Building a Hyper-V Host Status Tool with PowerShell

#requires -version 5.1

Function Get-VMHostStatus {

<#

.SYNOPSIS

Get a summary of a Hyper-V Host

.DESCRIPTION

Use this command to get a summary snapshot of a Hyper-V Host. The command uses PowerShell remoting to gather system information, performance counter data and Hyper-V settings. It does not require the Hyper-V module unless you are running it on the local host, which is the default.

.PARAMETER Computername

Enter the name of the Hyper-V host.

.PARAMETER Credential

Enter an alternate credential in the form domainusername or machineusername.

.EXAMPLE

PS C:> Get-VMHostStatus -Computername HV01

Computername                    : HV01

Uptime                          : 13.20:01:31.7222927

PctProcessorTime                : 18.1370520347218

TotalMemoryGB                   : 128

PctMemoryFree                   : 34.79

TotalVMs                        : 24

RunningVMs                      : 18

OffVMs                          : 5

SavedVMs                        : 0

PausedVMs                       : 1

OtherVMs                        : 0

Critical                        : 0

Healthy                         : 24

TotalAssignedMemoryGB           : 32.896484375

TotalDemandMemoryGB             : 20.80078125

TotalPctDemand                  : 18.18

PctFreeDisk                     : 47.5408662499084

VMSwitchBytesSec                : 926913.772872509

VMSwitchPacketsSec              : 24.98692048485236

LogicalProcPctGuestRuntime      : 12.15894683010222

LogicalProcPctHypervisorRuntime : 2.710086619427829

TotalProcesses                  : 271

.INPUTS

System.String

.OUTPUTS

Custom object

.NOTES

Learn more about PowerShell: http://jdhitsolutions.com/blog/essential-powershell-resources/

.LINK

Get-Counter

.lINK

Get-VMHost

.LINK

Get-Volume

.LINK

Get-VM

.LINK

Invoke-Command

#>

    [cmdletbinding(DefaultParameterSetName = “Computername”)]

    Param(

        [Parameter(Position = 0, Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, HelpMessage = “Enter the name of the Hyper-V host.”, ParameterSetName = “Computername”)]

        [ValidateNotNullorEmpty()]

        [string[]]$Computername,

        [Parameter(ValueFromPipelineByPropertyName, HelpMessage = “Enter an alternate credential in the form domainusername or machineusername.”, ParameterSetName = “Computername”)]

        [PSCredential]$Credential,

        [Parameter(ParameterSetName = “Computername”)]

        [ValidateSet(‘Default’, ‘Basic’, ‘Credssp’, ‘Digest’, ‘Kerberos’, ‘Negotiate’, ‘NegotiateWithImplicitCredential’)]

        [ValidateNotNullorEmpty()]

        [string]$Authentication = “default”,

        [Parameter(ParameterSetName = “Computername”)]

        [switch]$UseSSL,

        [Parameter(ParameterSetName = “Computername”)]

        [System.Management.Automation.Remoting.PSSessionOption]$SessionOption,

        [Parameter(Position = 0,ParameterSetName = “session”, ValueFromPipeline)]

        [System.Management.Automation.Runspaces.PSSession[]]$Session

    )

    Begin {

        Write-Verbose “[BEGIN  ] Starting: $($MyInvocation.Mycommand)”

        $progParams = @{

            Activity         = $MyInvocation.MyCommand

            Status           = “Preparing…”

            CurrentOperation = “”

            PercentComplete  = 0

        }

        if (-not $PSBoundParameters.ContainsKey(“ErrorAction”)) {

            $PSBoundParameters.add(“ErrorAction”, “Stop”)

        }

        #get all the data via a remote scriptblock

        $sb = {

            #define a nested function to parse counter samples

            Function _getCooked {

                Param(

                    [Microsoft.PowerShell.Commands.GetCounter.PerformanceCounterSample[]]$Sample,

                    [string]$Counter

                )

                (($Sample).where( {$_.path -match “$counter”})).cookedValue

            } #close _getCooked

            Try {

                ($using:progParams).CurrentOperation = “Getting VMHost”

                ($using:progParams).PercentComplete = 20

                Write-Progress @using:progparams

                $vHost = Get-VMHost -ErrorAction stop

                ($using:progParams).CurrentOperation = “Getting OS properties”

                ($using:progParams).PercentComplete = 30

                Write-Progress @using:progParams

                $os = Get-CimInstance -ClassName Win32_OperatingSystem -property LastBootUpTime, FreePhysicalMemory, TotalVisibleMemorySize -ErrorAction Stop

                #get volume with default virtual hard disk path to check space

                ($using:progParams).CurrentOperation = “Getting virtual hard disk path volume”

                ($using:progParams).PercentComplete = 40

                Write-Progress @using:progParams

                $vol = Get-Volume (Split-Path $vhost.VirtualHardDiskPath).Substring(0, 1) -ErrorAction Stop

                ($using:progParams).CurrentOperation = “Getting virtual machines”

                ($using:progParams).PercentComplete = 60

                Write-Progress @using:progParams

                $vms = Get-VM

                ($using:progParams).CurrentOperation = “Calculating VM Usage”

                ($using:progParams).PercentComplete = 75

                Write-Progress @using:progParams

                $vmusage = ($vms).Where( {$_.state -eq ‘running’}) | Select-Object Name,

                @{Name = “Status”; Expression = {$_.MemoryStatus}},

                @{Name = “MemAssignGB”; Expression = {$_.MemoryAssigned / 1GB}},

                @{Name = “PctAssignTotal”; Expression = {[math]::Round(($_.memoryAssigned / ($vhost.memoryCapacity)) * 100, 2)}},

                @{Name = “MemDemandGB”; Expression = {$_.MemoryDemand / 1GB}},

                @{Name = “PctDemandTotal”; Expression = {[math]::Round(($_.memoryDemand / ($vhost.MemoryCapacity)) * 100, 2)}}

                #get performance counter data

                ($using:progParams).CurrentOperation = “Getting performance counter data”

                ($using:progParams).PercentComplete = 80

                Write-Progress @using:progParams

                $counters = Get-Counter -counter ‘processor(_total)% processor time’,

                ‘hyper-v virtual machine health summaryhealth critical’,

                ‘hyper-v virtual machine health summaryhealth ok’,

                “hyper-v virtual switch(*)bytes/sec”,

                “hyper-v virtual switch(*)packets/sec”,

                ‘systemprocesses’,

                ‘hyper-v hypervisor logical processor(_total)% guest run time’,

                ‘hyper-v hypervisor logical processor(_total)% hypervisor run time’

                #write result as a custom object

                [pscustomobject]@{

                    Computername                    = $vHost.Name

                    Uptime                          = (Get-Date) $os.LastBootUpTime

                    PctProcessorTime                = _getCooked -sample $counters.countersamples -counter ‘% processor time’

                    TotalMemoryGB                   = $vhost.MemoryCapacity / 1GB -as [int]

                    PctMemoryFree                   = [Math]::Round(($os.FreePhysicalMemory / $os.totalVisibleMemorySize) * 100, 2)

                    TotalVMs                        = $vms.count

                    RunningVMs                      = $vms.where( {$_.state -eq ‘running’}).count

                    OffVMs                          = $vms.where( {$_.state -eq ‘off’}).count

                    SavedVMs                        = $vms.where( {$_.state -eq ‘Saved’}).count

                    PausedVMs                       = $vms.where( {$_.state -eq ‘Paused’}).count

                    OtherVMs                        = $vms.where( {$_.state -notmatch “running|off|saved|Paused”}).count

                    Critical                        = _getCooked -sample $counters.CounterSamples -counter “health critical”

                    Healthy                         = _getCooked -sample $counters.countersamples -counter ‘health ok’

                    TotalAssignedMemoryGB           = ($vmusage | Measure-Object -Property MemAssignGB -sum).sum

                    TotalDemandMemoryGB             = ($vmusage | Measure-Object -Property MemDemandGB -sum).sum

                    TotalPctDemand                  = ($vmusage | Measure-Object -Property PctDemandTotal -sum).sum

                    PctFreeDisk                     = ($vol.SizeRemaining / $vol.size) * 100

                    VMSwitchBytesSec                = (_getCooked -sample $counters.countersamples -counter ‘bytes/sec’ | Measure-Object -sum).sum

                    VMSwitchPacketsSec              = (_getCooked -sample $counters.countersamples -counter ‘packets/sec’ | Measure-Object -sum).sum

                    LogicalProcPctGuestRuntime      = _getCooked -sample $counters.countersamples -counter ‘guest run time’

                    LogicalProcPctHypervisorRuntime = _getCooked -sample $counters.countersamples -counter ‘hypervisor run time’

                    TotalProcesses                  = _getCooked -sample $counters.countersamples -counter ‘\system\processes’

                }

            } #try

            catch {

                Throw $_

            } #catch

        } #close scriptblock

    } #begin

    Process {

        Write-Verbose “[PROCESS] Using parameter set $($pscmdlet.ParameterSetName)”

        If ($PSCmdlet.ParameterSetName -eq ‘session’) {

            $ps = $Session

        }

        else {

            Try {

                Write-Verbose “[PROCESS] Creating a PSSession to $($Computername -join ‘,’)”

                $progParams.CurrentOperation = “Creating temporary PSSession”

                $progParams.PercentComplete = 5

                Write-Progress @progParams

                $ps = New-PSSession @PSBoundParameters

                #define a variable to indicate these sessions were created on an ad hoc basis

                #so they can be removed.

                $adhoc = $True

            }

            Catch {

                Throw $_

                #make sure we bail out is the session can’t be created

                Return

            }

        }

        foreach ($session in $ps) {

            Write-Verbose “[PROCESS] Querying $($session.computername.toUpper())”

            $progParams.status = $session.computername.toUpper()

            $progParams.CurrentOperation = “Invoking scriptblock”

            $progParams.PercentComplete = 10

            Write-Progress @progParams

            Invoke-Command -ScriptBlock $sb -Session $session -HideComputerName |

                Select-Object -Property * -ExcludeProperty RunspaceID, PSShowComputername, PSComputername

        } #foreach

    } #process

    End {

        $progParams.CurrentOperation = “Cleaning up”

        $progParams.PercentComplete = 95

        Write-Progress @progParams

        if ($adhoc) {

            Write-Verbose “[END    ] Cleaning up sessions”

            Remove-PSSession $ps

        }

        Write-Verbose “[END    ] Ending: $($MyInvocation.Mycommand)”

    } #end

} #close function

Go to Original Article
Author: Jeffery Hicks

Microsoft collaborates with Telecom Egypt to extend its global cloud network to Egypt – Stories

Network collaboration will further enhance delivery of services to customers in Egypt, North Africa and the Middle East

BARCELONA, Spain — Feb. 27, 2019 — On Wednesday, during MWC Barcelona, Microsoft Corp. and Telecom Egypt announced their collaboration to extend Microsoft’s cloud network to Egypt. Telecom Egypt will provide low-latency connectivity into and across Egypt to help enhance performance and increase reliability for customers of Microsoft services. The partnership will increase Microsoft’s reach to the large Egyptian market in addition to improving connectivity across North Africa and the Middle East.

Microsoft’s global network is one of the largest and most innovative in the world. It connects Microsoft’s cloud infrastructure of more than 100 datacenters, 135 edge node locations and more than 100,000 miles of fiber and undersea cable systems to deliver Microsoft services to customers. The new point of presence in Egypt will benefit from a direct connection to Microsoft’s global infrastructure to enhance the delivery of numerous services for customers. Microsoft’s network investment will increase capacity and use the latest in network optimization for the delivery of Microsoft services in Egypt.

“Through our collaboration with Telecom Egypt, we are extending Microsoft’s global network in Egypt and improving connectivity across North Africa and the Middle East,” said Yousef Khalidi, corporate vice president, Azure Networking, Microsoft. “We are continuously investing to increase the size, speed, reliability and intelligence of Microsoft’s global network to help enable the digital transformation of organizations and enterprises locally and abroad.”

Commenting on the announcement, Dr. Amr Talaat, minister of Communications and Information Technology of Egypt, said, “Our commitment to the industry comes in line with the government’s Sustainable Development Strategy: Egypt Vision 2030. Egypt is spearheading a promising digital transformation strategy that will transform the society and the economy. We value collaboration that aims to empower local enterprises and accelerate transformation for business advancement.” The Minister also, on the occasion of this new relationship, emphasized that “Egypt is capitalizing on its unique geographic location, which makes it a hub for digital businesses and datacenter activity due to the strong presence of submarine cables passing through both the Red and Mediterranean seas.”

Telecom Egypt’s global network was built over the years through investments in consortiums and private international submarine cable systems. Its reach and position as an international hub with tens of terabits per second lit capacity makes it the partner of choice for content providers. Egypt’s distinctive geographic location on the Red and Mediterranean seas has enabled Telecom Egypt to connect more than 11 cable systems from the east and 13 from the west linked with the Red-Med Corridor consisting of 7 diversified highly reliable routes across Egypt.

“We are pleased to partner with Microsoft as it represents one of the first steps toward our strategic digital transformation plan,” said Adel Hamed, chief operating officer, Telecom Egypt. “Telecom Egypt’s geographical position and its digital infrastructure will enable major cloud providers such as Microsoft to enhance their reach to consumers and enterprises in Egypt as well as reach other markets.”

Khaled Abdel Kader, general manager, Microsoft Egypt said: “Microsoft is committed to providing world-class cloud services to enable and accelerate the digital transformation of organizations, businesses and people in Egypt. Our collaboration with Telecom Egypt and Microsoft’s investment in the country will further empower Egypt to achieve more through Microsoft services.”

The new enhanced network presence in Egypt will connect via Microsoft’s global network to transatlantic and trans-Arabian paths, which will improve connectivity across North Africa and the Middle East, including enhancing connectivity to the new Microsoft cloud regions in development in South Africa and the United Arab Emirates.

About Telecom Egypt

Telecom Egypt is the first total telecom operator in Egypt providing all telecom services to its customers including fixed and mobile voice and data services. Telecom Egypt has a long history serving Egyptian customers for over 160 years maintaining a leadership position in the Egyptian telecom market by offering its enterprise and consumer customers the most advanced technology, reliable infrastructure solutions and the widest network of submarine cables. Aside from its mobile operation “WE”, the company owns a 45% stake in Vodafone Egypt. Telecom Egypt’s shares and GDRs (Ticker: ETEL.CA; TEEG.LN) are traded on The Egyptian Exchange and the London Stock Exchange. Please refer to Telecom Egypt’s full financial disclosure on ir.te.eg.

About Microsoft

Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

For more information, press only:

Microsoft Media Relations, WE Communications for Microsoft, (425) 638-7777,
[email protected]

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://news.microsoft.com. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://news.microsoft.com/microsoft-public-relations-contacts.

Go to Original Article
Author: Microsoft News Center

Set up users with key PowerShell Active Directory commands

Administrators must perform tasks quickly and efficiently, especially bulk edits. PowerShell is tailor-made for these types of tasks, especially when working with Active Directory.

User administration tends to take up a lion’s share of the work handled in the directory service, especially in larger organizations. Trying to stay on top of churning user data takes significant effort if you try to handle it in a GUI tool, but learning to use a few PowerShell Active Directory commands can make this chore less of a pain.

Set up the tools for Active Directory user management

Before you can administer your Active Directory users, you need the right tools. Don’t ever work directly on the domain controller. Get the Remote Server Administration Tools (RSAT), including the Active Directory tools, from Microsoft. Find the version that matches your installations. If you use Windows 10 October 2018 update and later, you can install RSAT as an optional feature with the following:

Add-WindowsCapability -Name Rsat.ActiveDirectory.DS-LDS.Tools~~~~0.0.1.0 -Online

RSAT includes the GUI tools, Active Directory Users and Computers, and the PowerShell module.

If you’re running the Windows 10 October 2018 update, Windows Server 1809 or Windows Server 2019, and later and install the Active Directory RSAT as an optional feature, the Active Directory PowerShell module will work in PowerShell Core v6.1.1.

Active Directory cmdlets
The Active Directory cmdlets will run on the PowerShell Core 6.1.1 version.

Earlier versions of the OS require Windows PowerShell or PowerShell Core to use the WindowsCompatibility module from the PowerShell Gallery to access the Windows PowerShell 5.1 functionality via implicit remoting. The WindowsCompatibility module requires PowerShell Core 6.1 or later.

How to create user accounts with PowerShell

With the necessary utilities in place, you can manage your Active Directory user accounts through the standard lifecycle: creation, modification and destruction.

In this example, we’ll add a user named Bob Smith. There is a minimum amount of information required to create an AD account:

New-ADUser -Name "SMITH Bob" -SamAccountName bobsmith -AccountPassword $secpass `
-Enabled:$true -Path 'OU=UserGroups,DC=Manticore,DC=org' -PassThru
New Active Directory user account
Creating an Active Directory user account with PowerShell

There are a few places in Active Directory where you can set other values aside from the primary value, such as the other phone options.

A new user account has several requirements. The password must be a secure string to enable the account. The name must be unique in the organizational unit (OU), and the SamAccountName (login ID) must be unique within the Active Directory forest. If you don’t supply an OU (designated by the -Path parameter), the account goes into the default Users container. The final parameter -PassThru shows the account information.

For one account, entering this information involves a lot of typing. The workload increases once you need to make multiple accounts. An easier way to add numerous users is to import the information from a CSV file:

$secpass = Read-Host -Prompt "Password" -AsSecureString

Import-Csv -Path c:scriptsnewusers.csv |
foreach {
New-ADUser -Name $_.Name -SamAccountName $_.samaccountname `
-AccountPassword $secpass -Enabled:$true `
-Path 'OU=UserGroups,DC=Manticore,DC=org'
}

In the script, I’ve mistakenly created the accounts in ‘OU=UserGroups,DC=Manticore,DC=org’ when they should have gone into ‘OU=UserAccounts,DC=Manticore,DC=org’. To fix this, use the Move-ADObject cmdlet to move the accounts between the OUs.

Get-ADUser -Filter * -SearchBase 'OU=UserGroups,DC=Manticore,DC=org'  | 
Move-ADObject -TargetPath 'OU=UserAccounts,DC=Manticore,DC=org'

When using Get-ADUser to retrieve accounts in bulk, you always need to supply a filter. This is an annoying design decision, but because it’s a mandatory parameter, you will get a prompt that asks for it rather than the command failing. The rationale for this might be to prevent a hang-up when running searches against huge Active Directory databases.

I created user Bob Smith with minimal information with the Get-ADUser cmdlet:

Get-ADUser -Identity bobsmith
Get-ADUser cmdlet
Use the Get-ADUser cmdlet to view an Active Directory account.

The -Identity parameter retrieves the specified user account. The account identifier can be the SamAccountName, distinguished name, global unique identifier or the security identifier (objectSID).

By default, you only get the essential properties displayed with Get-ADUser. If you want to view all properties use:

Get-ADUser -Identity bobsmith -Properties *

Or you can select a set of properties, which also retrieves the default properties:

Get-ADUser -Identity bobsmith -Properties CanonicalName, Created, LockedOut, PasswordExpired, ProtectedFromAccidentalDeletion

When using PowerShell Core 6.1.1 with the Active Directory module, the combination of the -Properties parameter with the ProtectedFromAccidentalDeletion attribute produces an error. Switching to Windows PowerShell 5.1 and the Active Directory cmdlets through the WindowsCompatibility module avoids the problem, which is under investigation by the PowerShell team.

You can manage most of the user’s Active Directory attributes through the Set-ADUser cmdlet parameters. This command shows you what’s available:

Get-Command Set-ADUser -Syntax

To prevent mistakes, I prefer to get the user object as a test and then repeat and pipe into Set-ADUser:

Get-ADUser -Identity bobsmith | Set-ADUser -UserPrincipalName '[email protected]'

You can set multiple attributes simultaneously:

Get-ADUser -Identity bobsmith | Set-ADUser -GivenName 'Bob' -Surname 'Smith' -PassThru

The -Passthru parameter helps to check on the changes.

There are a few places in Active Directory where you can set other values aside from the primary value, such as the other phone options.

Active Directory user attributes
You can use PowerShell to fill out the other phone options in the Active Directory user attributes.

Set-ADUser doesn’t have direct parameters for dealing with these attributes, but you can use the Set-ADUser generic parameters:

  • Add: Adds one or more values;
  • Clear: Removes all values;
  • Remove: Removes one value; and
  • Replace: Replaces current values with new values.

If you use more than one of these parameters at a time, the order of precedence is Remove, Add, Replace and Clear.

Supply the required data as a hash table:

Get-ADUser -Identity bobsmith | Set-ADUser -Add @{otherHomePhone = '01234 567890', '01234 987654'}

Borrow user information to streamline efforts

Some Active Directory administrators copy information from one user account to another to avoid extra typing and manual errors. To do this, create an object with the required property data from a known user account:

$source = Get-ADUser -Identity bobsmith -Properties OfficePhone, otherHomePhone

Then, use Set-ADUser to set the values on the target account:

Set-ADUser -Identity EmilySmith -Replace @{telephoneNumber = $($source.OfficePhone); otherHomePhone = $($source.otherHomePhone)}

I’ve used the -Identity parameter to illustrate its use. The generic parameters — Add, Clear, Remove and Replace — use the Lightweight Directory Access Protocol (LDAP) name for the Active Directory attribute, not the friendlier version used by the Active Directory cmdlets. For this example, I employ the OfficePhone property, which maps to the telephoneNumber LDAP attribute:

Get-ADUser -Identity emilysmith -Properties * | select *phone*

HomePhone :
MobilePhone :
OfficePhone : 07787 293847
otherHomePhone : {01234 567890, 01234 987654}
telephoneNumber : 07787 293847

OfficePhone is identical to telephoneNumber in value. You manage the mapping with the Active Directory cmdlets. Be sure to work with the true LDAP attribute name in these cases.

Trust, but verify before deleting a user

The last act in the user object lifecycle is destruction:

Remove-ADUser -Identity emilysmith -whatif
What if: Performing the operation "Remove" on target "CN=SMITH Emily,OU=UserAccounts,DC=Manticore,DC=org".

Always test with -WhatIf to ensure you will remove the correct account. Deleting your manager’s account by accident doesn’t tend to go down very well.

Save time with searches using key parameters

A few handy parameters enable you to perform some of the more difficult searches quickly and easily.

  • To find locked out users: Search-ADAccount -LockedOut
  • To find users with expired passwords: Search-ADAccount -PasswordExpired
  • To find expired accounts: Search-ADAccount -AccountExpired

Search-ADAccount can also check for accounts that are due to expire, disabled, inactive or have passwords that never expire.

Weed out the stragglers

One Active Directory administrative task worth doing is eliminating accounts for users who have left the organization. You can test for users that haven’t logged on for a period of time:

$testdate = (Get-Date).AddDays(-90)
Get-ADUser -Filter * -Properties LastLogonDate | where {$_.LastLogonDate -And $_.LastLogonDate -le $testdate}

This code looks for users who haven’t logged on for 90 days. Once found, you can move these users to an archive OU and delete them after an additional 90 days or whatever period your organization mandates.

Go to Original Article
Author:

Announcing Windows 10 Insider Preview Build 18845 | Windows Experience Blog

Hello Windows Insiders, today we are releasing 20H1 Build 18845 to Windows Insiders who have opted into Skip Ahead. Remember – these builds are from the 20H1 development branch. Some things we are working on in 20H1 require a longer lead time. We will begin releasing 19H2 bits to Insiders later this spring after we get 19H1 nearly finished and ready; once 19H1 is “nearly finished and ready” we’ll also use the Release Preview ring for previews of drivers and quality updates on 19H1.
IMPORTANT: As is normal with builds early in the development cycle, these builds may contain bugs that might be painful for some. If you take this flight, you won’t be able to switch back to the Fast or Slow rings without doing a clean-install on your PC and starting over.
If you are looking for a complete look at what build is in which Insider ring – head on over to Flight Hub. You can also check out the rest of our documentation here including a complete list of new features and updates that have gone out as part of Insider flights for the current development cycle.

Emoji 12.0 Update
With Build 18277, Insiders got their first look at the Emoji 12.0 emoji. In early February, the set of emoji to be included with Emoji 12.0 was finalized by Unicode, and with today’s build when you press WIN+(period) or WIN+(semicolon), all of these emoji now have keywords hooked up to make them easy to search for. Try it once you install the build! Keywords include otter, sloth, waffle, ballet shoes, and more.

If you haven’t tried it already, be sure to also check out our new Kaomoji and Symbols section in the picker – makes it super easy to type things like (☞゚ヮ゚)☞ or em dash!

We fixed an issue which would cause the Bluetooth Hands-Free audio driver to hang.
We fixed an issue resulting in some Insiders not being able to access the Quests section of the Feedback Hub.
We fixed an issue resulting in a decrease in Start menu reliability in the previous flight.
We fixed an issue resulting in Microsoft Edge crashing on launch for some Insiders in the previous flight.
We’ve made some small tweaks to make the help icon in File Explorer look a bit better when dark theme is enabled.
We fixed an issue where in certain languages if you pressed WIN+V before having opted into clipboard history the clipboard history UI would be truncated.
We fixed an issue with the new Adlam keyboard resulting in not being able to type certain common words.
We fixed an issue where, when typing Vietnamese, the touch keyboard was auto-capitalizing every word in certain apps.
We fixed an issue that could result in unexpected flickering if you used pen or touch in certain win32 apps to launch a second instance of the app when in tablet mode.
We fixed an issue that could result in DWM crashing after enabling high contrast.
We fixed an issue where, when friendly dates were enabled in File Explorer, in certain languages (such as Japanese and Chinese) Insiders would see the wrong day name displayed.
We fixed an issue resulting in an unexpected and non-functional Family Safety icon in the notification area of the taskbar.
We fixed an issue that could result in the taskbar search box text becoming black on a black background.
We fixed an issue where Start menu would crash when using Narrator to navigate pinned folders in Start.

Launching games that use anti-cheat software may trigger a bugcheck (GSOD).
Please note that while we’ve made some improvements to night light reliability in this flight, we’re continuing to investigate reported issues in this space.
For display calibration scenarios, monitors may be missing in the built-in Color Management application. As a work around, please use the Settings app to select color profile instead, under the Display Settings page.
Some Realtek SD card readers are not functioning properly. We are investigating the issue.
In Windows Sandbox, if you try to navigate to the Narrator settings, Settings app crashes.
Mouse pointer color might be incorrectly switched to white after signing out and signing back in.
Creative X-Fi sound cards are not functioning properly. We are partnering with Creative to resolve this issue.

If you install any of the recent builds from the Skip Ahead and switch to either the Fast ring or the Slow ring, optional content such as enabling developer mode will fail. You will have to remain in the Fast ring to add/install/enable optional content. This is because optional content will only install on builds approved for specific rings.

In the market for a new home? Let Bing help you find the perfect place. Search listings in your area and get notifications when new homes that match your preferences go on the market. Whether you’re looking for a house or a condo, a studio or a 4-bedroom – optimize your search with Bing!
If you want to be among the first to learn about these Bing features, join our Bing Insider Program.
No downtime for Hustle-As-A-Service,Dona

SAP S/4HANA Cloud 1902 release zeros in on manufacturing, finance

SAP S/4HANA Cloud now includes new and enhanced functions for manufacturers, including transportation, warehouse and service management.

The functions are infused with machine learning, AI and advanced analytics capabilities that enable manufacturers to automate processes and use predictive capabilities to make better and faster decisions, said Sven Denecken, senior vice president and head of product management and coinnovation for S/4HANA at SAP.

SAP S/4HANA Cloud 1902 is now in general release, and it also includes several new financial features.

SAP S/4HANA Cloud is a cloud-based version of SAP S/4HANA that’s aimed primarily at smaller and medium-sized organizations. Because it’s cloud-based, SAP can deliver an updated version of S/4HANA Cloud every quarter, with enhancements or new functionality in each version, Denecken said.

Sven Denecken, SAP's senior vice president and head of product management and coinnovation for S/4HANASven Denecken

The new features and functionality for manufacturing were driven by demand from the Asian market, particularly China, which is adopting S/4HANA Cloud rapidly, Denecken said.

“A lot of manufacturing companies there are leapfrogging from older ERP systems right to this intelligent ERP, so that’s why we are bringing in new innovations,” he said.

A closer look at S/4HANA Cloud 1902 for manufacturing

The new and enhanced features include the following:

  • Warehouse Management enables manufacturers to inspect products delivered from either production or external suppliers before they are stored in warehouses. It includes decision-making processes for partial lots, such as those that only have a certain number of inspected goods that are of appropriate quality. The new feature is underpinned by machine-learning-based predictive analytics that helps inventory managers make better and faster decisions about inventory levels, Denecken said.
  • Transportation Management allows manufacturers to view transportation charge details and manually calculate charges; view transportation charges based on the freight agreements between the company, the purchaser and the carrier; and break down freight costs to the level of each delivery item based on gross weight.
  • Service Management allows companies to combine traditional fixed-asset production work with services in one contract or service-level agreement — from billing to revenue recognition. “This is totally new in this version,” Denecken said. “You have the pricing agreements, the discount flexibility [and] service-based pricing all in this new area of service-based contracts.”

New functions are powerful, but be ready for them

The new manufacturing enhancements are welcome improvements, but S/4HANA Cloud users may need some time to adapt to them, said Shaun Syvertsen, managing partner of ConvergentIS, a consulting firm that helps companies build and manage SAP systems, based in Calgary, Alta.

One ConvergentIS client is an automobile manufacturer that’s live on S/4HANA Cloud 1902 and is looking forward to eventually using the Warehouse Management and Transportation Management functions. But the company needs to get some prerequisites in order first, and these prerequisites require some significant change management to grow the business sophistication so that they can take advantage of Warehouse Management and Transportation Management.

“The good thing about the S/4HANA Cloud ERP option is that they can get it ready though do not have to roll it all out immediately on that quarterly release,” he said. “They have a bit more time to organize themselves and get ready first.”

The Transportation Management function is more capable than previous S/4HANA capabilities, and it could open up opportunities to change business practices that are struggling with basic delivery functions because of legacy systems and processes, according to Syvertsen.

“The ability to plan routes, transportation costs and manage or direct subcontracted carriers is powerful, so much so that the business improvement and change management will be challenging for some teams to digest,” he said.

For example, the Transportation Management feature has the potential to streamline delivery execution considerably if an organization has been using the SAP Sales and Distribution module for simple outbound delivery. But this will require additional planning to make sure the prerequisites are in place and managed to enable the new process.

While that may be challenging for some customers, SAP S/4HANA Cloud quarterly releases are also a blessing, Syvertsen said. Large annual or even biannual upgrades result in significant new functionality, but also significant change management to deal with it. Breaking it down to quarterly releases makes the upgrades more bite-size and digestible.

“Further, with the right evolutionary mental approach on the business team’s part and a strong set of automated test scenarios for key processes and all custom apps, the quarterly releases can really create a momentum and ongoing excitement about the new functions as they come available. So, I’m for it 100%,” Syvertsen said.

Financial functions also gain next-gen tech

Because 100% of S/4HANA Cloud customers use the financial functions, much of the innovation in this new release is also centered in the financial area, Denecken said.

S/4HANA Cloud 1902 uses next-generation technologies, such as machine learning, AI and advanced predictive analytics, to bring added transparency and speed to the financial closing process through its advanced financial closing function.

“This supports business processes in heterogeneous environments where companies may have different ERP systems with different departments involved,” Denecken said. “The advanced financial closing function brings full transparency to the entire closing process and helps speed up the closing cycle.”

S/4HANA Cloud 1902 also includes a time-based revenue recognition function that enables companies to meet with International Financial Reporting Standard 15 for the accounting and invoicing of professional services.

Go to Original Article
Author:

For Sale – Acer Revo RL80 with IR Mod

Discussion in ‘Desktop Computer Classifieds‘ started by ds17, Jan 28, 2019.

  1. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    This has been my trusted Kodi box but I have recently upgraded to 4K so no longer required.
    It’s running an Intel Celeron 1007 1.5GHz upgraded to 4GB of ram on the latest stable build of LibreELEC on a 500GB HDD.
    It also has an IR receiver mod which works brilliantly, allowing full control via a Logitech Harmony or any other universal remote.
    Runs heavy skins smoothly, frame rate switches and passes through HD audio whilst being quite under load.
    The original 2GB of ram is still in the box along with original power supply and the stand that came with it.
    Happy to answer any further questions

    Price and currency: £35
    Delivery: Delivery cost is not included
    Payment method: Bank Transfer
    Location: Hertfordshire
    Advertised elsewhere?: Not advertised elsewhere
    Prefer goods collected?: I have no preference

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Last edited: Feb 12, 2019

  2. qwakuk

    qwakuk

    Active Member

    Joined:
    Apr 16, 2006
    Messages:
    1,162
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    48
    Ratings:
    +69

    size of hard drive ?
    accepting offers ?

  3. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    500GB
    Am open to sensible offers

  4. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    Price lowered

  5. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    Price reduced

  6. Y0SSARIAN

    Standard Member

    Joined:
    Sep 30, 2017
    Messages:
    48
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    11
    Location:
    Newark NG24
    Ratings:
    +5

    I’d like to offer 30.00 delivered, thanks

    Glen

  7. ruru

    ruru

    Active Member

    Joined:
    Feb 23, 2003
    Messages:
    664
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    28
    Ratings:
    +58

    offer of £40 delivered here !

  8. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    Happy to accept £40 inc

    @ruru
    Will PM you now

Share This Page

Loading…

Go to Original Article
Author:

Microsoft collaborates with Telecom Egypt to extend its global cloud network to Egypt – Stories

Network collaboration will further enhance delivery of services to customers in Egypt, North Africa and the Middle East

BARCELONA, Spain — Feb. 27, 2019 — On Wednesday, during MWC Barcelona, Microsoft Corp. and Telecom Egypt announced their collaboration to extend Microsoft’s cloud network to Egypt. Telecom Egypt will provide low-latency connectivity into and across Egypt to help enhance performance and increase reliability for customers of Microsoft services. The partnership will increase Microsoft’s reach to the large Egyptian market in addition to improving connectivity across North Africa and the Middle East.

Microsoft’s global network is one of the largest and most innovative in the world. It connects Microsoft’s cloud infrastructure of more than 100 datacenters, 135 edge node locations and more than 100,000 miles of fiber and undersea cable systems to deliver Microsoft services to customers. The new point of presence in Egypt will benefit from a direct connection to Microsoft’s global infrastructure to enhance the delivery of numerous services for customers. Microsoft’s network investment will increase capacity and use the latest in network optimization for the delivery of Microsoft services in Egypt.

“Through our collaboration with Telecom Egypt, we are extending Microsoft’s global network in Egypt and improving connectivity across North Africa and the Middle East,” said Yousef Khalidi, corporate vice president, Azure Networking, Microsoft. “We are continuously investing to increase the size, speed, reliability and intelligence of Microsoft’s global network to help enable the digital transformation of organizations and enterprises locally and abroad.”

Commenting on the announcement, Dr. Amr Talaat, minister of Communications and Information Technology of Egypt, said, “Our commitment to the industry comes in line with the government’s Sustainable Development Strategy: Egypt Vision 2030. Egypt is spearheading a promising digital transformation strategy that will transform the society and the economy. We value collaboration that aims to empower local enterprises and accelerate transformation for business advancement.” The Minister also, on the occasion of this new relationship, emphasized that “Egypt is capitalizing on its unique geographic location, which makes it a hub for digital businesses and datacenter activity due to the strong presence of submarine cables passing through both the Red and Mediterranean seas.”

Telecom Egypt’s global network was built over the years through investments in consortiums and private international submarine cable systems. Its reach and position as an international hub with tens of terabits per second lit capacity makes it the partner of choice for content providers. Egypt’s distinctive geographic location on the Red and Mediterranean seas has enabled Telecom Egypt to connect more than 11 cable systems from the east and 13 from the west linked with the Red-Med Corridor consisting of 7 diversified highly reliable routes across Egypt.

“We are pleased to partner with Microsoft as it represents one of the first steps toward our strategic digital transformation plan,” said Adel Hamed, chief operating officer, Telecom Egypt. “Telecom Egypt’s geographical position and its digital infrastructure will enable major cloud providers such as Microsoft to enhance their reach to consumers and enterprises in Egypt as well as reach other markets.”

Khaled Abdel Kader, general manager, Microsoft Egypt said: “Microsoft is committed to providing world-class cloud services to enable and accelerate the digital transformation of organizations, businesses and people in Egypt. Our collaboration with Telecom Egypt and Microsoft’s investment in the country will further empower Egypt to achieve more through Microsoft services.”

The new enhanced network presence in Egypt will connect via Microsoft’s global network to transatlantic and trans-Arabian paths, which will improve connectivity across North Africa and the Middle East, including enhancing connectivity to the new Microsoft cloud regions in development in South Africa and the United Arab Emirates.

About Telecom Egypt

Telecom Egypt is the first total telecom operator in Egypt providing all telecom services to its customers including fixed and mobile voice and data services. Telecom Egypt has a long history serving Egyptian customers for over 160 years maintaining a leadership position in the Egyptian telecom market by offering its enterprise and consumer customers the most advanced technology, reliable infrastructure solutions and the widest network of submarine cables. Aside from its mobile operation “WE”, the company owns a 45% stake in Vodafone Egypt. Telecom Egypt’s shares and GDRs (Ticker: ETEL.CA; TEEG.LN) are traded on The Egyptian Exchange and the London Stock Exchange. Please refer to Telecom Egypt’s full financial disclosure on ir.te.eg.

About Microsoft

Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

For more information, press only:

Microsoft Media Relations, WE Communications for Microsoft, (425) 638-7777,
[email protected]

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://news.microsoft.com. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://news.microsoft.com/microsoft-public-relations-contacts.

Go to Original Article
Author: Microsoft News Center

Oracle ERP lawsuit underscores installation hardships for big systems

Oracle is being sued over an ERP installation by a user dissatisfied with the outcome. A Pennsylvania-based mechanical contractor is alleging that the vendor “never provided” a fully functional and operational ERP system.

The ERP lawsuit by Worth & Co., over its $4.5 million project, underscores a major problem with big systems. These are large and risky projects often leading to cost and schedule overruns.

Worth filed its ERP lawsuit last week in a U.S. federal court in the Northern District of California. An Oracle spokeswoman said the firm isn’t commenting on it.

David Wagner, vice president of research at Computer Economics David Wagner

Lawsuits over ERP deployment are far from rare. Indeed, IT research firm Computer Economics reported in its Technology Trends 2019 report that ERP systems are “dead last” both in ROI and total cost of ownership. They are near the bottom in customer satisfaction.

According to the survey of 249 enterprises, only 27% reported a positive ROI within two years of implementing an ERP system, 43% reported that they broke even, and 30% reported a negative return on investment.

One-third chance of a negative return

Put another way, an organization has a one-third chance of a negative return on its ERP investment, at least in the first two years of the project, said David Wagner, vice president of research at Computer Economics.

We believe many organizations do achieve an ROI from ERP, but it takes longer than two years.
David Wagnervice president of research, Computer Economics

“We believe many organizations do achieve an ROI from ERP, but it takes longer than two years,” Wagner said. “ERP is not a quick hit benefit, but a long-term effort,” he said.

Worth’s effort began in 2014, when it spent about a year investigating ERP systems and was in discussions with several providers before selecting Oracle.

But the installation did not go as expected, and the system experienced delays and suffered from incremental failures that were “never debugged or fixed” by the vendor, the ERP lawsuit alleges.

In 2018, four years later, Worth “made the ultimate decision of discontinuing the use of the Oracle ERP system and began the process of converting to a different ERP system,” the lawsuit said.

ERP deployment problems

The Computer Economics ranking for ERP is relative compared to other major project installations. The research firm looked at 15 other business deployments, including mobile device wearables, mobile applications, robotic process automation, enterprise asset management, internet of things, e-commerce, IaaS, as well as CRM and HCM.

The reasons why ERP projects face difficulty run the entire range of issues that appear in the survey, according to respondents. Issues include failure to understand business requirements, process change problems and mistakes in migration planning.

Wagner said deployments of any new business system should be “a people project first.” Too many firms consider it solely as a technology project.

“Deploying an ERP requires significant communication between the IT department and users, not just at the requirements stage, but after deployment as well,” Wagner said.

Sometimes firms “try to make their new ERP work like their old ERP,” Wagner said. That may seem like a quick way to get user buy-in, but “if you don’t change anything, you are missing out on the chance to truly transform your enterprise,” he said.

Go to Original Article
Author:

For Sale – Acer Revo RL80 with IR Mod

Discussion in ‘Desktop Computer Classifieds‘ started by ds17, Jan 28, 2019.

  1. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    This has been my trusted Kodi box but I have recently upgraded to 4K so no longer required.
    It’s running an Intel Celeron 1007 1.5GHz upgraded to 4GB of ram on the latest stable build of LibreELEC on a 500GB HDD.
    It also has an IR receiver mod which works brilliantly, allowing full control via a Logitech Harmony or any other universal remote.
    Runs heavy skins smoothly, frame rate switches and passes through HD audio whilst being quite under load.
    The original 2GB of ram is still in the box along with original power supply and the stand that came with it.
    Happy to answer any further questions

    Price and currency: £35
    Delivery: Delivery cost is not included
    Payment method: Bank Transfer
    Location: Hertfordshire
    Advertised elsewhere?: Not advertised elsewhere
    Prefer goods collected?: I have no preference

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Last edited: Feb 12, 2019

  2. qwakuk

    qwakuk

    Active Member

    Joined:
    Apr 16, 2006
    Messages:
    1,162
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    48
    Ratings:
    +69

    size of hard drive ?
    accepting offers ?

  3. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    500GB
    Am open to sensible offers

  4. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    Price lowered

  5. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    Price reduced

  6. Y0SSARIAN

    Standard Member

    Joined:
    Sep 30, 2017
    Messages:
    48
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    11
    Location:
    Newark NG24
    Ratings:
    +5

    I’d like to offer 30.00 delivered, thanks

    Glen

  7. ruru

    ruru

    Active Member

    Joined:
    Feb 23, 2003
    Messages:
    664
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    28
    Ratings:
    +58

    offer of £40 delivered here !

  8. ds17

    Active Member

    Joined:
    Jul 29, 2005
    Messages:
    730
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    46
    Location:
    Hertfordshire
    Ratings:
    +244

    Happy to accept £40 inc

    @ruru
    Will PM you now

Share This Page

Loading…

Go to Original Article
Author:

Security automation on display in 2019 RSAC Innovation Sandbox

Odds are good that the winner of this year’s RSA Conference Innovation Sandbox will be a security automation player — because almost all of the finalists for this year’s competition for “most innovative startup” highlight security automation in some form or another.

As has happened almost every year since 2005, Innovation Sandbox finalists will face a panel of judges to make their cases for why they should win the title of most innovative startup. The finalists each get three minutes to present a “quick pitch” followed by a Q&A with the judging panel on Monday afternoon. The Innovation Sandbox debuted in 2005 under the name “Innovation Station,” and continued under that name until 2007 — but the program took a break in 2008 before returning with the new name in 2009.

Long-term success is not a lock for Innovation Sandbox winners, but many past winners are notable, including Sourcefire (2005), Imperva (2006), Appthority (2012), Waratek (2015) and BigID (2018). Even being nominated may help point the way as some leading infosec names that were runners-up in recent years include Cylance, Fortanix and Silent Circle are some notable alumni of the competition.

The judging panel this year includes Asheem Chandna, partner at venture capital firm Greylock Partners; Patrick Heim, operating partner and CISO at cloud storage provider ClearSky; Niloofar Razi Howe, cybersecurity entrepreneur and investor; Shlomo Kramer, CEO and co-founder at cybersecurity vendor Cato Networks; and Richard Seiersen, author and former CISO at LendingClub, Twilio and GE Healthcare. Returning as emcee is Symantec CTO Herbert (Hugh) Thompson.

Chandna, Heim and Howe have served on the judge’s panel in previous Innovation Sandbox contests; according to an RSAC spokesperson, this is to provide consistency and integrity of the process.

“We select judges that are leaders in their field, bring a broad spectrum of expertise, and who are exceptionally well-versed in market trends, buyer needs and emerging security challenges,” the spokesperson said, adding that Kramer and Seiersen were selected as new judges to provide additional perspective.

RSAC 2019 Innovation Sandbox finalists

For most this year, the three-minute presentation will at least touch on innovative new security automation technologies. This year’s finalists, listed alphabetically, include:

Arkose Labs: Arkose Labs’ approach to fraud prevention is two-pronged, focusing on both easing the authentication process for legitimate users based on telemetry and behavioral risk assessment, while also adding enforcement challenges for suspicious login attempts. The result is that the San Francisco-based startup offers a 100% service-level agreement that guarantees automated attack remediation.

Axonius Inc.: Axonius, based in New York City, offers a cybersecurity asset management platform that consolidates information about every asset in an organization, and matches that with threat and security information that relates to those assets, in order to detect automatically whether those assets meet the organization’s security policies. Axonius’ platform enables a process of ongoing and automated security policy validation for all identifiable cybersecurity assets in the organization.

Capsule8 Inc.: Capsule8, based in Brooklyn, N.Y., brings security automation to zero-day exploit detection for Linux production environments of all types: containerized, virtualized or bare metal. The company’s platform detects — and shuts down — exploits as they happen, while protecting production infrastructure from risk of disruption from those exploits.

CloudKnox: CloudKnox, based in Sunnyvale, Calif., brings automation to managing and authenticating credentials for all types of cloud access — whether initiated by humans or processes. The CloudKnox Security Platform is touted as a non-intrusive, automated mechanism for responding to accidental or malicious misuse of credentials through a continuous detection and mitigation process.

DisruptOps Inc.: Based in Kansas City, Mo., DisruptOps brings security automation to cloud management. DisruptOps’ Security Operations Platform monitors and controls cloud infrastructure automatically, with the goal of maintaining consistent and secure cloud configurations that comply with customer policy “guardrails.”

Duality Technologies: Duality Technologies, based in Newark, N.J., bucked the security automation trend this year with its SecurePlus platform for applying analytics and AI on encrypted data — the data is encrypted end-to-end with quantum-resistant, homomorphic encryption. SecurePlus enables secure processing of encrypted data, without risk of exposing the data.

Eclypsium Inc.: Based in Beaverton, Ore., Eclypsium focuses on security threats at the hardware and firmware levels. Nominated for its firmware protection platform, Eclypsium addresses threats to all enterprise systems, from end-user desktop and laptops to enterprise servers by scanning and categorizing potential threats in system firmware, including the firmware incorporated in system components like hard drives, networking interfaces and system controllers, and gives defenders a tool for detecting and mitigating firmware threats.

Salt Security: Salt Security, a startup based in Palo Alto, Calif., puts its “AI-powered” API Protection Platform to work continuously — and automatically — to identify, review and monitor all the APIs used in enterprise environments.

ShiftLeft Inc.: ShiftLeft brings automation to application security. The startup, based in Santa Clara, Calif., offers a line of products that aim to improve application security through a combination of improved tools for analyzing, protecting and auditing code for security issues, as well as reducing the need for human intervention when issues arise.

WireWheel Inc.: WireWheel protects privacy through its cloud-based Data Privacy & Protection Platform. The Arlington, Va., startup’s platform enables customers to do data inventory and mapping, collaboration, vendor risk management and more. The platform helps automate important privacy tasks, including providing a comprehensive workflow for privacy compliance and automating discovery of cloud assets and mapping of business processes.

Innovation Sandbox finalist selection criteria

To be considered for the Innovation Sandbox contest, a product must have been on the market for no more than one year. Beyond that, it must meet several other criteria, according to the RSAC spokesperson, including:

  • The product matches an identified problem in the information security marketplace.
  • The product takes an original and sound approach to solving a problem and has the potential to make a significant impact on information security.
  • The product is validated through a client’s beta testing or purchase of product.
  • The product can be demonstrated live and on-site during the RSAC Innovation Sandbox Contest.
  • The company has a management team with a track record of successfully delivering products to market.
  • The company is privately held, with less than $5 million in revenue in 2018.

This year’s contest will again be hosted in San Francisco at the Marriott Marquis on Monday afternoon.

Go to Original Article
Author: