AI in the workplace

February 4, 2025 Reading time: 7 minutes

AI in the Workplace: Potential Risks & Considerations

AI can enhance efficiency and productivity, but it also comes with risks that users should be aware of. Below are key considerations to ensure responsible AI use in the workplace.

1. Data Privacy & Security

  • AI tools may process sensitive company or customer data.
  • Always verify if data is being stored, shared, or processed externally.
  • Follow company guidelines on handling confidential information.

2. Accuracy & Reliability

  • AI-generated content or decisions may contain errors or biases.
  • Cross-check critical outputs before acting on AI-generated recommendations.
  • Do not rely on AI for tasks requiring human judgment, ethics, or legal compliance.

3. Bias & Fairness

  • AI can reflect and amplify biases present in its training data.
  • Be mindful of how AI suggestions impact workplace decisions (e.g., hiring, promotions).
  • If something seems unfair, question the AI’s reasoning and consult human oversight.

4. Compliance & Legal Risks

  • AI-generated content may not comply with regulations (e.g., GDPR, copyright laws).
  • Ensure that AI use aligns with industry standards and legal requirements.
  • When in doubt, consult IT, legal, or compliance teams.

5. Over-Reliance on AI

  • AI should complement, not replace, human expertise.
  • Automated processes still require human oversight and critical thinking.
  • Be prepared to intervene if AI makes incorrect or inappropriate suggestions.

6. Ethical Considerations

  • AI should not be used to manipulate, mislead, or create deceptive content.
  • Transparency is key—inform colleagues or customers when AI-generated content is used.
  • Consider the ethical implications of AI-driven decisions in your role.

Best Practices for Safe AI Use

Use AI as a support tool, not an absolute decision-maker.
Double-check AI-generated content for accuracy and appropriateness.
Follow company policies on AI usage and data security.
Report any suspicious or harmful AI behavior to your IT or compliance team.

By staying informed and cautious, employees can leverage AI effectively while minimizing risks. If you have questions about AI use in your workplace, consult your company’s AI guidelines or IT department.


G3258 Overclock

January 31, 2025 Reading time: ~1 minute

I purchased an Intel G3258 Pentium when they were released, and found it was a fantastic CPU for the budget price. 

Eventually I decided to overclock it - and was impressed with the performance and how stable it was. All on stock HSF cooling.


Are AD Joined Systems "Managed" ?

January 28, 2025 Reading time: 2 minutes

According to ChatGPT :

Yes. Windows devices that are joined to an Active Directory (AD) domain are generally considered managed devices. This is because joining a device to an AD domain enables IT administrators to manage the device centrally through policies, configurations, and updates.

Here’s why they are considered managed:

  1. Group Policy Management:

    • Administrators can enforce security settings, deploy software, and configure user environments using Group Policy Objects (GPOs).
  2. Authentication and Authorization:

    • Domain-joined devices use centralized authentication (via Kerberos) for access to network resources, ensuring only authorized users and devices can access them.
  3. Software Deployment:

    • IT can deploy software and updates across all domain-joined devices using tools like Microsoft System Center Configuration Manager (SCCM) or third-party solutions.
  4. Security Controls:

    • Administrators can enforce password policies, configure firewall rules, and apply other security settings uniformly across devices.
  5. Monitoring and Compliance:

    • Domain-joined devices can be monitored for compliance with organizational policies.
  6. Access to Centralized Resources:

    • Domain joining allows seamless access to shared drives, printers, and other network resources that are controlled by AD.

However, it is worth noting that being "managed" through AD alone may not include modern management capabilities offered by solutions like Microsoft Intune or other Mobile Device Management (MDM) platforms. To enable hybrid or more advanced management scenarios, organizations often combine AD domain-joined setups with Azure AD integration or co-management via Intune.

NOTE

There is conflicting information online as to if this information is correct or not. So as with all things on the internet, take it with a grain of salt......


Error : unarc.dll error code -11

January 21, 2025 Reading time: 38 minutes

If you are attempting to install a program, especially if its been compressed by a 3rd party, and get the error " unarc.dll error code -11", try the following easy fix...

Right click This PC in Windows/File Explorer

Select Properties, then select Advanced System Settings.

Click Settings under Performance.

In the new window, go to the Advanced tab and under the Virtual memory section, click on Change.

Click "Custom", and in the Initial Size enter a figure - I have 400 set there, and then under Maximum, enter a larger figure, I set mine to 16000. (400MB and 16GB)

Click OK a few times and restart your PC.

Once you are logged back in, try running the program setup file again and it should run.


Virus alert from a pirated/cracked game

January 17, 2025 Reading time: 2 minutes

So you've decided to join the infamous group of computer gaming users known as "pirates".

Hey, I've got nothing against piracy to a degree, not everyone has the $$ to hand out for new games. But I won't get into the politics of it all.

Now, you've downloaded a pirated/cracked game (note: crackers are not necessarily pirates themselves, but do tend to blend/work together a lot), and start the install process...... just to get an anti-virus warning pop up. Most users have grown up to take heed of these warnings and delete whatever it is causing the alert. But with cracked/pirated games, this is usually a false-positive. 

When games are cracked, certain files are edited, and other code injected to allow the crack to work, and this is what your AV program is detecting.

95% of the time, these alerts can be ignored with no issue at all (and remember to allow/remove from quarantine the file in question or else your game won't work).

The other 5% could very be an actual virus/malware package injected by a 3rd party. 

How to avoid this ?

Well, honestly you can't.

Best thing to do, is stick with a single supplier/group that you feel you can trust as much as a pirate can. Check around for popular scene/pirate/cracker groups, especially well established ones. If you can, get access to the "official" (aka private)  distribution sites/torrent trackers the group uses rather than 3rd party, where anyone can upload the game AFTER they've injected their own crap into it.

At the end of the day, you're dealing with pirated material and operating in the "underworld", and as with drug dealers, you never quite know what you're getting.....


Do I need new hardware for a home server ?

January 14, 2025 Reading time: ~1 minute

I see a LOT of people on Reddit asking if certain hardware is suitable for a basic first home server.

You can start a home server on almost anything.

My first home server was running on an Intel G3258 running Windows 7 with 8GB of RAM and a 1TB HDD. IT worked perfectly for what I wanted, which was a basic seedbox (torrents), file server (for home photos etc) and Plex (media streaming).

Eventually I upgraded to a I5-3470 obtained from a PC given to me by a friend who had built a newer system. Found I could run the above and a basic game server such as Minecraft.

So for basic stuff, you do not need anything flash.

My current server is an i5-6500, 16GB RAM, 1x 512MB SSD for the OS (Windows 10), and 2x 4TB for data storage.

It runs all the above stuff along with a VM running some other services via RunTipi (Linux hosting environment)

It happily handles 4 users streaming 1080p videos from me, and a few people playing Minecraft. 

So if you want a server and think that old 4th Gen i5 system is of no use, think again. You'll be surprised, and probably save a few bucks.


About

XPD /FastRaccoon / Gavin
Geek from the Amiga days

Hit Counter

1586