• The article was originally and incorrectly loaded as my friend Brian's, when they corrected it I think it caused a problem with the post.

    You make good points about options. I've always liked doing it based on machine because I know that machine is "safe" for me to use to do certain things. It's not out of the question that I might have something else running under my credentials that I wouldn't want to bypass the trigger. The key point is that it's possible to get around the trigger without dropping/disabling, which is too often the way it's solved.

    Context info never really seemed to catch on, maybe because it requires a little more work to populate it.