monogrant
- Total activity 25
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 9
- Subscriptions 6
Activity overview
Latest activity by monogrant-
monogrant commented,
Agree. Even some of us in Mac management got them to test workflows, scripts, management so we were ready for our users and we're not dedicated software engineers.
-
monogrant commented,
Apple announced the transition in June 2020. (https://www.apple.com/newsroom/2020/06/apple-announces-mac-transition-to-apple-silicon/) That was 232 days ago! This change wasn't a shock. You know yo...
-
monogrant commented,
Box Tools as of today requires Rosetta. That is not arm64/Apple Silicon support.
-
monogrant commented,
I've been discussing that article -- https://support.box.com/hc/en-us/articles/1500000564381-M1-support-for-Box-Tools -- with support today. Box seems to be defining "support" as "can run with Rose...
-
monogrant commented,
I'm also seeing the updated article on Box Tools (no version number given, but dated with an update on Jan 20, 201) is "now supported". However attempting to install it does prompt to install Roset...
-
monogrant commented,
Does the expiration feature need to be enabled globally? I'm trying to add expiration through the CLI and having no luck. We were getting `400 Bad Request` when we did not include role, but now wi...
-
monogrant commented,
that only works if the ID doing the search (or as-user) has access to the object. Right now I'm hunting through an approach using the admin_logs/enterprise event stream. It's a bit of a hunt beca...
-
monogrant commented,
YES! And, second to the ARW please!! Sony is winning this space and we need support for these too.
-
monogrant commented,
Sounds like a syntax error in the script. From your comment, it's breaking a the "r" of "read" and trying to run that as a command. There is no command called "r" so it ends and says "command not ...
-
monogrant created a post,
Can we find objects by shared link id or URL only?
We're finding users often request access to files from IT still. They'll send a request with a shared link to us and ask for access. If we don't have access to that file, the hunt begins to try to...