Just an UwU boi living in an OwO world

  • 0 Posts
  • 65 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle

  • In my case, I work IT for a healthcare company. Current major projects of mine include trying to migrate servers from our data centers to the cloud and setting up Disaster Recovery options. These are 2 of my 22 current projects.

    On the day to day, I’ll determine what it takes for an application to run and how does it communicate to find the most optimal way we can build it within vendor and enterprise specifications. An example might be…

    • Application is a hosted Web Page
    • It stores all of its data a SQL Database
    • Is used by locations outside of our network, so this will require
      • A Public Endpoint to be accessible outside of our network
      • DMZ’d Network Security Group or Application Security Group to manage exactly what and be accessed from where
    • Is a low-tier application that does not require low latencies

    In this case, I can decide to use a PaaS Web Server and PaaS SQL Server, so that I don’t have to manage security and updates of the Operating System in the future. After deciding this, I might diagram how everything will connect and communicate, then build the infrastructure to fulfill this design. Lets say that means going to Azure (the cloud provider), building the Web Server and SQL Server, creating the DMZ rules (443 inbound from anywhere to WebServer and 1433 only from WebServer to SQLserver) I set up a backup system for both of these to take daily backups in case anything goes sour, then determine what steps are necessary to make sure that I can minimize the downtime for the migration, since it will take time to restore a backup from the data center’s version into the Azure version.

    I’m trying to keep things simple-ish for this example because there’s a wide variety of tools, environments, and processes that come into play for any one of these builds. Most of the time is spent not in actively moving things, but in determining best courses of action and minimizing downtime, especially being a healthcare environment where an application could be actively impacting a patient’s care.

    Of course there’s all the other stuff you might expect, like emails about a server not working right and meetings about how management wants to use more AI while needing to cut costs to the organization because we’re “not currently economically sustainable.”

    While by no means a comprehensive view into the work, I hope it grants some insight into the role!











  • I used to every day when I worked at a music shop and would play audio demos from it. The loss of the port made my job VERY difficult to do. Now that I work in a new field and have had to invest in some bluetooth earbuds, I don’t find that I’d need the port very often, though the audiophile in me misses it sometimes, especially since bluetooth can be so unreliable sometimes. Don’t miss the dangling cable, but the thing is, I can bluetooth earbud on a phone that has a 3.5mm jack too, the fact that they removed it from phones as a standard when it’s such a cheap part to implement is baffling, especially when we’re paying tons for phones. I can have 16gb RAM, and 8-cores, bud God forbid I want to be able to plug in a speaker and have my phone plugged into the charger at the same time, like a repurposed old phone for a home audio system or something.




  • Ah, well my apologies, I made the incorrect assumption that it was. I’m headed to bed at the moment, so I apologize for the short explanation, I’ll try to come back with better facts and sources, but the short of it is that when you use a VPN, you’re effectively shifting trust from your ISP to your VPN provider. Trust that your data is not being mishandled, misused, is secured, and is not being used for further profits. If a VPN provider logs heavily and has a police raid or a subpoena, your data is still freely accessible. In all fairness, in using NordVPN, your traffic is still encrypted over the network, further securing you from attacks, but they tend to lean very log-heavy, and if I remember right, have had some security issues in the past, though don’t quote me on that, I want to come back more researched. Generally speaking, the consensus on Lemmy has been in favor of Mullivad since they log nothing and can even take anynomous payment, on top of being a very affordable VPN. Sorry again for my incorrect assumption regarding sarcasm, I’m used to a lot of hardcore privacy nerds on here. You’re better off with NordVPN than without is the fact of the matter, and good on you if you’re making use of it 😁