A smarter way to target your audience with Bing Ads and LinkedIn – Bing Ads

Today we’re excited to announce the newest evolution in our continued integration of LinkedIn and Microsoft Advertising. Available now for our current clients, we’re offering profile targeting that leverages LinkedIn data for search campaigns on the Bing Ads platform.

With over 575 million global LinkedIn members, part of our vision has always been to bring together each company’s rich data and deep understanding of users to help our customers reach people in meaningful ways.

Unique to the Bing Ads platform, this is a great opportunity for marketers to maximize their campaign spend with more precision-based targeting through the following three professional profile dimensions: Company, Job Function and Industry.

We are making this easy for our clients to get started right away through the Bing Ads platform using familiar campaign creation and management tools. To start we’re offering bid only targeting, with exclusions coming soon. It works across text ads, shopping, and basically all Bing search products (available in the US only).

We continue to innovate our products and platform, so our clients and marketing partners can gain the highest return on marketing investment as well as perfect the target audience reach best suited for campaign goals.
 

Healthcare.gov breach exposes data on 75,000 people

The Centers for Medicare and Medicaid Services disclosed a recent Healthcare.gov breach affecting approximately 75,000 people.

The CMS said in a statement that its staff detected an attack in the Federally Facilitated Exchanges (FFE) Direct Enrollment pathway, which is the system that agents and brokers use to help customers apply for insurance through Healthcare.gov.

CMS began the initial investigation of anomalous system activity in the Direct Enrollment pathway for agents and brokers on October 13, 2018 and a breach was declared on October 16, 2018. The agent and broker accounts that were associated with the anomalous activity were deactivated, and — out of an abundance of caution — the Direct Enrollment pathway for agents and brokers was disabled,” CMS wrote in a press release. “We are working to address the issue, implement additional security measures, and restore the Direct Enrollment pathway for agents and brokers within the next 7 days.”

This is not the first Healthcare.gov breach. In 2014, CMS reported an intrusion on a test server where malicious actors installed malware in order to launch DoS attacks on other websites. However, testing of Healthcare.gov in 2015 found the site “generally secure,” according to white hat researchers. 

CMS did not say what information was involved in the Healthcare.gov breach, but many experts, like Ruchika Mishra, director of products and solutions at Balbix, said it would not be surprising to find insurance applications include names, addresses and social security numbers.

This breach shows once again that no entity, not even the U.S. government, is immune from the dangers posed by hackers.
Ruchika Mishradirector of products and solutions, Balbix

“If this kind of data was exposed, users could face issues of identity theft and more,” Mishra wrote via email. “This breach shows once again that no entity, not even the U.S. government, is immune from the dangers posed by hackers. To best combat these issues, an organization must implement security solutions that scan and monitor not just the organization-owned and managed assets, but also all third-party systems. Proactively identifying and addressing vulnerabilities that would put them at risk before they become entry points for attackers is the only way to stay ahead of breaches.”

Zohar Alon, CEO of Dome9 Security Ltd., said that threat actors targeting the back-end system in the Healthcare.gov breach was telling.

“Attackers will always target the weakest point-of-entry into networks and that’s why organizations must continuously monitor the threat landscape in real time and enforce security discipline across all assets, including connected sites,” Alon wrote via email. “Continuous compliance is essential to keeping sensitive information safe and secure, while maintaining public trust.”

Tim Erlin, vice president of product management and strategy at Tripwire, took time to praise the Healthcare.gov breach response by CMS.

“While there may be opportunities for criticism in any incident, CMS’ detection, response and recovery times, including a public announcement, seem to demonstrate a high level of competence,” Erlin wrote via email. “It’s clear that they’re not making up a response plan as they go here.”

Microsoft Store app and game submission deadlines for the 2018 holiday season – Windows Developer Blog

The holidays are right around the corner and to take advantage of the holiday traffic increases we see in Microsoft Store, you’ll want to update or submit your app or game no later than Monday, November 13th for Thanksgiving (US) and Thursday, December 13th for the Christmas holiday. You can see the full list of submission deadlines below.
Updating or submitting your app or game early ensures that they will be available during the holiday season!

Updated October 25, 2018 10:08 am

For Sale – Or Trade – 27″ iMac (Late 2012 Boxed) & HTPC

I am selling both my 27″ iMac (Late 2012) and HTPC the specs are:

27″ iMac

27″ Screen
Intel Core i5 3.2GHZ
32GBS RAM
1TB HDD
NVIDIA GeForce GTX 675MX 1GB RAM

The original keyboard and mouse are included and in excellent condition, the iMac has barely been used over the years as I would always end up using my MacBook air out of convenience.

The original box is in great condition and I have included an external blu-ray drive as well.

£850

HTPC

Windows 10 Pro
Intel Core i3-4160 – 3.6GHZ
8GBS RAM
120GB SSD
1TB HDD
Slim line DVD drive
TBS 6281 TV Dual Tuner Card
Silverstone Case
Microsoft Xbox controller
Logitech Keyboard and touchpad
Pulse Eight USB – CEC adaptor (control the media software with your tv remote)
TP Link AC1200 Wifi Adaptor

I have reset windows to remove all my files etc, I used this as our main media centre for the past 3 years flawlessly. I used Kodi as the main software which booted automatically, and mediaportal as the freeview client which worked perfectly. These will need to be reinstalled but are all free and there is a great Kodi / Mediaportal guide on these forums.

£320

Price and currency: £850 & £320
Delivery: Delivery cost is not included
Payment method: PPG or BT
Location: Aberdeen
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference
______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

A smarter way to target your audience with Bing Ads and LinkedIn – Bing Ads

Today we’re excited to announce the newest evolution in our continued integration of LinkedIn and Microsoft Advertising. Available now for our current clients, we’re offering profile targeting that leverages LinkedIn data for search campaigns on the Bing Ads platform.

With over 575 million global LinkedIn members, part of our vision has always been to bring together each company’s rich data and deep understanding of users to help our customers reach people in meaningful ways.

Unique to the Bing Ads platform, this is a great opportunity for marketers to maximize their campaign spend with more precision-based targeting through the following three professional profile dimensions: Company, Job Function and Industry.

We are making this easy for our clients to get started right away through the Bing Ads platform using familiar campaign creation and management tools. To start we’re offering bid only targeting, with exclusions coming soon. It works across text ads, shopping, and basically all Bing search products (available in the US only).

We continue to innovate our products and platform, so our clients and marketing partners can gain the highest return on marketing investment as well as perfect the target audience reach best suited for campaign goals.
 

Azure Backup service best practices to streamline protection

Azure Backup is a service that enables organizations to back up their data to the Microsoft Azure cloud and provides comprehensive data protection.

Although the Azure Backup service supports seamless backups, there are some best practices that an organization should use for optimum data protection. For example, it is important to implement this protection in a way that will not deplete your bandwidth. You will also need to be aware of the cost associated with protecting all of your virtual machine instances.

Consider the bandwidth requirements

One of the first things that you must consider prior to setting up the Azure Backup service is bandwidth requirements. If you already have a sizable amount of data that needs to be protected, for example, then it may be completely impractical to upload all of that data to the cloud.

Depending on your available bandwidth, it could take weeks to upload a few dozen terabytes of data to Azure Backup. As such, it is a good idea to take a look at Microsoft’s offline seeding option. This option allows you to create the initial backup in your own data center and then ship the backup to Microsoft for ingestion into the Azure cloud.

You must also consider the volume of data that your organization creates each day. There have been many documented instances of organizations having a data change rate that exceeds what their bandwidth can handle. In such situations, it is necessary to adopt data reduction techniques or to acquire additional bandwidth.

Don’t give up your on-premises backups

Cloud backup has its advantages and disadvantages. On one hand, cloud backup stores data remotely, thereby insulating the organization against regional disasters. On the other hand, this isolation can also make data restorations difficult and time-consuming.

Although the Azure Backup service supports seamless backups, there are some best practices that an organization should use for optimum data protection.

According to Microsoft, the Azure Backup service is designed to be used with System Center Data Protection Manager (DPM). It is possible, however, to use one Data Protection Manager server to protect another. This means an organization could conceivably write its backups to an on-premises DPM server that stores backups locally, and then use a secondary Data Protection Manager server to back up all of that data to the Azure cloud.

The advantage to using this technique is that it allows data to be restored from a local source, rather than requiring all restore operations to be based on cloud data. This allows restore operations to complete far more quickly than would be possible if the data had to be downloaded from Azure. However, the data stored within the Azure Backup service could be used to recover from a more catastrophic failure in which restoring from a local backup is not an option.

One important thing to keep in mind about this backup architecture is that it is not suitable for every situation. If an organization is operating almost entirely in the cloud, then it probably does not make sense for that organization to deploy an on-premises System Center DPM server. In such a situation, it would be better for the organization to back up its cloud resources directly to Azure Backup. Incidentally, Azure Backup allows for cross-region redundancy, so you are protected against backup failures.

Consider the costs

Although the cloud had a reputation for being a less expensive alternative to on-premises operations, there are considerable costs associated with using the Azure Backup service. The costs are based on factors such as the size of the data set being protected and whether you are using locally redundant storage or geo-redundant storage.

Microsoft charges a flat fee for each instance that is being protected, but also charges for the storage that is consumed. The flat fee works out to about $10 per 500 GB (or fraction thereof) of storage consumed, but is only $5 for instances that are less than 50 GB in size. Hence, a 1.2 TB instance would incur a fee of $30 per month.

The storage fees account for the bulk of the data storage costs. These fees range from just over 2 cents per gigabyte, per month to just under 5 cents per gigabyte, per month, depending on the amount and type of storage that is being used. The storage cost associated with backing up a 1.2 TB instance to locally redundant storage would be $29.41. When you also include the previously mentioned fees, the cost of backing up that instance works out to $59.41 per month, plus any applicable taxes and fees.

IT pros shore up Prometheus monitoring via third-party tools

Prometheus monitoring offers crucial data in Kubernetes container orchestration environments, but many enterprises prop up its reliability and security with third-party tools.

Prometheus is an open source time-series monitoring tool governed by the Cloud Native Computing Foundation (CNCF) alongside Kubernetes. Both Prometheus and Kubernetes graduated to stable status within the CNCF in 2018. While some IT shops are comfortable with upstream Kubernetes deployments in production, Prometheus monitoring is a different story.

“Prometheus isn’t particularly enterprise-friendly,” said Jeremy Pullen, CEO and principal consultant at Polodis Inc., a DevSecOps and Lean management advisory firm in Tucker, Ga., that works with large enterprise clients. “Some people get scared by Prometheus being lossy — it throws away data when it falls behind.”

Prometheus monitoring in its upstream form lacks native server-side authentication and encryption of the data it collects, so users must deploy a reverse proxy server alongside Prometheus to enhance its security. Fairly simple reverse proxy tools such as Nginx and HAProxy are available in open source versions and are easily deployed, but enterprises find that Prometheus monitoring security in multi-tenant enterprise environments requires a proprietary tool.

The search for multi-tenant Prometheus

For an IT contractor that works with the U.K.’s central Home Office agency, a combination of Prometheus monitoring and Sysdig Monitor 3.0 met the agency’s requirements for multi-tenant security support and data management.

“We started working with Sysdig two years ago, because its integration with the Kubernetes API gave it knowledge of the context of containers,” said Jay Keshur, director of Appvia Ltd., the contracted digital delivery and cloud consultancy firm. “But we’ve been asking for Prometheus integration for about a year.”

Sysdig Prometheus multi-tenancy
Multi-tenant management for open source Prometheus compared to the Sysdig Teams feature.

Prometheus uses labels to track instances in the Kubernetes infrastructure, and Prometheus labels align with resource labels in Kubernetes. Prometheus also pulls a detailed set of granular time-series data from Kubernetes nodes, which offers application developers more detailed data on application performance than traditional IT monitoring tools.

“Prometheus gets closer to the app,” Keshur said. “Sysdig could already pull some of that data through StatsD, but Prometheus integration gives us the ability to organize metrics with consistent tagging groups.” StatsD is a way to unify application metrics collection, originally created by Etsy Inc.

These tagging groups are the basis for alerts and team-specific views of the Prometheus database. If an application developer wants to track the number of logins on an app and determine whether the logins came from an administrator or another type of user, Sysdig’s Prometheus integration offers an easy way to break down that data that doesn’t require custom metrics work.

However, while Prometheus monitoring is well-suited to Kubernetes pods and the containers within them, Sysdig has better integration with hosts in the Kubernetes cluster. This means developers don’t have to write hooks for Nginx host monitoring, for example, Keshur said.

Sysdig also integrated Prometheus monitoring with its Sysdig Teams approach to multi-tenancy, which Keshur’s team requires in a highly secure government environment. Sysdig Teams differs from other approaches to Prometheus monitoring on multi-tenant systems that deploy multiple instances of the Prometheus application.

“This gives us multi-tenancy that scopes what each team can see, but with a single central place to host Prometheus,” Keshur said.

Kubernetes orchestrators reinforce Prometheus

For some enterprises, Prometheus monitoring, with the necessary security and reliability features, comes baked in to third-party Kubernetes distributions from vendors such as Rancher Labs Inc. and Red Hat.

“Rancher does the work to install Prometheus for us, and role-based access control is built into the tool,” said Matthew Esser, product owner of container services and infrastructure at Viasat Inc., a satellite telecommunications company in Carlsbad, Calif. “It’s something we can offload to Rancher, and it helps with performance and reliability.”

If you use [Prometheus] in a multi-tenant environment you might lose some capabilities. … Deploying a new instance inside each project and a separate instance to monitor the health of the overall Kubernetes cluster is still the safer way to go.
Sheng Liangfounder and CEO, Rancher Labs

In addition to multi-tenancy support through integration with Kubernetes role-based access control, Rancher Labs includes a reverse proxy for server-side authentication in Prometheus and can automate upgrades the same way it does for Kubernetes. Red Hat OpenShift Container Platform includes similar features, and version 3.11, released last week, includes a CoreOS Operator for Prometheus that automates storage provisioning, sets monitoring alert thresholds and integrates Prometheus data into OpenShift dashboards. These improvements in OpenShift boost Prometheus performance as well to address the risk of dropped data.

However, both Rancher Labs and Red Hat say there’s room to improve scalability and security in the upstream versions of Prometheus.

“Prometheus is historically a single-tenant stack, and if you use it in a multi-tenant environment, you might lose some capabilities,” said Sheng Liang, founder and CEO of Rancher Labs. Trying to cram too much data from a large environment into a single central Prometheus deployment, for example, risks data loss. “Deploying a new instance of Prometheus inside each project and a separate instance to monitor the health of the overall Kubernetes cluster is still the safer way to go,” Liang said.

Red Hat participates in an open source project called Thanos, which supports a highly scalable centralized Prometheus architecture with long-term data storage features.

“In 2019, it will give customers the choice to deploy one big Prometheus instance for tenants and clusters, with multi-tenant cluster views and an improved user experience,” said Mike Barrett, director of OpenShift product management at Red Hat. However, some users will still deploy instances of Prometheus for each project to get the most detailed data possible, Barrett predicted.

Prometheus roadmap includes security improvements

Multi-tenancy support for Prometheus monitoring will remain the domain of third parties, said Julius Volz, a former platform engineer at SoundCloud who created Prometheus and helps to maintain its open source code.

However, server-side authentication improvements for server endpoints in Prometheus, its exporters and a related utility called Alertmanager are on the Prometheus roadmap, Volz said. Also, while some dropped data is considered acceptable under some conditions in Prometheus environments, planned improvements will reduce data loss when Prometheus exports data to external databases.

“When Prometheus cannot send samples to the remote [endpoint], it will drop samples for the duration of the outage and then resume only with current data when things work again,” Volz said. “There are some plans to improve that part by replaying samples from the local database and resend them to the remote end.”

For Sale – Lenovo IdeaCentre Y710 Cube Gaming Pc i5-6400 Gtx 1070

Discussion in ‘Desktop Computer Classifieds‘ started by hums60, Sep 28, 2018.

  1. hums60

    Active Member

    Joined:
    Apr 6, 2006
    Messages:
    1,523
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    66
    Ratings:
    +101

    Lenovo Y710 Cube Gaming Pc
    Bought from laptops direct on 1st March this year
    So Still under warranty

    link to exact model

    Lenovo IdeaCentre Y710 Cube-15ISH Core i5-6400 8GB 1TB GeForce GTX 1070 Windows 10 Gaming Desktop – Laptops Direct

    Compact and very good looking gaming pc
    i5 6400
    8Gb Ram
    1tb Hdd
    Gtx 1070
    Lenovo keyboard and mouse
    original box
    Never had any problems with it
    Prefer collection due to size/weight/value
    But will post at cost

    Price and currency: 699
    Delivery: Delivery cost is not included
    Payment method: cash on collection or BT
    Location: sandbach
    Advertised elsewhere?: Advertised elsewhere
    Prefer goods collected?: I prefer the goods to be collected

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Attached Files:

    Last edited: Oct 19, 2018 at 9:55 AM
  2. hamez101

    hamez101

    Novice Member

    Joined:
    Sep 27, 2018
    Messages:
    24
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    3
    Location:
    Scotland
    Ratings:
    +2

    anything else?

  3. hums60

    Active Member

    Joined:
    Apr 6, 2006
    Messages:
    1,523
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    66
    Ratings:
    +101

    Anything else in what way ?

  4. hamez101

    hamez101

    Novice Member

    Joined:
    Sep 27, 2018
    Messages:
    24
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    3
    Location:
    Scotland
    Ratings:
    +2

    somthing at a smaller budget

  5. hums60

    Active Member

    Joined:
    Apr 6, 2006
    Messages:
    1,523
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    66
    Ratings:
    +101

    No sorry just this

  6. hums60

    Active Member

    Joined:
    Apr 6, 2006
    Messages:
    1,523
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    66
    Ratings:
    +101

    Price drop to £750

  7. hums60

    Active Member

    Joined:
    Apr 6, 2006
    Messages:
    1,523
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    66
    Ratings:
    +101

    Price drop £699

Share This Page

Loading…