools.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: itli...@imcu.com [mailto:itli...@imcu.com]
Sent: Wednesday, February 16,
Look at ntop or something that will show you the protocols in use. If
you don't already do so lock down your ASA so that only known/needed
protocols/applications (or on an ASA I guess you're stuck with just port
control?) are allowed out.
Being blunt with 3mbps and 280 users I suspect you're
Agreed. Your users probably aren't doing anything unusual.
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Wednesday, February 16, 2011 11:11 AM
To: NT System Admin Issues
Subject: RE: Bandwidth Usage
280 users on 3MB is pretty conservative these days.
I'd suggest you fire
Don't forget to take a look at Odyssey Software. Not a bar scanner
solution, but will still capture the hardware asset information.
From: Ryan Finnesey [mailto:ryan.finne...@harrierinvestments.com]
Sent: Wednesday, February 16, 2011 2:06 PM
To: NT System Admin Issues
Subject: RE: Fixed Asset
Very interesting reading IMO. It's the sad reality that many people will put
money ahead of their ethics - something I just don't get how people can be at
peace with themselves. Dude it's just money!
* HBGary CEO Greg Hoglund had tossed out a random idea for Barr, one that did
not apparently
Who said that their ethics are not based upon the acquisition of funds,
first and foremost?
Seems to me that they are quite in line with their personal ethics.
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Wed,
%Dayjob% before this job was done by IT with it split between speciality
software person and everything else person. Current %dayjob% it is handled
further up the chain but still held in the IT department. I believe there
is one FTE person that does all purchasing and holds the paper but others
Indeed...
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Wed, Feb 16, 2011 at 2:10 PM, Michael B. Smith mich...@smithcons.comwrote:
280 users on 3MB is pretty conservative these days.
I’d suggest you fire
If you have an android based smart phone with bar code scanning
capabilities, this may be of interest:
http://www.slideshare.net/ajmransom/asset-tracking-on-the-android-smartphone
http://www.slideshare.net/ajmransom/asset-tracking-on-the-android-smartphoneOn
a whim, I decided to Google, Android
Have you thought of using Direct Access to get those machines patched?
Jon
On Wed, Feb 16, 2011 at 8:42 AM, John Hornbuckle
john.hornbuc...@taylor.k12.fl.us wrote:
When I run the cleanup wizard, I never select the option to remove
computers that haven’t reported in 30+ days because some of
Just got an email invite to join the Microsoft IT Advisory Council.
Anyone here a member, and if so, what can you share about it?
Thanks,
--
Jonathan, A+, MCSA, MCSE
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Money is like air … it becomes very important when you don’t have enough.
*problem with money is how people arrive at the definition of “enough”
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
From: David Lum
All -
There is a suspicion that a recently terminated employe's credentials might
still be in use on the network. (Disclaimer: I don't handle user
termination/creation) Since the user had multiple computers, I thought it
may be possible that an outlook session and of course windows session
FAS from SAGE has a component to inventory computers/devices with a bar code
scanner ?
On Wed, Feb 16, 2011 at 2:44 PM, Jonathan ncm...@gmail.com wrote:
If you have an android based smart phone with bar code scanning
capabilities, this may be of interest:
DA = Win7 Enterprise or Ultimate client only
John W. Cook
Systems Administrator
Partnership for Strong Families
From: Jon Harris jk.har...@gmail.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Wed Feb 16 14:45:20 2011
Subject: Re: WSUS -
I am.
You get a survey every couple of months. If you respond you get entered in a
drawing for some bling-or-another. I won a gift certificate once. :-)
I have no idea what the data is actually used for.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
:)
Not much. A bit of activity. Some surveys every once in a while.
-Original Message-
From: Jonathan [mailto:ncm...@gmail.com]
Sent: Wednesday, February 16, 2011 2:47 PM
To: NT System Admin Issues
Subject: Microsoft IT Advisory Council - anyone here a member?
Just got an email
http://www.sagefas.com/Products/Barcode-Readers
http://www.sagefas.com/Products/Barcode-Readers-Jeff Steward
On Wed, Feb 16, 2011 at 2:51 PM, Harry Singh hbo...@gmail.com wrote:
FAS from SAGE has a component to inventory computers/devices with a bar
code scanner ?
On Wed, Feb 16, 2011 at
Disabling a user doesn’t stop its mailbox from receiving or sending email. That
is a specific required use-case in cross-forest scenarios.
You need to disable their access via the mailbox features (MAPI and OWA and EAS
are the top-3) or remove Exchange attributes from the account.
Regards,
Yup. been using it for several years now.
http://www.sagefas.com/
Jonathan - Thumb typed from my HTC Droid Incredible (and yes, it really is)
on the Verizon network.
On Feb 16, 2011 2:52 PM, Harry Singh hbo...@gmail.com wrote:
FAS from SAGE has a component to inventory computers/devices with a
I think John may have that ability. If not on all machines most likely on
the roamers in any case.
Jon
On Wed, Feb 16, 2011 at 2:51 PM, John Cook john.c...@pfsf.org wrote:
DA = Win7 Enterprise or Ultimate client only
John W. Cook
Systems Administrator
Partnership for Strong Families
+1 they're changing the site to make it more friendly.
John W. Cook
Systems Administrator
Partnership for Strong Families
- Original Message -
From: Rod Trent rodtr...@myitforum.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Wed Feb 16 14:55:07 2011
Subject:
Love is like oxygen, you get to much - you get to high...not enough and
you're going to die.
On Wed, Feb 16, 2011 at 1:48 PM, Erik Goldoff egold...@gmail.com wrote:
Money is like air … it becomes very important when you don’t have enough.
*problem with money is how people arrive at the
I would never assume that, he DOES work for a small school district here in
Florida.
John W. Cook
Systems Administrator
Partnership for Strong Families
From: Jon Harris jk.har...@gmail.com
To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Sent: Wed
Ahh. Thanks Michael.
I'll make sure the team updates their documentation to either remove
Exchange Attributes -- which I assume isn't too difficult to add back on in
the event the user returns -- or disable certain mailbox features. To
confirm, in regard to BES, if i disable the MAPI function,
Oh great ! Now I have that tune in my head competing with the voices grin
Erik Goldoff
IT Consultant
Systems, Networks, Security
' Security is an ongoing process, not a one time event ! '
From: Steve Ens [mailto:stevey...@gmail.com]
Sent: Wednesday, February 16, 2011 2:58 PM
To: NT
Good to know. Our accounting team has SageFAS in place right now.
On Wed, Feb 16, 2011 at 2:56 PM, Jonathan ncm...@gmail.com wrote:
Yup. been using it for several years now.
http://www.sagefas.com/
Jonathan - Thumb typed from my HTC Droid Incredible (and yes, it really is)
on the Verizon
True but I think he said something about migration to 7 a while ago. If not
you would be correct. I know in the University setting Client OS was free
to upgrade from lower versions. That really helped with getting and keeping
systems relatively up to date. It also helped with purchasing of new
Good point.
All I can say is better them than me, I feel that stuff always comes back to
bite you in the a$$ sooner or later. This serves as another case in point :)
Dave
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Wednesday, February 16, 2011 11:36 AM
To: NT System Admin Issues
Ouch.
From: itli...@imcu.com [mailto:itli...@imcu.com]
Sent: Wednesday, February 16, 2011 1:07 PM
To: NT System Admin Issues
Subject: RE: Bandwidth Usage
280 users, 3MB outbound, ASA w/ironport url filter, Mostly no access but the
Pita's have access to all. (Many pita's)
_
We've been doing Win7 for a while, but Pro-not Enterprise.
John
From: Jon Harris [mailto:jk.har...@gmail.com]
Sent: Wednesday, February 16, 2011 3:16 PM
To: NT System Admin Issues
Subject: Re: WSUS - deleted computer accounts remain in WSUS?
True but I think he said something about migration
We have a couple of machines here recently infected that McAfee told us was
infected but couldn't completely clean the system. The Service Desk guys went
to their normal plan B (Malwarebytes) and while it has worked in the vast
majority of other cleanings, it couldn't clean these two. They ping
Case in point, we're ~40 on 10Mb.
On Wed, Feb 16, 2011 at 4:03 PM, Sam Cayze sca...@gmail.com wrote:
Ouch…
*From:* itli...@imcu.com [mailto:itli...@imcu.com]
*Sent:* Wednesday, February 16, 2011 1:07 PM
*To:* NT System Admin Issues
*Subject:* RE: Bandwidth Usage
280 users, 3MB
Moving forward, I would make wiping the device for terminated users an
SOP... And consider doing it now.
On Wed, Feb 16, 2011 at 3:07 PM, Harry Singh hbo...@gmail.com wrote:
Ahh. Thanks Michael.
I'll make sure the team updates their documentation to either remove
Exchange Attributes --
~40 on 6MB, and another ~25 on 15MB
*ASB *(Find me online via About.Me http://about.me/Andrew.S.Baker/bio)
*Exploiting Technology for Business Advantage...
*
On Wed, Feb 16, 2011 at 4:56 PM, Jonathan Link jonathan.l...@gmail.comwrote:
Case in point, we're ~40 on 10Mb.
On Wed, Feb 16,
1 - 100 of 112 matches
Mail list logo