No joke, I decided to pop in today and was just randomly scrolling through and saw my thread.
OP is alive and well lol
Yeah this in new thread stuff bud. But you got your work cut out by the sounds of it. You don't typically setup your own network in a wework office in my experience. Your...
Here is the ebay listing for the Li Heat and attached is the cross section graphic of the cable they use. Is that twinaxial cable like 3m or something better/worse?
Looking for input on a new PC case. The GPU thermals on my current setup aren't great due to the shallow height above the GPU's. For reference, the PCIE power cables touch the lid. The bulk of the exhaust from the bottom GPU recirculates into the top GPU.
Due to housing changes, I need to...
As others have said a windows server with Active Directory and file shares. Or if you don't have a server a quality NAS has means of securing docs.
For cloud based I've seen Sharepoint, box and dropbox im action. Lots of companies fighting to be your cloud vendor. They all have their pros and...
Lookup the spec sheet of the model your interested in. They are rated to function normally in certain temperature ranges. Not sure if there are any designed for outdoor use, but interesting question. Let us know what you end up doing.
Your right, from what I understand if layer 3 switch is available that would provide the best performance and handle the routing. I updated the original question removing option 3.
I guess what I was trying to figure out is there any performance differences between these "router on a stick"...
Riddle me this, which of the setups below would yield the highest throughput between vlan 10 and vlan 20? I've seen all 3 of these setups in the real world.
Setup 1 (vlans on router&sw, single link)
Firewall
interface 1 trunk VLAN 10,20 tagged
Switch
interface 1 trunk VLAN 10,20 tagged...
I love how divided [H] users are on this topic. I thought for sure a gathering of IT folk would come to a concensus.
Can we remake this thread with a poll?
I've always interpreted it as jif. The inventor calls it jif. That's good enough for me.
It's like toilet paper rolls. Over or under...
What is shocking is why did they have to pay the ransom rather than restore from on site backup files? Did they not have any backups? Did the backups get encrypted also?
I've seen the crypto virus take on dozens of forms. Hackers have refined the code now that it no longer requires...