#server management tools
Explore tagged Tumblr posts
servermo · 4 days ago
Text
Top Server Management Tools for 2024
Server management tools are essential for businesses to ensure smooth operations, enhance security, and boost performance. Here’s a quick overview of the best tools for 2024:
cPanel – Simple and user-friendly, perfect for web hosting management. Ideal for small to medium businesses.
Plesk – Secure and versatile with multi-server support. Great for advanced needs.
DirectAdmin – Lightweight and efficient for straightforward management. Suited for smaller setups.
Webmin – A free Linux server management tool that’s budget-friendly and flexible.
ISPConfig – Open-source with multi-server capabilities, perfect for cost-conscious enterprises.
Zabbix – Comprehensive monitoring with advanced alerts for proactive maintenance.
Ansible – Automation-focused with cloud integration for modern infrastructure needs.
Puppet – Declarative and efficient, ideal for DevOps and consistent configurations.
Docker – Revolutionary containerization tool, simplifying deployment and compatibility.
SaltStack – Fast, event-driven, and perfect for managing dynamic environments.
Choose the tool that aligns with your needs and optimize your IT infrastructure today!
0 notes
bluechipgulfabudhabi · 1 year ago
Text
https://www.bluechip-gulf.ae/best-server-management-tools/
0 notes
techdirectarchive · 6 hours ago
Text
Fix "Perform Site Maintenance or reset this site" greyed out
Recently, I wanted to upgrade my Configuration Manager from the evaluation version to a full version, but I was unable to due to the following error discussed in this article. Therefore, we will fix “Perform Site Maintenance or reset this site” greyed out. Please see how to Fix Keep personal files and apps option greyed out during Upgrade, How to use the Reliability Monitor in Windows, and How to…
0 notes
suchi05 · 5 months ago
Text
Effectively Using SAP SOD Analysis to Meet Audit Needs - ToggleNow
Discover the significance of SAP SoD analysis in ensuring compliance and mitigating risks within SAP ERP systems. Explore how effective SoD analysis helps businesses identify and address conflicts in user authorizations, preventing fraud and strengthening internal controls
Tumblr media
“Segregation of duties (SOD) is a potent weapon in the fight against fraud, equipping businesses with robust internal controls. In this article, we explore the importance of SOD in fraud prevention and present real-life examples of its effective implementation. Discover how organizations have leveraged SOD to safeguard their assets, reputation, and operational integrity, reinforcing trust and resilience in the face of evolving fraudulent threats.” In today’s complex business environment, organizations depend on robust internal controls to maintain compliance, mitigate risk, and protect operations. Companies using SAP (Systems, Applications, and Products) systems must meet audit requirements and maintain SAP Segregation of Duties (SOD). The purpose of this blog is to share some real-life examples of how SAP SOD analysis can be used to address audit needs in an effective manner.
Understanding SAP SOD Analysis
The concept of segregation of duties refers to the separation of key duties and responsibilities among multiple individuals to avoid fraudulent activities, errors, or unapproved access. An SAP SOD analysis is an essential internal control activity that helps organizations identify and mitigate the risks associated with conflicting or incompatible user authorizations. It protects against fraud or unauthorized activity by preventing a single person from having a combination of activities.
The Significance of SAP SOD Analysis
Regulatory Compliance: Compliance with industry regulations and legal requirements is a fundamental aspect of any organization. SAP SOD analysis assists in meeting regulatory demands such as the Sarbanes-Oxley Act (SOX), International Financial Reporting Standards (IFRS), Health Insurance Portability and Accountability Act (HIPAA), and others.
One notable case in Singapore is the SingHealth cyber-attack that occurred in 2018. SingHealth, the country’s largest healthcare group, suffered a sophisticated cyber-attack where hackers gained unauthorized access to its IT systems. This breach compromised the personal data of approximately 1.5 million patients, including their names, addresses, and National Registration Identity Card (NRIC) numbers. This incident highlighted the critical need for robust cybersecurity measures and effective access controls within the healthcare sector. Read through the Medium report on this case.
While the incident is not directly involved with the Segregation of Duties, it is crucial to implement robust security measures and adhere to strict access controls. The incident happened due to multiple failures and weak maintenance of the system security. By conducting thorough SOD analysis, organizations can ensure that access to patient records is appropriately restricted, limiting the possibility of unauthorized access and reducing the risk of data breaches.
SAP SOD analysis helps identify conflicts in user authorizations within the healthcare system, such as a single user having both the ability to view patient records and modify them. By addressing these segregation conflicts through appropriate mitigating measures, such as separating the duties of viewing and modifying patient data between different individuals, organizations can enhance the security and privacy of healthcare data.
Fraud Prevention: Fraudulent activities can lead to significant financial losses and reputational damage. By conducting SAP SOD analysis, organizations can proactively detect and prevent fraud by identifying segregation conflicts that could be exploited for malicious purposes. Consider a manufacturing company where an employee with both procurement and payment authorization can create fictitious purchase orders and approve them for payment without detection. SAP SOD analysis would identify this conflict, prompting the organization to implement proper controls to prevent such fraudulent activities.
One notable real-life case involving fraud prevention through segregation of duties is the Wells Fargo unauthorized accounts scandal that came to light in 2016. Wells Fargo, one of the largest banks in the United States, faced significant scrutiny and legal repercussions for the creation of unauthorized accounts by its employees.
In this case, it was discovered that Wells Fargo employees, driven by aggressive sales goals and incentives, opened millions of unauthorized bank and credit card accounts in the names of existing customers without their knowledge or consent. This fraudulent activity allowed employees to meet sales targets and earn bonuses.
To address this issue and prevent similar fraud in the future, Wells Fargo implemented robust segregation of duties controls. The bank redefined and separated key responsibilities within their sales and account management processes. They introduced checks and balances to ensure that no single employee had the ability to both create and authorize new accounts.
Under the new system, different employees were assigned specific roles, such as customer inquiries, account creation, and account approval. This segregation of duties reduced the opportunity for employees to manipulate the system, ensuring that new accounts were only created with proper authorization and customer consent.
By implementing effective segregation of duties controls, Wells Fargo aimed to enhance transparency, prevent unauthorized activities, and restore trust among customers and stakeholders. This case serves as a reminder of the importance of implementing strong internal controls, such as segregation of duties, to prevent fraudulent activities and protect the interests of both the organization and its customers.
Risk Mitigation: Effective risk management is essential for the sustainable growth of any organization. SAP SOD analysis provides a comprehensive view of access controls, enabling companies to identify and mitigate risks associated with unauthorized activities, data breaches, and system vulnerabilities. For instance, a financial institution can use SAP SOD analysis to identify conflicts that may allow a single user to initiate and approve high-value transactions, potentially leading to embezzlement. By eliminating or mitigating such segregation conflicts, the organization protects its financial assets.
Operational Efficiency: Optimizing user access privileges through SAP SOD analysis helps streamline business processes. By aligning user authorizations with job responsibilities, organizations can enhance operational efficiency, reduce errors, and improve productivity. For example, in a retail company, SAP SOD analysis can identify conflicts where the same user has both inventory management and purchasing authorization, leading to potential inventory discrepancies or unauthorized purchases. By resolving these conflicts, the organization ensures accurate inventory management and prevents financial losses.
Here is how you can implement an effective Segregation of Duties in SAP:
Conduct a Comprehensive Analysis: Utilize specialized SAP SOD analysis tools such as SAP GRC Access Risk Analysis, ToggleNow’s Verity or engage experts who can perform a detailed examination of user authorizations and identify the existing segregation of duties. SoD Analyzer tools utilizes pre-defined rule sets that can identify the existing risks at the user and role level within no time. Define Roles and Responsibilities: Establish well-defined roles and responsibilities within the organization. Clearly define job functions and document the corresponding authorization requirements. For instance, clearly outline the access rights required for positions like finance manager, HR manager, or system administrator. Further, it is recommended to make task based roles that are grouped at the job profile level. ToggleNow has experience creating roles that are 90% free from Segregation of Duties. Implement Mitigation Measures: Once conflicts are identified, implement appropriate mitigation measures. These may include modifying user authorizations, implementing compensating controls, or applying mitigating procedures to minimize the associated risks. For example, setup proper monitoring controls for activities that involves high value transactions. Regularly Review and Update: SAP SOD analysis is not a one-time process. Regularly review and update user authorizations as job roles evolve or new risks emerge. Perform periodic reassessments to ensure ongoing compliance and risk mitigation. This includes reviewing access rights when employees change positions or when new SAP modules are implemented. ToggleNow’s User Authorization Review solution is a great tool that can utilized to automate the review process. Document and Report: Maintain a comprehensive record of the SAP SOD analysis process, including identified risks, mitigations implemented, and their effectiveness. This documentation helps demonstrate compliance during audits and provides a reference for future analysis. It also helps track the effectiveness of implemented controls and facilitates continuous improvement. Conclusion
0 notes
best-develpoment-company · 8 months ago
Text
Unraveling the Power of Managed Cloud Server Hosting: A Step-by-Step Guide?
In today's digital era, businesses are increasingly turning to "cloud server management solutions" to enhance efficiency, scalability, and security. One of the most sought-after options in this realm is fully managed cloud server hosting. This comprehensive guide will take you through the ins and outs of managed cloud server hosting, providing a step-by-step understanding of its benefits, implementation, and best practices.
Understanding Managed Cloud Server Hosting Managed cloud server hosting refers to the outsourcing of server management tasks to a third-party service provider. This includes server setup, configuration, maintenance, security, updates, and troubleshooting. By "opting for managed cloud hosting", businesses can focus on their core activities while leaving the technical aspects to experienced professionals.
Benefits of Managed Cloud Server Hosting Enhanced Security: Managed cloud server hosting offers robust security measures such as firewalls, intrusion detection systems, data encryption, and regular security audits to protect sensitive data and applications.
Scalability: With managed cloud hosting, businesses can easily scale their resources up or down based on demand, ensuring optimal performance and cost-efficiency.
Cost Savings: By outsourcing server management, businesses can save costs on hiring dedicated IT staff, infrastructure maintenance, and upgrades.
24/7 Monitoring and Support: Managed cloud hosting providers offer round-the-clock monitoring and support, ensuring quick resolution of issues and minimal downtime.
Step-by-Step Implementation of Managed Cloud Server Hosting
Step 1: Assess Your Hosting Needs Determine your storage, processing power, bandwidth, and security requirements. Identify the type of applications (e.g., web hosting, databases, e-commerce) you'll be hosting on the cloud server.
Step 2: Choose a Managed Cloud Hosting Provider Research and compare different managed cloud hosting providers based on their offerings, pricing, reputation, and customer reviews. Consider factors such as server uptime guarantees, security protocols, scalability options, and support services.
Step 3: Select the Right Cloud Server Configuration Choose the appropriate cloud server configuration (e.g., CPU cores, RAM, storage) based on your hosting needs and budget. Opt for features like automatic backups, disaster recovery, and SSL certificates for enhanced security and reliability.
Step 4: Server Setup and Configuration Work with your "managed cloud hosting provider" to set up and configure your cloud server according to your specifications. Ensure that all necessary software, applications, and security protocols are installed and activated.
Step 5: Data Migration and Deployment If migrating from an existing hosting environment, plan and execute a seamless data migration to the "managed cloud server". Test the deployment to ensure that all applications and services are functioning correctly on the new cloud server.
Step 6: Ongoing Management and Optimization Regularly monitor server performance, security, and resource utilization to identify potential issues and optimize performance. Work closely with your "managed cloud hosting provider" to implement updates, patches, and security enhancements as needed.
Step 7: Backup and Disaster Recovery Planning Set up automated backups and disaster recovery mechanisms to protect data against hardware failures, cyber threats, and data loss incidents. Regularly test backup and recovery processes to ensure their effectiveness in real-world scenarios.
Best Practices for Managed Cloud Server Hosting Regular Security Audits: Conduct regular security audits and vulnerability assessments to identify and mitigate potential security risks. Performance Monitoring: Continuously monitor server performance metrics such as CPU usage, memory utilization, disk I/O, and network traffic to optimize resource allocation.
Backup and Restore Testing: Test backup and restore procedures periodically to ensure data integrity and recovery readiness. Compliance and Regulations: Stay compliant with industry regulations and data protection laws relevant to your business operations. Disaster Recovery Planning: Develop and implement a comprehensive disaster recovery plan with predefined procedures for data restoration and business continuity.
In conclusion, "managed cloud server hosting" offers a myriad of benefits for businesses seeking reliable, scalable, and secure hosting solutions. By following the step-by-step guide outlined above and adhering to best practices, businesses can leverage the power of "managed cloud hosting" to streamline operations, reduce costs, and drive business growth in the digital landscape.
0 notes
nwspl · 1 year ago
Text
Best Cloud Server Management Services in Dwarka Delhi By NWSPL
Tumblr media
Cloud Server Management refers to the process of overseeing and controlling the various aspects of servers hosted in a cloud computing environment. In a cloud setup, servers are virtualized instances that run on physical hardware maintained by a cloud service provider. Effective management of these cloud servers is essential to ensure optimal performance, reliability, security, and cost efficiency. Here are key components and activities associated with cloud server management:
Provisioning and Deployment:
Description: Cloud server management involves the creation, configuration, and deployment of virtual servers as needed. This includes selecting the appropriate server specifications, operating system, and other settings based on the requirements of the applications or workloads.
2. Resource Scaling:
Description: Cloud environments allow for dynamic scaling of resources. Cloud server management includes the ability to scale server resources up or down based on changing demand. This ensures that the infrastructure can adapt to varying workloads efficiently.
3. Monitoring and Performance Optimization:
Description: Continuous monitoring of server performance metrics is a crucial aspect of cloud server management. Administrators use monitoring tools to track factors such as CPU usage, memory utilization, and network performance. Optimization strategies are then employed to enhance overall efficiency.
4. Security and Access Control:
Description: Ensuring the security of cloud servers is paramount. Cloud server management involves implementing security measures such as firewalls, encryption, and access controls. Administrators define user roles and permissions to restrict access to sensitive data and configurations.
5. Backup and Disaster Recovery:
Description: Cloud service management panel includes the implementation of backup strategies to safeguard data. Administrators set up regular backup schedules and develop disaster recovery plans to mitigate the impact of unforeseen events or data loss.
6. Patch Management and Updates:
Description: Keeping servers up-to-date with the latest patches and updates is critical for security and performance. Cloud server management services in dwarka delhi involves the systematic application of software updates to address vulnerabilities and improve functionality.
7. Cost Management:
Description: Cloud resources come with associated costs. Effective cloud server management includes monitoring resource usage and implementing cost-saving measures. This may involve rightsizing servers, optimizing configurations, and leveraging reserved instances.
8. Automation:
Description: Automation is a key element of cloud server management. Tasks such as provisioning, scaling, and configuration changes can be automated to streamline operations, reduce manual errors, and enhance overall efficiency.
9. Compliance and Auditing:
Description: Cloud server management includes ensuring compliance with industry regulations and organizational policies. Regular audits are conducted to assess and verify that servers adhere to security and compliance standards.
10. Troubleshooting and Support:
Description: In the event of issues or failures, cloud server management involves troubleshooting and providing support to ensure quick resolution. This includes identifying root causes, implementing fixes, and communicating with stakeholders.
In summary, cloud server management is a comprehensive set of activities aimed at maintaining the health, security, and efficiency of servers hosted in a cloud environment. It requires a combination of technical expertise, automation, and strategic planning to effectively leverage the benefits of cloud computing while meeting the specific needs of the organization.
Why Choose NWSPL for Cloud Server Management in Dwarka:
Expertise: Our team comprises seasoned professionals well-versed in the intricacies of cloud server management, offering unparalleled expertise to meet the diverse needs of our clients.
Comprehensive Solutions: From provisioning and scaling to security and compliance, NWSPL provides end-to-end cloud server management solutions, tailored to your specific business requirements.
Innovation: We stay at the forefront of technological advancements, incorporating the latest tools and best practices to keep your cloud infrastructure at the pinnacle of efficiency.
Reliability: Count on NWSPL for reliable, 24/7 monitoring, ensuring that your cloud servers consistently deliver peak performance and are ready to adapt to changing demands.
Cost Optimization: Our strategic approach to cloud server management includes cost-saving measures, ensuring that you get the most value from your cloud investments without compromising on performance.
Client-Centric Approach: At NWSPL, client satisfaction is paramount. We work closely with our clients, understanding their unique needs and delivering solutions that align with their business objectives.
Tumblr media
Cloud Server Management Services:
NWSPL excels in providing best cloud server management services. Whether you are a startup or an established enterprise, our team of experts ensures the seamless operation of your cloud infrastructure. From deployment to maintenance, we handle it all, allowing you to focus on your core business activities.
Managed Cloud Hosting:
Our managed cloud hosting services offer a secure and scalable hosting solution tailored to meet your specific business needs. With NWSPL as your hosting partner, you can enjoy the benefits of high-performance hosting, automatic backups, and 24/7 support, ensuring your website or application runs smoothly without any downtime.
Server Monitoring for Peak Performance:
At NWSPL, we understand the critical importance of server monitoring cloud. Our proactive monitoring services ensure that potential issues are identified and resolved before they impact your operations. This proactive approach to server management guarantees optimal performance and minimizes downtime.
Software as a Service (SaaS):
In the era of cloud computing, NWSPL provides innovative SaaS solutions to streamline your business processes. From collaboration tools to customer relationship management (CRM) systems, our SaaS offerings are designed to enhance efficiency and productivity.
In conclusion, NWSPL in Dwarka, Delhi, stands as a comprehensive solution provider for your digital needs. By combining social media amplification, SEO strategies, and top-tier cloud server management services, we empower your brand to thrive in the dynamic and competitive online landscape. Partner with NWSPL to unlock the full potential of your digital presence and propel your business to new heights.
0 notes
virtualizationhowto · 1 year ago
Text
Best Self-hosted Apps in 2023
Best Self-hosted Apps in 2023 #homelab #selfhosting #BestSelfHostedApps2023 #ComprehensiveGuideToSelfHosting #TopMediaServersForPersonalUse #SecurePasswordManagersForSelfHost #EssentialToolsForSelfHostedSetup #RaspberryPiCompatibleHostingApps
You can run many great self-hosted apps in your home lab or on your media server with only a small amount of tinkering. Let’s look at the best self-hosted apps in 2023 and a list of apps you should check out. Table of contentsWhy Self-hosting?Plex: The Media Server KingJellyfin: Open Source Media FreedomEmby: A Balanced Media ContenderNextcloud: Your Personal Cloud ServiceHome Assistant:…
Tumblr media
View On WordPress
1 note · View note
ventique18 · 7 months ago
Text
IDIA MADE AN AMV TO EXPLAIN HIS PLAN TO YUU AND FRIENDS IU'M FUCKING DYING
Tumblr media Tumblr media
HE EVEN HAS A GOD DAMN NARRATION OMFG
"Ahh~ Only good things are happening lately~ As if we're in a dream~"
Tumblr media
"Eh. It's actually just a dream tho."
Tumblr media
"Hello everyone trapped in this empty world of dreams."
Tumblr media
"This is Idia Shroud."
"So today, I will explain the strategy to beat:
"I BUILT A DREAM WORLD USING CHEAT-LEVEL MAGIC AS THE MOST EVIL LAST BOSS MAGE MALLEUS DRACONIA"
Tumblr media Tumblr media Tumblr media
"The magical domain that Malleus created is similar to a server running a huge MMORPG."
Tumblr media
"That means everyone's dreams are ran individually. Malleus and his clones are keeping an eye on the server."
Tumblr media
"In other words, Malleus is the server admin."
Tumblr media
"And his clones crack down on users who commit violations like in online games."
Tumblr media
"Malleus is the game master who has the authority to manage the entire server."
"HE REALLY IS A DEMON LORD WHO RULES THE WORLD"
Tumblr media Tumblr media Tumblr media Tumblr media
"Under his control, we have no chance of winning..."
Tumblr media
"HOWEVER..!"
Tumblr media
"With the super geek hacker group STYX using ORTHO ATTACK, the server source code has been analyzed."
"So using this, we're building cheating tools [WARNING: DO NOT DO THIS IN ACTUAL GAMES]"
Tumblr media
"So using these cheating tools, the administrative rights to my dream can be transferred to me."
"Then I'll lure Malleus into my dream where I can get rid of that god damned invincibility!"
Tumblr media
I CAN'T FUCKING TAKE THIS OH MY GOD
"-- Well, it sounds like a perfect strategy but... The truth is there's just a few things about this cheating tool..."
Tumblr media
"WHAT IF THE SERVER ADMIN FINDS OUT ABOUT THIS DURING DEVELOPMENT?"
"THEN,"
"GAME OVER."
"BUT BUT BUT--"
Tumblr media
"The thing is, even though he's using autonomous clones to monitor each dream, it still shouldn't be easy to control the dreams of 20000 PEOPLE in Sage island."
Tumblr media Tumblr media
"If problems turn up everywhere, he'll have to deal with them all!"
"Sooooo..."
Tumblr media
"While I'm developing the cheat tool, I want you all to distract Malleus!"
"I want you all to gather party members to defeat the Demon King!"
"Once everyone's awake, I'll send out invitations to my own dream."
Tumblr media
"Then I'll lure Malleus into my dream... THEN TURN ON THE CHEAT TOOL! As planned, Malleus' invincibility will disappear,"
Tumblr media
"Then everyone will accept the invitation and gather into my dream!"
Tumblr media
"THEN EVERYONE BEATS HIM UP"
Tumblr media
"Then Malleus will have to take down his magic AND EVERYONE WILL BE FREE!"
Tumblr media
"If you liked this 3-minute video, don't forget to leave a like!"
I'M GONNA FUCKING CRY THIS IS INSANE OMFG KASDJLKLDASLMASD
6K notes · View notes
mostlysignssomeportents · 1 month ago
Text
Cars bricked by bankrupt EV company will stay bricked
Tumblr media
On OCTOBER 23 at 7PM, I'll be in DECATUR, presenting my novel THE BEZZLE at EAGLE EYE BOOKS.
Tumblr media
There are few phrases in the modern lexicon more accursed than "software-based car," and yet, this is how the failed EV maker Fisker billed its products, which retailed for $40-70k in the few short years before the company collapsed, shut down its servers, and degraded all those "software-based cars":
https://insideevs.com/news/723669/fisker-inc-bankruptcy-chapter-11-official/
Fisker billed itself as a "capital light" manufacturer, meaning that it didn't particularly make anything – rather, it "designed" cars that other companies built, allowing Fisker to focus on "experience," which is where the "software-based car" comes in. Virtually every subsystem in a Fisker car needs (or rather, needed) to periodically connect with its servers, either for regular operations or diagnostics and repair, creating frequent problems with brakes, airbags, shifting, battery management, locking and unlocking the doors:
https://www.businessinsider.com/fisker-owners-worry-about-vehicles-working-bankruptcy-2024-4
Since Fisker's bankruptcy, people with even minor problems with their Fisker EVs have found themselves owning expensive, inert lumps of conflict minerals and auto-loan debt; as one Fisker owner described it, "It's literally a lawn ornament right now":
https://www.businessinsider.com/fisker-owners-describe-chaos-to-keep-cars-running-after-bankruptcy-2024-7
This is, in many ways, typical Internet-of-Shit nonsense, but it's compounded by Fisker's capital light, all-outsource model, which led to extremely unreliable vehicles that have been plagued by recalls. The bankrupt company has proposed that vehicle owners should have to pay cash for these recalls, in order to reserve the company's capital for its creditors – a plan that is clearly illegal:
https://www.veritaglobal.net/fisker/document/2411390241007000000000005
This isn't even the first time Fisker has done this! Ten years ago, founder Henrik Fisker started another EV company called Fisker Automotive, which went bankrupt in 2014, leaving the company's "Karma" (no, really) long-range EVs (which were unreliable and prone to bursting into flames) in limbo:
https://en.wikipedia.org/wiki/Fisker_Karma
Which raises the question: why did investors reward Fisker's initial incompetence by piling in for a second attempt? I think the answer lies in the very factor that has made Fisker's failure so hard on its customers: the "software-based car." Investors love the sound of a "software-based car" because they understand that a gadget that is connected to the cloud is ripe for rent-extraction, because with software comes a bundle of "IP rights" that let the company control its customers, critics and competitors:
https://locusmag.com/2020/09/cory-doctorow-ip/
A "software-based car" gets to mobilize the state to enforce its "IP," which allows it to force its customers to use authorized mechanics (who can, in turn, be price-gouged for licensing and diagnostic tools). "IP" can be used to shut down manufacturers of third party parts. "IP" allows manufacturers to revoke features that came with your car and charge you a monthly subscription fee for them. All sorts of features can be sold as downloadable content, and clawed back when title to the car changes hands, so that the new owners have to buy them again. "Software based cars" are easier to repo, making them perfect for the subprime auto-lending industry. And of course, "software-based cars" can gather much more surveillance data on drivers, which can be sold to sleazy, unregulated data-brokers:
https://pluralistic.net/2023/07/24/rent-to-pwn/#kitt-is-a-demon
Unsurprisingly, there's a large number of Fisker cars that never sold, which the bankruptcy estate is seeking a buyer for. For a minute there, it looked like they'd found one: American Lease, which was looking to acquire the deadstock Fiskers for use as leased fleet cars. But now that deal seems dead, because no one can figure out how to restart Fisker's servers, and these vehicles are bricks without server access:
https://techcrunch.com/2024/10/08/fisker-bankruptcy-hits-major-speed-bump-as-fleet-sale-is-now-in-question/
It's hard to say why the company's servers are so intransigent, but there's a clue in the chaotic way that the company wound down its affairs. The company's final days sound like a scene from the last days of the German Democratic Republic, with apparats from the failing state charging about in chaos, without any plans for keeping things running:
https://www.washingtonpost.com/opinions/2023/03/07/east-germany-stasi-surveillance-documents/
As it imploded, Fisker cycled through a string of Chief Financial officers, losing track of millions of dollars at a time:
https://techcrunch.com/2024/05/31/fisker-collapse-investigation-ev-ocean-suv-henrik-geeta/
When Fisker's landlord regained possession of its HQ, they found "complete disarray," including improperly stored drums of toxic waste:
https://techcrunch.com/2024/10/05/fiskers-hq-abandoned-in-complete-disarray-with-apparent-hazardous-waste-clay-models-left-behind/
And while Fisker's implosion is particularly messy, the fact that it landed in bankruptcy is entirely unexceptional. Most businesses fail (eventually) and most startups fail (quickly). Despite this, businesses – even those in heavily regulated sectors like automotive regulation – are allowed to design products and undertake operations that are not designed to outlast the (likely short-lived) company.
After the 2008 crisis and the collapse of financial institutions like Lehman Brothers, finance regulators acquired a renewed interest in succession planning. Lehman consisted of over 6,000 separate corporate entities, each one representing a bid to evade regulation and/or taxation. Unwinding that complex hairball took years, during which the entities that entrusted Lehman with their funds – pensions, charitable institutions, etc – were unable to access their money.
To avoid repeats of this catastrophe, regulators began to insist that banks produce "living wills" – plans for unwinding their affairs in the event of catastrophe. They had to undertake "stress tests" that simulated a wind-down as planned, both to make sure the plan worked and to estimate how long it would take to execute. Then banks were required to set aside sufficient capital to keep the lights on while the plan ran on.
This regulation has been indifferently enforced. Banks spent the intervening years insisting that they are capable of prudently self-regulating without all this interference, something they continue to insist upon even after the Silicon Valley Bank collapse:
https://pluralistic.net/2023/03/15/mon-dieu-les-guillotines/#ceci-nes-pas-une-bailout
The fact that the rules haven't been enforced tells us nothing about whether the rules would work if they were enforced. A string of high-profile bankruptcies of companies who had no succession plans and whose collapse stands to materially harm large numbers of people tells us that something has to be done about this.
Take 23andme, the creepy genomics company that enticed millions of people into sending them their genetic material (even if you aren't a 23andme customer, they probably have most of your genome, thanks to relatives who sent in cheek-swabs). 23andme is now bankrupt, and its bankruptcy estate is shopping for a buyer who'd like to commercially exploit all that juicy genetic data, even if that is to the detriment of the people it came from. What's more, the bankruptcy estate is refusing to destroy samples from people who want to opt out of this future sale:
https://bourniquelaw.com/2024/10/09/data-23-and-me/
On a smaller scale, there's Juicebox, a company that makes EV chargers, who are exiting the North American market and shutting down their servers, killing the advanced functionality that customers paid extra for when they chose a Juicebox product:
https://www.theverge.com/2024/10/2/24260316/juicebox-ev-chargers-enel-x-way-closing-discontinued-app
I actually owned a Juicebox, which ultimately caught fire and melted down, either due to a manufacturing defect or to the criminal ineptitude of Treeium, the worst solar installers in Southern California (or both):
https://pluralistic.net/2024/01/27/here-comes-the-sun-king/#sign-here
Projects like Juice Rescue are trying to reverse-engineer the Juicebox server infrastructure and build an alternative:
https://juice-rescue.org/
This would be much simpler if Juicebox's manufacturer, Enel X Way, had been required to file a living will that explained how its customers would go on enjoying their property when and if the company discontinued support, exited the market, or went bankrupt.
That might be a big lift for every little tech startup (though it would be superior than trying to get justice after the company fails). But in regulated sectors like automotive manufacture or genomic analysis, a regulation that says, "Either design your products and services to fail safely, or escrow enough cash to keep the lights on for the duration of an orderly wind-down in the event that you shut down" would be perfectly reasonable. Companies could make "software based cars" but the more "software based" the car was, the more funds they'd have to escrow to transition their servers when they shut down (and the lest capital they'd have to build the car).
Such a rule should be in addition to more muscular rules simply banning the most abusive practices, like the Oregon state Right to Repair bill, which bans the "parts pairing" that makes repairing a Fisker car so onerous:
https://www.theverge.com/2024/3/27/24097042/right-to-repair-law-oregon-sb1596-parts-pairing-tina-kotek-signed
Or the Illinois state biometric privacy law, which strictly limits the use of the kind of genomic data that 23andme collected:
https://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004
Failing to take action on these abusive practices is dangerous – and not just to the people who get burned by them. Every time a genomics research project turns into a privacy nightmare, that salts the earth for future medical research, making it much harder to conduct population-scale research, which can be carried out in privacy-preserving ways, and which pays huge scientific dividends that we all benefit from:
https://pluralistic.net/2022/10/01/the-palantir-will-see-you-now/#public-private-partnership
Just as Fisker's outrageous ripoff will make life harder for good cleantech companies:
https://pluralistic.net/2024/06/26/unplanned-obsolescence/#better-micetraps
If people are convinced that new, climate-friendly tech is a cesspool of grift and extraction, it will punish those firms that are making routine, breathtaking, exciting (and extremely vital) breakthroughs:
https://www.euronews.com/green/2024/10/08/norways-national-football-stadium-has-the-worlds-largest-vertical-solar-roof-how-does-it-w
Tumblr media
Tor Books as just published two new, free LITTLE BROTHER stories: VIGILANT, about creepy surveillance in distance education; and SPILL, about oil pipelines and indigenous landback.
Tumblr media Tumblr media
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/10/10/software-based-car/#based
577 notes · View notes
deadsetobsessions · 10 months ago
Text
Okay, so maybe Tim has no business being in Bludhaven. Tim maintains that since his parents fail at parenting, he can do whatever he wants.
Besides, it's for a good cause. Like, not letting Tarantula get her dirty hands on his big brother in another time line. Tarantula had popped up in the Bludhaven servers - by that, Tim means the endless amounts of threads and underground fronts for criminal activity that he stalks on a regular basis- by being seen with Nightwing. Tim had immediately booked a ride to Bludhaven and bought another burner. He'd try to take care of her himself, but if worse comes to worse, he'd call Deathstroke. He's totally aware of the weird tension Deathstroke has with Nightwing and Tim's kind of banking on that.
Dick's been back in Blud for two months now, Jason having assuaged his mother hen tendencies enough for Dick to get sick of the Manor. Tim hadn't meant to follow since he had plenty of projects to work on now that "SAVE JASON" wasn't blaring at the top of his head.
But then Tarantula appeared and Tim saw red, remembering the way Dick spoke about her and what she did to him.
He bids the driver goodbye. The driver doesn't question his being on his lonesome mainly because 1) Gothamites mind their own busines, 2) Tim gave him a $500 tip to make sure he remains a "good" Gothamite cabbie, and 3) Tim made sure he was dropped off in the swankiest, most ostentatious hotel Bludhaven had to offer.
"Rich people," the cab driver had muttered as Tim closed the door. Perfect.
Tim got his keycard, having checked in under Alvin Draper over the phone. Normally, they'd require an in person visit, but money talks. And people listened when Tim had a lot of things to say.
Tim even feels like he's trained enough to go out! Lady Shiva's training was ingrained into his memory, and Tim's built enough muscle to make use of some of it. He is still nine, after all. He's so much stealthier this time around. Plus, he's got almost his full tool set back. Sure, some of the tech is ancient, but he managed to finagle it to make grappling guns and smoke pellets more along the quality that he's used to.
Tim waits until nightfall, looping the surveillance around his window to mask his exit. Tim adjusts his domino, eyes scanning the city skyline as his handheld computer (god, he can't believe he has to invent wrist computers) tracked reports of Nightwing through Tweetings.
Ah. He's around Seventh. Tim grimaces as his untested joints adjusts to the grappling guns. His dark clothes make him hard to spot, to his advantage as he tracks down Nightwing.
Tim watches, perched on an adjacent roof as Nightwing takes down a crowd of goons with the flips Tim remembered watching from afar and up close in another timeline.
"Blockbuster'll kill everyone you love, Nightwing!"
Tim winces at the rather brutal crunch that followed, Nightwing having punched the guy and knocked him out in one move. He watches Dick sigh, tugging at his hair in stress.
Tim could... no, no. He shouldn't think of murder as a first option. Well, no, he shouldn't think of Deathstroke as a first option. But he'll need to take Blockbuster out before anything happens. And he needs to threaten the new Tarantula before anything happens. He won't allow her to even get close to Dick.
Maybe it's unfair to punish her for a crime she hasn't done, but unlike murder, rape can never be defended. Catalina Flores is a dead woman walking.
Tim stalks his big brother back home and then broke off to begin his short reign of terror over Bludhaven's underground. If he can't get Dick to take a break (and Tim's tried, a lot, over the years) then he'll make sure that the next month is as gentle as possible on his older brother.
Step 1. Murder Take care of Blockbuster
Step 2. Threaten Catalina Flores and her brother.
No. Wait. Tim has a better idea. He's got dirt on them, on top of the murder thing. He'll fabricate Catalina's tax returns, embezzle a shit ton of money from the IRS, and get her and her corrupt brother (because getting your sister out from murder charges is considered corrupt) arrested and locked away. And he'll make sure they stay locked away with some good old blackmail on Amanda Waller.
Tim grins, tranquilizing the building with an ungodly amount of knock out gas pellets, to riffle through the police precinct's files.
Step 2. Threaten Catalina Flores and her brother.
Step 2. Cripple Catalina Flores and her brother with blackmail and the IRS.
In three hours, Tim has everything he needs to begin a temporary hostile takeover. He's got the names of local mob bosses, the big players, and the names of practically every police officer that takes bribes and their... sponsors.
He'll have to cut off Blockbuster's lines of supplies first. Then, blacklist him from local suppliers, mobilize the police precinct against him (by imitating his M.O. perfectly- Tim's not a fucking amateur- and pretending to rob the precinct blind), and then break his knees.
Step 3. Profit
Tim takes out his shiny new burner phone, enjoying the loud sounds of the police squawking through his planted bugs. He lounges on the building next to it, keeping an eye out for Nightwing just in case the man decides to respond to the crisis.
[Unknown: It's RR.]
[Deathstroke: New phone?]
[RR: Who dis?]
[Deathstroke: What?]
[RR: Nevermind. I'll give you forty thousand to shoot someone's knees out.]
[Deathstroke:... That's it? Who?]
[RR: Blockbuster. Bludhaven. Extra twenty thousand if you tell him he's got the spine of a sea slug, kick him in the balls, and post it on Tweeting.]
[Deathstroke: What did he do to you? Deal.]
Tim ignored Deathstroke's question.
[RR: Half sent. Confirm?]
[Deathstroke: Confirmed. Timeline?]
[RR: Three weeks. 21 days.]
[Deathstroke: Confirmed.]
----
Tim grins ferally, all teeth as Catalina Flores looked on in horror at her computer screen.
"Get out of Bludhaven, and don't come back. If you even think of going near Nightwing, I will rip what's left of your pathetic, sniveling swine of a brother apart. You will not enjoy the consequences."
Tim clicks off, watching Catalina and her brother launch themselves into mad packing. He tapped out a short message to Amanda Waller for her and her team to intercept them at the state lines. They'll never get away from Tim's fury. Never.
[Waller: It's done.]
[Waller: I will find you.]
[RR: You can definitely try, Waller. Good doing business with you.]
Tim can see the blood vessel the woman popped after he sent that last message. He laughs.
He saves Deathstroke's video from Tweeting onto his actual, spoofed phone. He destroys the burner phone, less shiny now that he's dragged it through two and a half weeks of breaking heads and terrorizing the Bludhaven Underground. Nightwing hadn't even gotten a whiff of his activities, this Dick being far less experienced and known in this version of Blud.
One more week and Tim can continue his other projects.
----
Nightwing, going about his vigilante business: wow it sure is peaceful
Feral Tim Drake, Nightwing's scary dog privilege: try me, bitch
2K notes · View notes
beautiful-basque-country · 9 days ago
Text
European Alternatives is a repository of resources, built by hand and with the help of the community. These are "European" internet services of all kinds as alternatives to the most popular American services that we all know and use. So instead of Gmail you could use Proton Mail (Switzerland), for maps and navigation Here (Netherlands) as an alternative to Google Maps, or Internxt (Spain) for storing files Dropbox style.
The idea, from the Austrian Constantin Graf, is that only services from European countries (which includes the EU, EEA, EFTA or DCFTA, close to the concept of Europe that many people have) that respect issues such as GDPR, VAT invoicing and in general other laws and regulations, appear. In addition to the list that he initially prepared, other suggestions are gradually being added to expand the catalog.
As for services, there is everything: analytics tools, Kubernetes, WordPress hosting, password managers, electronic signatures, DNS, domain registrars… Priority is given to those hosted on European servers and also those that use clean and renewable energy and are more sustainable.
359 notes · View notes
anistarrose · 9 months ago
Text
I want to make my posts more accessible, but can't write IDs myself: a guide
[Plain text: "I want to make my posts more accessible, but can't write IDs myself: a guide." End plain text.]
While every image posted online should be accessible in an ideal world, we all know it 1) takes time to learn how to write image descriptions, and 2) is easy to run out of spoons with which to write IDs. And this says nothing of disabilities that make writing them more challenging, if not impossible — especially if you're a person who benefits from IDs yourself.
There are resources for learning how to write them (and if you already know the basics, I'd like to highlight this good advice for avoiding burnout) — but for anyone who cannot write IDs on their original posts at any current or future moment, for any reason, the there are two good options for posting on Tumblr.
1. Crowdsource IDs through the People's Accessibility Discord
[Plain text: "1. Crowdsource IDs through the People's Accessibility Discord". End plain text.]
The People's Accessibility Discord is a community that volunteers description-writing (and transcript-writing, translation, etc) for people who can't do so themselves, or feel overwhelmed trying to do so. Invite link here (please let me know if the link breaks!)
The way it works is simple: if you're planning to make an original post — posting art, for example — and don't know how to describe it, you can share the image there first with a request for a description, and someone will likely be able to volunteer one.
The clear upside here (other than being able to get multiple people's input, which is also nice) is that you can do this before making the Tumblr post. By having the description to include in your post from the start, you can guarantee that no inaccessible version of the post will be circulated.
You can also get opinions on whether a post needs to be tagged for flashing or eyestrain — just be able to spoiler tag the image or gif you're posting, if you think it might be a concern. (Also, refer here for info on how to word those tags.)
The server is very chill and focused on helping/answering questions, but if social anxiety is too much of a barrier to joining, or you can't use Discord for whatever reason, then you can instead do the following:
2. Ask for help on Tumblr, and update the post afterwards
[Plain text: "Ask for help on Tumblr, and update the post afterwards". End description.]
Myself and a lot of other people who describe posts on this site are extra happy to provide a description if OP asks for help with one! This does leave the post inaccessible at first, so to minimize the drawbacks, the best procedure for posting an image you can't fully describe would be as follows:
Create the tumblr post with the most bare-bones description you can manage, no matter how simple (something like "ID: fanart of X character from Y. End ID" or "ID: a watercolor painting. End ID," or literally whatever you can manage)
Use a tool like Google Lens or OCR to extract text if applicable and if you have the energy, even if the text isn't a full image description (ideally also double-check the transcriptions, because they're not always perfect)
Write in the body of the post that you'd appreciate a more detailed description in the notes!
Tag the post as "undescribed" and/or "no id" only if you feel your current, bare-bones description is missing out on a lot of important context
When you post it and someone provides an ID, edit the ID into the original post (don't use read mores, italics, or small text)
Remove the undescribed tag, if applicable. If you're posting original art, you can even replace it with a tag like "accessible art" for visibility!
And congrats! You now have a described post that more people will be able to appreciate, and you should certainly feel free to self-reblog to give a boost to the new version!
756 notes · View notes
techdirectarchive · 1 month ago
Text
Perform Key Distribution Center Service [krbtgt] Password reset
The KRBTGT account plays a crucial role in Microsoft’s implementation of Kerberos. That is, it is the default authentication protocol for Windows. A deep understanding of how the KRBTGT account functions can significantly impact the security and compliance of your network. In this article, we shall discuss the need for and how to Perform Key Distribution Center Service [krbtgt] password reset.…
0 notes
photomatt · 1 year ago
Note
Hey, genuine question, although I'm not honestly expecting a response: if tumblr users have been telling you what they want and what they don't want since you've taken over, and their feedback has more or less been ignored consistently whilst rolling out changes that nobody asked for or uses (tumblr live is coming to mind), and you're not getting the content use you want, might it be an idea to try those before abandoning the site? What is the worst that could happen, really? Listen to your userbase. You had a lot of good will from listening to people at the start of your ownership: blaze did well, as did ad-free, polls and so on, but there are some really popular things you've removed or made obsolete (prev tags, blog themes, avatars etc.) that a lot of people want back. Equally, there are some things I've never heard a single person want - this site isn't TikTok, and never will be. Instead of trying attract a crowd that is already catered for elsewhere, making the people who love tumblr still despite all the changes in ownership more comfortable under you can only be a benefit. Thank you for reading, if you did actually read this.
Thank you for the genuine question! First, I'll say that we've never launched anything with the expectation the community would hate it, but there sometimes is a big difference between what people say they want and how people respond or what information (and often misinformation) goes viral.
As an example, Post+, which is a feature where you can pay to subscribe to other users, had some misinformation go viral that if you used it you'd be sued by copyright holders if you did fan fiction, and there was a huge backlash that the site was going paid and a coordinated campaign to attack (including with death threats) everyone who signed up for the program.
I'll repeat, this was a program where the money all went to creators, Tumblr did not take a cut, and the creators were often already selling work on Patreon or Ko-fi, this just was an integrated way for it to work. Because of the hate and attacks, every launch creator canceled the program. It was sad, because this was a feature users and creators said they wanted, and we prioritized making users money over projects that would make us money.
Since then we've gotten better at managing attacks and threats, with new tools and a bigger Trust & Safety team, but Post+ never recovered.
You mention Blaze and Ad-free doing well, but their adoption is so small relative to the use of Tumblr their revenue couldn't support a fraction of the ~1,000 servers it takes to run Tumblr, much less any salaries.
To your broader point, though, one thing I'm hoping with a more focused approach in 2024 is that we can streamline some of the extra things that were launched (like Live) that haven't gotten the adoption we hoped, and focus in on the core functionality that people use a ton of on Tumblr. We will likely be shipping less new stuff and more focused on improving existing functionality and core flows.
673 notes · View notes
best-develpoment-company · 1 year ago
Text
What is Cloud Server management and How to set by set Managed Cloud server hosting?
Cloud server management refers to the process of overseeing and maintaining cloud servers, ensuring they run efficiently, securely, and in accordance with the needs of your business. "Best Managed cloud server hosting involves outsourcing" these management tasks to a third-party service provider, which can help you focus on your core business activities while experts take care of the technical aspects of server management. Here are "the steps to set up managed cloud server hosting":
Tumblr media
Select a Cloud Service Provider: Choose a cloud service provider such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud, or a different provider based on your specific needs and preferences. The selection of the cloud provider will depend on factors like the services they offer, geographic availability, and pricing.
Choose the Right Cloud Server: Determine the type of cloud server (e.g., virtual machine instances) you need based on your application requirements, such as computing power, memory, storage, and network resources. Your "managed cloud server provider in Delhi" can assist in selecting the appropriate server configurations.
Select a Managed Cloud Server Provider: Research and choose a managed cloud server hosting provider. Consider factors like their reputation, expertise, service offerings, and pricing.
Engage with the Managed Cloud Server Provider: Contact the chosen provider to discuss your server management requirements. They will gather information about your specific needs, expected traffic, and application workloads.
Provision the Cloud Server: The managed cloud server provider will set up the cloud server environment for you based on your requirements. This typically includes deploying virtual machines, configuring storage, and setting up network components.
Data Migration and Application Deployment: If you have existing data or applications to move to the cloud server, work with the provider to ensure a smooth migration process. You may need to install and configure your software and applications as well.
Security Configuration: Ensure that the server and applications are properly secured. This includes setting up firewalls, intrusion detection systems, encryption, and access controls.
Managed cloud service providers in Delhi | Types of cloud managed Services in Dwarka | Cloud managed services scope of work | Benefits of managed cloud services | Cloud management services | Cloud management services company | Unmanaged cloud storage with nwspl |
Cloud Server Management in Delhi | Managed cloud server in Delhi | Cloud Server Manger in Delhi | Cloud server management in Delhi | Cloud based server manager in Delhi | Fully managed cloud server in Delhi | Cloud server management panel in Delhi | Cloud server management Services in Delhi | Cloud Server Management Software in Delhi | Managed Cloud server hosting in Delhi | Google Cloud Sql Server management studio in Delhi |
0 notes
ungrateful-cyborg-moved · 9 months ago
Text
FFXIV Forum
Fuck it, let's try again.
Some time ago I created a forum that didn't stay lively for very long, unfortunately, but I don't want to give up on it as I think forums offer something that no other tool for online community can offer: an actual community that doesn't rely on everyone acting like their own PR/marketing team.
So here it is, in case anyone's interested:
What does it have to offer?
A place to meet artists and roleplayers from the FFXIV fandom, where you won't be assailed by notifications like a Discord server, that's LGBTQ-friendly and won't ask you to post all the time to remain visible (contrary to social media).
What you'll find:
RP sections for your RP threads, easier to manage than on Tumblr, and without the pressure of being seen online on Discord because you wanted to talk to your friends but aren't in the mood for RP
A place to get help to create your character or write an NPC, if you're feeling insecure and want to try your hand at writing/roleplaying
Galleries for your writing, fanarts, screenshots, irl craft, etc. where you don't have to worry about peak hours to be seen
Forums where you can gush about your own characters and get asked questions: no need to have a big following anymore!
A place where you can discuss the lore and share your meta analysis to your heart content
A place to organize your own in-game event and promote it, once again without needing to build a big enough following for it to be noticed!
Yes, there's a NSFW section (that you have to ask to get access to). Forumactif—the host—is not in favor of this, however, so if Etheirys has enough success I might consider hosting it myself (but I'm not rich so we'll start with the free alternative for now and just keep it on the low XD)
And more!
I am taking suggestions to improve it and I'll gladly help you and answer your questions if you're not familiar with forums (or this sort of forums, anyways).
For those who don't know me or find me intimidating to talk to (I know it has happened) I've been leading communities big and small for about 18 years now, and I've always put a big emphasis on fairness, communication and patience.
(Please reblog so more people can see this!)
457 notes · View notes