TomTom expands partnership with Microsoft to power Microsoft cloud offerings with location-based services – Stories

TomTom selects Microsoft Azure as its preferred cloud provider; TomTom location-based services will be utilized across Microsoft technologies for cloud services including Microsoft Azure, Bing Maps and Cortana

AMSTERDAM and REDMOND, Wash. — Feb. 4, 2019 — TomTom (TOM2) and Microsoft Corp. (MSFT) today announced that they are expanding their partnership, bringing TomTom’s maps and traffic data into a multitude of mapping scenarios across Microsoft’s cloud services. With this broadened integration, TomTom will be a leading location data provider for Microsoft Azure and Bing Maps. TomTom is also expanding its relationship with Microsoft, selecting Microsoft Azure as its preferred cloud provider.

TomTom logoAzure Maps delivers secured location APIs to provide geospatial context to data. The Azure Maps service enhances the value of the Microsoft Azure cloud platform that is helping enterprises and developers create IoT, mobility, logistics and asset tracking solutions. TomTom providing their map data and services is a significant component for completing these enterprise customer scenarios.

Anders Truelsen, Managing Director, TomTom Enterprise said, “TomTom is proud of the relationship we’ve built with Microsoft to offer Microsoft Azure customers access to build location-aware applications and look forward to deepening that relationship as we extend our high-quality location technologies to an even larger audience base. We’re excited to be chosen as the location data provider to power mapping services across all of Microsoft, including Bing, Cortana, Windows and many other leading products and the innovations that will come forward in this continued relationship.”

“This deep partnership with TomTom is very different from anything Microsoft has done in maps before,” said Tara Prakriya, Partner Group Program Manager of Azure Maps and Connected Vehicles. “TomTom hosting their services in the Azure cloud brings with it their graph of map data. Manufacturing maps in Azure reduces the latency to customer applications, ensuring we offer the freshest data through Azure Maps. Azure customers across industries end up winning when their geospatial data and analytics, TomTom data, and Azure Maps services are all running together in the same cloud.”

Azure Maps lights up a multitude of location scenarios for Microsoft. Azure customers now have native support ranging from building map-based dashboards to visualize IoT spatial analytics to mobility scenarios for vehicle movement. For example, in agriculture, customers can easily track utilization of farm sensors for crops, livestock, tractors and more to optimize production. Using the Azure Maps routing services powered by TomTom allows for insightful distribution of goods originating from farmlands to retail, restaurants and home delivery. Using the freshest maps and traffic information can determine delivery range, optimize delivery routes and provide customer insights into delivery status.

TomTom providing the freshest map and traffic information in combination with Azure Maps services and SDKs will help perpetuate improved smart city applications. Azure Maps SDKs using TomTom services make it simple to render a multitude of data sets from a variety of sources – such as real-time parking meter rates, street-specific traffic, addressing carbon footprint, reducing noise pollution and more in a consolidated, map-based application for visualization of pertinent city information crucial to its citizens.          

About Microsoft

Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

About TomTom

TomTom is the leading independent location technology specialist, shaping mobility with highly accurate maps, navigation software, real-time traffic information and services.

To achieve our vision of a safer world, free of congestion and emissions, we create innovative technologies that keep the world moving. By combining our extensive experience with leading business and technology partners, we power connected vehicles, smart mobility and, ultimately, autonomous driving.

Headquartered in Amsterdam with offices in 30 countries, TomTom’s technologies are trusted by hundreds of millions of people worldwide.
www.tomtom.com

For further Information:

TomTom Media:

Remco Meerstra

+31 6 55 69 04 80

remco.meerstra@tomtom.com

TomTom Investor Relations:

ir@tomtom.com

Microsoft Media Relations:

WE Communications for Microsoft

(425) 638-7777

rrt@we-worldwide.com

Go to Original Article
Author: Microsoft News Center

Windows 10 SDK Preview Build 18327 available now! – Windows Developer Blog

Today, we released a new Windows 10 Preview Build of the SDK to be used in conjunction with Windows 10 Insider Preview (Build 18327 or greater). The Preview SDK Build 18327 contains bug fixes and under development changes to the API surface area.
The Preview SDK can be downloaded from the developer section on Windows Insider.
For feedback and updates to the known issues, please see the developer forum.  For new developer feature requests, head over to our Windows Platform UserVoice.

This build works in conjunction with previously released SDKs and Visual Studio 2017.  You can install this SDK and still also continue to submit your apps that target Windows 10 build 1809 or earlier to the store.
The Windows SDK will now formally only be supported by Visual Studio 2017 and greater. You can download the Visual Studio 2017 here.
This build of the Windows SDK will install ONLY on Windows 10 Insider Preview builds.
In order to assist with script access to the SDK, the ISO will also be able to be accessed through the following URL:  https://go.microsoft.com/fwlink/?prd=11966&pver=1.0&plcid=0x409&clcid=0x409&ar=Flight&sar=Sdsurl&o1=18327 once the static URL is published.

Message Compiler (mc.exe)

The “-mof” switch (to generate XP-compatible ETW helpers) is considered to be deprecated and will be removed in a future version of mc.exe. Removing this switch will cause the generated ETW helpers to expect Vista or later.
The “-A” switch (to generate .BIN files using ANSI encoding instead of Unicode) is considered to be deprecated and will be removed in a future version of mc.exe. Removing this switch will cause the generated .BIN files to use Unicode string encoding.
The behavior of the “-A” switch has changed. Prior to Windows 1607 Anniversary Update SDK, when using the -A switch, BIN files were encoded using the build system’s ANSI code page. In the Windows 1607 Anniversary Update SDK, mc.exe’s behavior was inadvertently changed to encode BIN files using the build system’s OEM code page. In the 19H1 SDK, mc.exe’s previous behavior has been restored and it now encodes BIN files using the build system’s ANSI code page. Note that the -A switch is deprecated, as ANSI-encoded BIN files do not provide a consistent user experience in multi-lingual systems.

Change to effect graph of the AcrylicBrush
In this Preview SDK we’ll be adding a blend mode to the effect graph of the AcrylicBrush called Luminosity. This blend mode will ensure that shadows do not appear behind acrylic surfaces without a cutout. We will also be exposing a LuminosityBlendOpacity API available for tweaking that allows for more AcrylicBrush customization.
By default, for those that have not specified any LuminosityBlendOpacity on their AcrylicBrushes, we have implemented some logic to ensure that the Acrylic will look as similar as it can to current 1809 acrylics. Please note that we will be updating our default brushes to account for this recipe change.
TraceLoggingProvider.h  / TraceLoggingWrite
Events generated by TraceLoggingProvider.h (e.g. via TraceLoggingWrite macros) will now always have Id and Version set to 0.
Previously, TraceLoggingProvider.h would assign IDs to events at link time. These IDs were unique within a DLL or EXE, but changed from build to build and from module to module.

Note: There have been no changes to list since the last flighted build 10.0.18323.0
Additions:

namespace Windows.AI.MachineLearning {
public sealed class LearningModelSession : IClosable {
public LearningModelSession(LearningModel model, LearningModelDevice deviceToRunOn, LearningModelSessionOptions learningModelSessionOptions);
}
public sealed class LearningModelSessionOptions
public sealed class TensorBoolean : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorBoolean CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorBoolean CreateFromShapeArrayAndDataArray(long[] shape, bool[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorDouble : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorDouble CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorDouble CreateFromShapeArrayAndDataArray(long[] shape, double[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorFloat : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorFloat CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorFloat CreateFromShapeArrayAndDataArray(long[] shape, float[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorFloat16Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorFloat16Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorFloat16Bit CreateFromShapeArrayAndDataArray(long[] shape, float[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorInt16Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorInt16Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorInt16Bit CreateFromShapeArrayAndDataArray(long[] shape, short[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorInt32Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorInt32Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorInt32Bit CreateFromShapeArrayAndDataArray(long[] shape, int[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorInt64Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorInt64Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorInt64Bit CreateFromShapeArrayAndDataArray(long[] shape, long[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorInt8Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorInt8Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorInt8Bit CreateFromShapeArrayAndDataArray(long[] shape, byte[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorString : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorString CreateFromShapeArrayAndDataArray(long[] shape, string[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorUInt16Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorUInt16Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorUInt16Bit CreateFromShapeArrayAndDataArray(long[] shape, ushort[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorUInt32Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorUInt32Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorUInt32Bit CreateFromShapeArrayAndDataArray(long[] shape, uint[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorUInt64Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorUInt64Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorUInt64Bit CreateFromShapeArrayAndDataArray(long[] shape, ulong[] data);
IMemoryBufferReference CreateReference();
}
public sealed class TensorUInt8Bit : IClosable, ILearningModelFeatureValue, IMemoryBuffer, ITensor {
void Close();
public static TensorUInt8Bit CreateFromBuffer(long[] shape, IBuffer buffer);
public static TensorUInt8Bit CreateFromShapeArrayAndDataArray(long[] shape, byte[] data);
IMemoryBufferReference CreateReference();
}
}
namespace Windows.ApplicationModel {
public sealed class Package {
StorageFolder EffectiveLocation { get; }
StorageFolder MutableLocation { get; }
}
}
namespace Windows.ApplicationModel.AppService {
public sealed class AppServiceConnection : IClosable {
public static IAsyncOperation SendStatelessMessageAsync(AppServiceConnection connection, RemoteSystemConnectionRequest connectionRequest, ValueSet message);
}
public sealed class AppServiceTriggerDetails {
string CallerRemoteConnectionToken { get; }
}
public sealed class StatelessAppServiceResponse
public enum StatelessAppServiceResponseStatus
}
namespace Windows.ApplicationModel.Background {
public sealed class ConversationalAgentTrigger : IBackgroundTrigger
}
namespace Windows.ApplicationModel.Calls {
public sealed class PhoneLine {
string TransportDeviceId { get; }
void EnableTextReply(bool value);
}
public enum PhoneLineTransport {
Bluetooth = 2,
}
public sealed class PhoneLineTransportDevice
}
namespace Windows.ApplicationModel.Calls.Background {
public enum PhoneIncomingCallDismissedReason
public sealed class PhoneIncomingCallDismissedTriggerDetails
public enum PhoneTriggerType {
IncomingCallDismissed = 6,
}
}
namespace Windows.ApplicationModel.Calls.Provider {
public static class PhoneCallOriginManager {
public static bool IsSupported { get; }
}
}
namespace Windows.ApplicationModel.ConversationalAgent {
public sealed class ConversationalAgentSession : IClosable
public sealed class ConversationalAgentSessionInterruptedEventArgs
public enum ConversationalAgentSessionUpdateResponse
public sealed class ConversationalAgentSignal
public sealed class ConversationalAgentSignalDetectedEventArgs
public enum ConversationalAgentState
public sealed class ConversationalAgentSystemStateChangedEventArgs
public enum ConversationalAgentSystemStateChangeType
}
namespace Windows.ApplicationModel.Preview.Holographic {
public sealed class HolographicKeyboardPlacementOverridePreview
}
namespace Windows.ApplicationModel.Resources {
public sealed class ResourceLoader {
public static ResourceLoader GetForUIContext(UIContext context);
}
}
namespace Windows.ApplicationModel.Resources.Core {
public sealed class ResourceCandidate {
ResourceCandidateKind Kind { get; }
}
public enum ResourceCandidateKind
public sealed class ResourceContext {
public static ResourceContext GetForUIContext(UIContext context);
}
}
namespace Windows.ApplicationModel.UserActivities {
public sealed class UserActivityChannel {
public static UserActivityChannel GetForUser(User user);
}
}
namespace Windows.Devices.Bluetooth.GenericAttributeProfile {
public enum GattServiceProviderAdvertisementStatus {
StartedWithoutAllAdvertisementData = 4,
}
public sealed class GattServiceProviderAdvertisingParameters {
IBuffer ServiceData { get; set; }
}
}
namespace Windows.Devices.Enumeration {
public enum DevicePairingKinds : uint {
ProvidePasswordCredential = (uint)16,
}
public sealed class DevicePairingRequestedEventArgs {
void AcceptWithPasswordCredential(PasswordCredential passwordCredential);
}
}
namespace Windows.Devices.Input {
public sealed class PenDevice
}
namespace Windows.Devices.PointOfService {
public sealed class JournalPrinterCapabilities : ICommonPosPrintStationCapabilities {
bool IsReversePaperFeedByLineSupported { get; }
bool IsReversePaperFeedByMapModeUnitSupported { get; }
bool IsReverseVideoSupported { get; }
bool IsStrikethroughSupported { get; }
bool IsSubscriptSupported { get; }
bool IsSuperscriptSupported { get; }
}
public sealed class JournalPrintJob : IPosPrinterJob {
void FeedPaperByLine(int lineCount);
void FeedPaperByMapModeUnit(int distance);
void Print(string data, PosPrinterPrintOptions printOptions);
}
public sealed class PosPrinter : IClosable {
IVectorView SupportedBarcodeSymbologies { get; }
PosPrinterFontProperty GetFontProperty(string typeface);
}
public sealed class PosPrinterFontProperty
public sealed class PosPrinterPrintOptions
public sealed class ReceiptPrinterCapabilities : ICommonPosPrintStationCapabilities, ICommonReceiptSlipCapabilities {
bool IsReversePaperFeedByLineSupported { get; }
bool IsReversePaperFeedByMapModeUnitSupported { get; }
bool IsReverseVideoSupported { get; }
bool IsStrikethroughSupported { get; }
bool IsSubscriptSupported { get; }
bool IsSuperscriptSupported { get; }
}
public sealed class ReceiptPrintJob : IPosPrinterJob, IReceiptOrSlipJob {
void FeedPaperByLine(int lineCount);
void FeedPaperByMapModeUnit(int distance);
void Print(string data, PosPrinterPrintOptions printOptions);
void StampPaper();
}
public struct SizeUInt32
public sealed class SlipPrinterCapabilities : ICommonPosPrintStationCapabilities, ICommonReceiptSlipCapabilities {
bool IsReversePaperFeedByLineSupported { get; }
bool IsReversePaperFeedByMapModeUnitSupported { get; }
bool IsReverseVideoSupported { get; }
bool IsStrikethroughSupported { get; }
bool IsSubscriptSupported { get; }
bool IsSuperscriptSupported { get; }
}
public sealed class SlipPrintJob : IPosPrinterJob, IReceiptOrSlipJob {
void FeedPaperByLine(int lineCount);
void FeedPaperByMapModeUnit(int distance);
void Print(string data, PosPrinterPrintOptions printOptions);
}
}
namespace Windows.Globalization {
public sealed class CurrencyAmount
}
namespace Windows.Graphics.DirectX {
public enum DirectXPrimitiveTopology
}
namespace Windows.Graphics.Holographic {
public sealed class HolographicCamera {
HolographicViewConfiguration ViewConfiguration { get; }
}
public sealed class HolographicDisplay {
HolographicViewConfiguration TryGetViewConfiguration(HolographicViewConfigurationKind kind);
}
public sealed class HolographicViewConfiguration
public enum HolographicViewConfigurationKind
}
namespace Windows.Management.Deployment {
public enum AddPackageByAppInstallerOptions : uint {
LimitToExistingPackages = (uint)512,
}
public enum DeploymentOptions : uint {
RetainFilesOnFailure = (uint)2097152,
}
}
namespace Windows.Media.Devices {
public sealed class InfraredTorchControl
public enum InfraredTorchMode
public sealed class VideoDeviceController : IMediaDeviceController {
InfraredTorchControl InfraredTorchControl { get; }
}
}
namespace Windows.Media.Miracast {
public sealed class MiracastReceiver
public sealed class MiracastReceiverApplySettingsResult
public enum MiracastReceiverApplySettingsStatus
public enum MiracastReceiverAuthorizationMethod
public sealed class MiracastReceiverConnection : IClosable
public sealed class MiracastReceiverConnectionCreatedEventArgs
public sealed class MiracastReceiverCursorImageChannel
public sealed class MiracastReceiverCursorImageChannelSettings
public sealed class MiracastReceiverDisconnectedEventArgs
public enum MiracastReceiverDisconnectReason
public sealed class MiracastReceiverGameControllerDevice
public enum MiracastReceiverGameControllerDeviceUsageMode
public sealed class MiracastReceiverInputDevices
public sealed class MiracastReceiverKeyboardDevice
public enum MiracastReceiverListeningStatus
public sealed class MiracastReceiverMediaSourceCreatedEventArgs
public sealed class MiracastReceiverSession : IClosable
public sealed class MiracastReceiverSessionStartResult
public enum MiracastReceiverSessionStartStatus
public sealed class MiracastReceiverSettings
public sealed class MiracastReceiverStatus
public sealed class MiracastReceiverStreamControl
public sealed class MiracastReceiverVideoStreamSettings
public enum MiracastReceiverWiFiStatus
public sealed class MiracastTransmitter
public enum MiracastTransmitterAuthorizationStatus
}
namespace Windows.Networking.Connectivity {
public enum NetworkAuthenticationType {
Wpa3 = 10,
Wpa3Sae = 11,
}
}
namespace Windows.Networking.NetworkOperators {
public sealed class ESim {
ESimDiscoverResult Discover();
ESimDiscoverResult Discover(string serverAddress, string matchingId);
IAsyncOperation DiscoverAsync();
IAsyncOperation DiscoverAsync(string serverAddress, string matchingId);
}
public sealed class ESimDiscoverEvent
public sealed class ESimDiscoverResult
public enum ESimDiscoverResultKind
}
namespace Windows.Networking.PushNotifications {
public static class PushNotificationChannelManager {
public static event EventHandler ChannelsRevoked;
}
public sealed class PushNotificationChannelsRevokedEventArgs
}
namespace Windows.Perception.People {
public sealed class EyesPose
public enum HandJointKind
public sealed class HandMeshObserver
public struct HandMeshVertex
public sealed class HandMeshVertexState
public sealed class HandPose
public struct JointPose
public enum JointPoseAccuracy
}
namespace Windows.Perception.Spatial {
public struct SpatialRay
}
namespace Windows.Perception.Spatial.Preview {
public sealed class SpatialGraphInteropFrameOfReferencePreview
public static class SpatialGraphInteropPreview {
public static SpatialGraphInteropFrameOfReferencePreview TryCreateFrameOfReference(SpatialCoordinateSystem coordinateSystem);
public static SpatialGraphInteropFrameOfReferencePreview TryCreateFrameOfReference(SpatialCoordinateSystem coordinateSystem, Vector3 relativePosition);
public static SpatialGraphInteropFrameOfReferencePreview TryCreateFrameOfReference(SpatialCoordinateSystem coordinateSystem, Vector3 relativePosition, Quaternion relativeOrientation);
}
}
namespace Windows.Security.Authorization.AppCapabilityAccess {
public sealed class AppCapability
public sealed class AppCapabilityAccessChangedEventArgs
public enum AppCapabilityAccessStatus
}
namespace Windows.Security.DataProtection {
public enum UserDataAvailability
public sealed class UserDataAvailabilityStateChangedEventArgs
public sealed class UserDataBufferUnprotectResult
public enum UserDataBufferUnprotectStatus
public sealed class UserDataProtectionManager
public sealed class UserDataStorageItemProtectionInfo
public enum UserDataStorageItemProtectionStatus
}
namespace Windows.Storage.AccessCache {
public static class StorageApplicationPermissions {
public static StorageItemAccessList GetFutureAccessListForUser(User user);
public static StorageItemMostRecentlyUsedList GetMostRecentlyUsedListForUser(User user);
}
}
namespace Windows.Storage.Pickers {
public sealed class FileOpenPicker {
User User { get; }
public static FileOpenPicker CreateForUser(User user);
}
public sealed class FileSavePicker {
User User { get; }
public static FileSavePicker CreateForUser(User user);
}
public sealed class FolderPicker {
User User { get; }
public static FolderPicker CreateForUser(User user);
}
}
namespace Windows.System {
public sealed class DispatcherQueue {
bool HasThreadAccess { get; }
}
public enum ProcessorArchitecture {
Arm64 = 12,
X86OnArm64 = 14,
}
}
namespace Windows.System.Profile {
public static class AppApplicability
public sealed class UnsupportedAppRequirement
public enum UnsupportedAppRequirementReasons : uint
}
namespace Windows.System.RemoteSystems {
public sealed class RemoteSystem {
User User { get; }
public static RemoteSystemWatcher CreateWatcherForUser(User user);
public static RemoteSystemWatcher CreateWatcherForUser(User user, IIterable filters);
}
public sealed class RemoteSystemApp {
string ConnectionToken { get; }
User User { get; }
}
public sealed class RemoteSystemConnectionRequest {
string ConnectionToken { get; }
public static RemoteSystemConnectionRequest CreateFromConnectionToken(string connectionToken);
public static RemoteSystemConnectionRequest CreateFromConnectionTokenForUser(User user, string connectionToken);
}
public sealed class RemoteSystemWatcher {
User User { get; }
}
}
namespace Windows.UI {
public sealed class UIContentRoot
public sealed class UIContext
}
namespace Windows.UI.Composition {
public enum CompositionBitmapInterpolationMode {
MagLinearMinLinearMipLinear = 2,
MagLinearMinLinearMipNearest = 3,
MagLinearMinNearestMipLinear = 4,
MagLinearMinNearestMipNearest = 5,
MagNearestMinLinearMipLinear = 6,
MagNearestMinLinearMipNearest = 7,
MagNearestMinNearestMipLinear = 8,
MagNearestMinNearestMipNearest = 9,
}
public sealed class CompositionGraphicsDevice : CompositionObject {
CompositionMipmapSurface CreateMipmapSurface(SizeInt32 sizePixels, DirectXPixelFormat pixelFormat, DirectXAlphaMode alphaMode);
}
public sealed class CompositionMipmapSurface : CompositionObject, ICompositionSurface
public sealed class CompositionProjectedShadow : CompositionObject
public sealed class CompositionProjectedShadowCaster : CompositionObject
public sealed class CompositionProjectedShadowCasterCollection : CompositionObject, IIterable
public enum CompositionProjectedShadowDrawOrder
public sealed class CompositionProjectedShadowReceiver : CompositionObject
public sealed class CompositionProjectedShadowReceiverUnorderedCollection : CompositionObject, IIterable
public sealed class CompositionRadialGradientBrush : CompositionGradientBrush
public sealed class CompositionSurfaceBrush : CompositionBrush {
bool SnapToPixels { get; set; }
}
public class CompositionTransform : CompositionObject
public sealed class CompositionVisualSurface : CompositionObject, ICompositionSurface
public sealed class Compositor : IClosable {
CompositionProjectedShadow CreateProjectedShadow();
CompositionProjectedShadowCaster CreateProjectedShadowCaster();
CompositionProjectedShadowReceiver CreateProjectedShadowReceiver();
CompositionRadialGradientBrush CreateRadialGradientBrush();
CompositionVisualSurface CreateVisualSurface();
}
public interface ICompositorPartner_ProjectedShadow
public interface IVisualElement
}
namespace Windows.UI.Composition.Interactions {
public enum InteractionBindingAxisModes : uint
public sealed class InteractionTracker : CompositionObject {
public static InteractionBindingAxisModes GetBindingMode(InteractionTracker boundTracker1, InteractionTracker boundTracker2);
public static void SetBindingMode(InteractionTracker boundTracker1, InteractionTracker boundTracker2, InteractionBindingAxisModes axisMode);
}
public sealed class InteractionTrackerCustomAnimationStateEnteredArgs {
bool IsFromBinding { get; }
}
public sealed class InteractionTrackerIdleStateEnteredArgs {
bool IsFromBinding { get; }
}
public sealed class InteractionTrackerInertiaStateEnteredArgs {
bool IsFromBinding { get; }
}
public sealed class InteractionTrackerInteractingStateEnteredArgs {
bool IsFromBinding { get; }
}
public class VisualInteractionSource : CompositionObject, ICompositionInteractionSource {
public static VisualInteractionSource CreateFromIVisualElement(IVisualElement source);
}
}
namespace Windows.UI.Composition.Scenes {
public enum SceneAlphaMode
public enum SceneAttributeSemantic
public sealed class SceneBoundingBox : SceneObject
public class SceneComponent : SceneObject
public sealed class SceneComponentCollection : SceneObject, IIterable, IVector
public enum SceneComponentType
public class SceneMaterial : SceneObject
public class SceneMaterialInput : SceneObject
public sealed class SceneMesh : SceneObject
public sealed class SceneMeshMaterialAttributeMap : SceneObject, IIterable, IMap
public sealed class SceneMeshRendererComponent : SceneRendererComponent
public sealed class SceneMetallicRoughnessMaterial : ScenePbrMaterial
public sealed class SceneModelTransform : CompositionTransform
public sealed class SceneNode : SceneObject
public sealed class SceneNodeCollection : SceneObject, IIterable, IVector
public class SceneObject : CompositionObject
public class ScenePbrMaterial : SceneMaterial
public class SceneRendererComponent : SceneComponent
public sealed class SceneSurfaceMaterialInput : SceneMaterialInput
public sealed class SceneVisual : ContainerVisual
public enum SceneWrappingMode
}
namespace Windows.UI.Core {
public sealed class CoreWindow : ICorePointerRedirector, ICoreWindow {
UIContext UIContext { get; }
}
}
namespace Windows.UI.Core.Preview {
public sealed class CoreAppWindowPreview
}
namespace Windows.UI.Input {
public class AttachableInputObject : IClosable
public enum GazeInputAccessStatus
public sealed class InputActivationListener : AttachableInputObject
public sealed class InputActivationListenerActivationChangedEventArgs
public enum InputActivationState
}
namespace Windows.UI.Input.Preview {
public static class InputActivationListenerPreview
}
namespace Windows.UI.Input.Spatial {
public sealed class SpatialInteractionManager {
public static bool IsSourceKindSupported(SpatialInteractionSourceKind kind);
}
public sealed class SpatialInteractionSource {
HandMeshObserver TryCreateHandMeshObserver();
IAsyncOperation TryCreateHandMeshObserverAsync();
}
public sealed class SpatialInteractionSourceState {
HandPose TryGetHandPose();
}
public sealed class SpatialPointerPose {
EyesPose Eyes { get; }
bool IsHeadCapturedBySystem { get; }
}
}
namespace Windows.UI.Notifications {
public sealed class ToastActivatedEventArgs {
ValueSet UserInput { get; }
}
public sealed class ToastNotification {
bool ExpiresOnReboot { get; set; }
}
}
namespace Windows.UI.ViewManagement {
public sealed class ApplicationView {
string PersistedStateId { get; set; }
UIContext UIContext { get; }
WindowingEnvironment WindowingEnvironment { get; }
public static void ClearAllPersistedState();
public static void ClearPersistedState(string key);
IVectorView GetDisplayRegions();
}
public sealed class InputPane {
public static InputPane GetForUIContext(UIContext context);
}
public sealed class UISettings {
bool AutoHideScrollBars { get; }
event TypedEventHandler AutoHideScrollBarsChanged;
}
public sealed class UISettingsAutoHideScrollBarsChangedEventArgs
}
namespace Windows.UI.ViewManagement.Core {
public sealed class CoreInputView {
public static CoreInputView GetForUIContext(UIContext context);
}
}
namespace Windows.UI.WindowManagement {
public sealed class AppWindow
public sealed class AppWindowChangedEventArgs
public sealed class AppWindowClosedEventArgs
public enum AppWindowClosedReason
public sealed class AppWindowCloseRequestedEventArgs
public sealed class AppWindowFrame
public enum AppWindowFrameStyle
public sealed class AppWindowPlacement
public class AppWindowPresentationConfiguration
public enum AppWindowPresentationKind
public sealed class AppWindowPresenter
public sealed class AppWindowTitleBar
public sealed class AppWindowTitleBarOcclusion
public enum AppWindowTitleBarVisibility
public sealed class CompactOverlayPresentationConfiguration : AppWindowPresentationConfiguration
public sealed class DefaultPresentationConfiguration : AppWindowPresentationConfiguration
public sealed class DisplayRegion
public sealed class FullScreenPresentationConfiguration : AppWindowPresentationConfiguration
public sealed class WindowingEnvironment
public sealed class WindowingEnvironmentAddedEventArgs
public sealed class WindowingEnvironmentChangedEventArgs
public enum WindowingEnvironmentKind
public sealed class WindowingEnvironmentRemovedEventArgs
}
namespace Windows.UI.WindowManagement.Preview {
public sealed class WindowManagementPreview
}
namespace Windows.UI.Xaml {
public class UIElement : DependencyObject, IAnimationObject, IVisualElement {
Vector3 ActualOffset { get; }
Vector2 ActualSize { get; }
Shadow Shadow { get; set; }
public static DependencyProperty ShadowProperty { get; }
UIContext UIContext { get; }
XamlRoot XamlRoot { get; set; }
}
public class UIElementWeakCollection : IIterable, IVector
public sealed class Window {
UIContext UIContext { get; }
}
public sealed class XamlRoot
public sealed class XamlRootChangedEventArgs
}
namespace Windows.UI.Xaml.Controls {
public sealed class DatePickerFlyoutPresenter : Control {
bool IsDefaultShadowEnabled { get; set; }
public static DependencyProperty IsDefaultShadowEnabledProperty { get; }
}
public class FlyoutPresenter : ContentControl {
bool IsDefaultShadowEnabled { get; set; }
public static DependencyProperty IsDefaultShadowEnabledProperty { get; }
}
public class InkToolbar : Control {
InkPresenter TargetInkPresenter { get; set; }
public static DependencyProperty TargetInkPresenterProperty { get; }
}
public class MenuFlyoutPresenter : ItemsControl {
bool IsDefaultShadowEnabled { get; set; }
public static DependencyProperty IsDefaultShadowEnabledProperty { get; }
}
public sealed class TimePickerFlyoutPresenter : Control {
bool IsDefaultShadowEnabled { get; set; }
public static DependencyProperty IsDefaultShadowEnabledProperty { get; }
}
public class TwoPaneView : Control
public enum TwoPaneViewMode
public enum TwoPaneViewPriority
public enum TwoPaneViewTallModeConfiguration
public enum TwoPaneViewWideModeConfiguration
}
namespace Windows.UI.Xaml.Controls.Maps {
public sealed class MapControl : Control {
bool CanTiltDown { get; }
public static DependencyProperty CanTiltDownProperty { get; }
bool CanTiltUp { get; }
public static DependencyProperty CanTiltUpProperty { get; }
bool CanZoomIn { get; }
public static DependencyProperty CanZoomInProperty { get; }
bool CanZoomOut { get; }
public static DependencyProperty CanZoomOutProperty { get; }
}
public enum MapLoadingStatus {
DownloadedMapsManagerUnavailable = 3,
}
}
namespace Windows.UI.Xaml.Controls.Primitives {
public sealed class AppBarTemplateSettings : DependencyObject {
double NegativeCompactVerticalDelta { get; }
double NegativeHiddenVerticalDelta { get; }
double NegativeMinimalVerticalDelta { get; }
}
public sealed class CommandBarTemplateSettings : DependencyObject {
double OverflowContentCompactYTranslation { get; }
double OverflowContentHiddenYTranslation { get; }
double OverflowContentMinimalYTranslation { get; }
}
public class FlyoutBase : DependencyObject {
bool IsConstrainedToRootBounds { get; }
bool ShouldConstrainToRootBounds { get; set; }
public static DependencyProperty ShouldConstrainToRootBoundsProperty { get; }
XamlRoot XamlRoot { get; set; }
}
public sealed class Popup : FrameworkElement {
bool IsConstrainedToRootBounds { get; }
bool ShouldConstrainToRootBounds { get; set; }
public static DependencyProperty ShouldConstrainToRootBoundsProperty { get; }
}
}
namespace Windows.UI.Xaml.Core.Direct {
public enum XamlPropertyIndex {
AppBarTemplateSettings_NegativeCompactVerticalDelta = 2367,
AppBarTemplateSettings_NegativeHiddenVerticalDelta = 2368,
AppBarTemplateSettings_NegativeMinimalVerticalDelta = 2369,
CommandBarTemplateSettings_OverflowContentCompactYTranslation = 2384,
CommandBarTemplateSettings_OverflowContentHiddenYTranslation = 2385,
CommandBarTemplateSettings_OverflowContentMinimalYTranslation = 2386,
FlyoutBase_ShouldConstrainToRootBounds = 2378,
FlyoutPresenter_IsDefaultShadowEnabled = 2380,
MenuFlyoutPresenter_IsDefaultShadowEnabled = 2381,
Popup_ShouldConstrainToRootBounds = 2379,
ThemeShadow_Receivers = 2279,
UIElement_ActualOffset = 2382,
UIElement_ActualSize = 2383,
UIElement_Shadow = 2130,
}
public enum XamlTypeIndex {
ThemeShadow = 964,
}
}
namespace Windows.UI.Xaml.Documents {
public class TextElement : DependencyObject {
XamlRoot XamlRoot { get; set; }
}
}
namespace Windows.UI.Xaml.Hosting {
public sealed class ElementCompositionPreview {
public static UIElement GetAppWindowContent(AppWindow appWindow);
public static void SetAppWindowContent(AppWindow appWindow, UIElement xamlContent);
}
}
namespace Windows.UI.Xaml.Input {
public sealed class FocusManager {
public static object GetFocusedElement(XamlRoot xamlRoot);
}
public class StandardUICommand : XamlUICommand {
StandardUICommandKind Kind { get; set; }
}
}
namespace Windows.UI.Xaml.Media {
public class AcrylicBrush : XamlCompositionBrushBase {
IReference TintLuminosityOpacity { get; set; }
public static DependencyProperty TintLuminosityOpacityProperty { get; }
}
public class Shadow : DependencyObject
public class ThemeShadow : Shadow
public sealed class VisualTreeHelper {
public static IVectorView GetOpenPopupsForXamlRoot(XamlRoot xamlRoot);
}
}
namespace Windows.UI.Xaml.Media.Animation {
public class GravityConnectedAnimationConfiguration : ConnectedAnimationConfiguration {
bool IsShadowEnabled { get; set; }
}
}
namespace Windows.Web.Http {
public sealed class HttpClient : IClosable, IStringable {
IAsyncOperationWithProgress TryDeleteAsync(Uri uri);
IAsyncOperationWithProgress TryGetAsync(Uri uri);
IAsyncOperationWithProgress TryGetAsync(Uri uri, HttpCompletionOption completionOption);
IAsyncOperationWithProgress TryGetBufferAsync(Uri uri);
IAsyncOperationWithProgress TryGetInputStreamAsync(Uri uri);
IAsyncOperationWithProgress TryGetStringAsync(Uri uri);
IAsyncOperationWithProgress TryPostAsync(Uri uri, IHttpContent content);
IAsyncOperationWithProgress TryPutAsync(Uri uri, IHttpContent content);
IAsyncOperationWithProgress TrySendRequestAsync(HttpRequestMessage request);
IAsyncOperationWithProgress TrySendRequestAsync(HttpRequestMessage request, HttpCompletionOption completionOption);
}
public sealed class HttpGetBufferResult : IClosable, IStringable
public sealed class HttpGetInputStreamResult : IClosable, IStringable
public sealed class HttpGetStringResult : IClosable, IStringable
public sealed class HttpRequestResult : IClosable, IStringable
}
namespace Windows.Web.Http.Filters {
public sealed class HttpBaseProtocolFilter : IClosable, IHttpFilter {
User User { get; }
public static HttpBaseProtocolFilter CreateForUser(User user);
}
}

Open source in the enterprise presents a two-edged sword

Open source in the enterprise offers IT pros control over their own destiny. But it’s control that comes with a price.

During the last 15 years, mainstream enterprises have made the shift from commercial and, thus, proprietary software from enterprise IT vendors to free and open source software developed by the community.

Open source is here to stay. Enterprises are loath to hand the reins back to proprietary software vendors that lock them into platforms, and some experts argue that only community-developed code — particularly in infrastructure management software — achieves acceptable transparency and development speed in a cloud-native world.

But while some very large enterprises have found it worthwhile to develop internal open source expertise and cobble together their own bespoke IT architectures, many mainstream companies lack an army of highly qualified open source developers. They can be overmatched by the complexity of open source platforms, such as Kubernetes, and the time required for IT staff to become proficient in their management.

It’s a misconception that every enterprise IT shop can become proficient in IT platform development, said Mark Thiele, edge computing engineer at Ericsson, a multinational telecommunication equipment manufacturer headquartered in Stockholm. He said he thinks a reckoning is at hand over internal cloud based on complex architectures, such as upstream Kubernetes and OpenStack.

“Over the next 18 months, you will see a tidal wave of major names, giants, saying ‘[Expletive] this, we’re not going to do this anymore,'” Thiele said.

Advantages and disadvantages of open source in the enterprise

Community-supported open source software has one major selling point: There’s no license to buy upfront. It also offers transparency for its source code, which means it can be customized. Also, users can potentially control and influence code development more effectively than they could with commercial software.

“We have a long history of in-house expertise. We’re used to developing things, and it feels natural,” said Kevin Burnett, DevOps lead at Rosetta Stone, a global education software company in Arlington, Va., which runs upstream Kubernetes in its own data centers, among other upstream open source code. “The on-premises part could change, and we might look at a cloud-provider’s managed Kubernetes service. But, otherwise, we’re more inclined to own it ourselves.”

Bloomberg, a global finance, media and tech company based in New York, is the poster child for upstream open source in the enterprise. The company is accustomed to writing its own code and has no plans to leave its self-managed data centers for cloud services. Moreover, the company’s strict regulatory and security requirements for the financial data it distributes, along with demanding service-level agreements from its customers, mean it is paramount to have control over platform code such as Kubernetes.

Kevin Fleming, director of R&D in Bloomberg's office of the CTOKevin Fleming

“Sometimes, our tech people sit in on presentations by vendors with packaged Kubernetes distributions,” said Kevin Fleming, who oversees research and development teams in Bloomberg’s office of the CTO. “But we already know how to do the things they say they can do. And those companies have many other clients, so who’s the priority? We have one client: us.”

Fleming estimated Bloomberg has between 5,000 and 6,000 engineers, a full 25% of the company’s employee base. At that scale, there are enough engineering resources to dedicate teams of four or five people to experiment with the latest open source utilities and customize them for production use.

We already know how to do the things [packaged Kubernetes vendors] say they can do. And those companies have many other clients, so who’s the priority? We have one client: us.
Kevin Flemingmember of the CTO office, Bloomberg

But not every company can be Bloomberg or its peers, such as Verizon and Google. There are only so many expert developers to go around.

“Being a relatively big company doesn’t mean you’ve necessarily thought through the implications of open source labor,” Ericsson’s Thiele said. “These companies can and do get hundreds of millions of dollars into projects without asking themselves serious questions and get nowhere.”

Even Bloomberg sometimes looks to commercial open source vendors for a leg up on open source tools, depending on how new they are, and their long-term importance to the company, Fleming said. In the early days of Hadoop, for example, Bloomberg worked with vendors such as Hortonworks and Cloudera to stabilize its infrastructure for the big data processing platform.

It will lean on other vendors like Percona for help with utilities such as Metrictank that it doesn’t plan to modify or enhance internally, and when in doubt, it will seek consultations with open source community developers who work for commercial vendors, he said.

Most mainstream companies, meanwhile, seek a middle ground between pure upstream open source software and completely proprietary products that is serviced by vendors that use a business model called open core.

Find out the pros and cons of the open core approach in part two of this story.

Go to Original Article
Author:

For Sale – Gaming PC – I7 3770K, 16GB, SSD + HDD, GTX 970

Discussion in ‘Desktop Computer Classifieds‘ started by Wiggz, Jan 9, 2019.

  1. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    Hi all,

    Selling my trusty I7-3770K build as I’ve upgraded and gone team red (Ryzen) in the last couple of months.

    Still runs triple-A titles without issue at 1080p

    Spec list below:

    The case itself has 2 x Corsair AF140 fans as an intake, with the Corsair H80i V2 handling the CPU and exhaust out of the back, and a 120MM (again Corsair) as a top exhaust to keep temps good (see pics).

    The 300R has been insulated with sound dampening, which I did before I even got the liquid cooler, and changed the fan curves to keep it nice and quiet.

    Individually priced I could probably get a bit more for these parts, but as a system (no monitor or keyboard/mouse) I’m looking for £500 £460 now after price drop

    Price and currency: 460
    Delivery: Delivery cost is not included
    Payment method: PayPal Gift, BT
    Location: Nuneaton
    Advertised elsewhere?: Advertised elsewhere
    Prefer goods collected?: I prefer the goods to be collected

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Attached Files:

    Last edited: Jan 29, 2019

  2. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    bump and price reduction.

  3. NeverEden

    Well-known Member

    Joined:
    Aug 6, 2012
    Messages:
    4,736
    Products Owned:
    2
    Products Wanted:
    0
    Trophy Points:
    136
    Location:
    London
    Ratings:
    +1,490

    Would you consider pricing without the GFX Card and HDD? I’d only need the SSD

  4. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    Hi

    @NeverEden – so you’d want the CPU, Case etc, all without the GPU and the HDD? I think I could do that, yes. Make me an offer on that mate and we’ll go from there I can always keep the HDD as a scratch drive, and sell the 970 separately.

  5. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    Bump.. Suggest £400 to

    @NeverEden via pm for system excluding hdd and GPU Awaiting response.

  6. NeverEden

    Well-known Member

    Joined:
    Aug 6, 2012
    Messages:
    4,736
    Products Owned:
    2
    Products Wanted:
    0
    Trophy Points:
    136
    Location:
    London
    Ratings:
    +1,490

    Hi – sorry for the delayed response. It’s a good price but outside my budget for now

  7. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    Okay, thanks for coming back to me. Are you looking to offer anything else or not? I’m looking to sell quickly so open to offers, but I can’t let it go for a song.

  8. Coheed

    Active Member

    Joined:
    Nov 25, 2010
    Messages:
    872
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Ratings:
    +66

    Could you do £450 delivered?

  9. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    Hey

    @Coheed thanks for the offer .. I can do 475 delivered to deal with the courier charge. Where do you live ?
    Take it to pm if it’s acceptable

  10. Coheed

    Active Member

    Joined:
    Nov 25, 2010
    Messages:
    872
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Ratings:
    +66

    I’m going to stick to £450 for now, thanks.

  11. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    Hi @Coheed – I think you’re probably around London area right? If that is the case, then postage is a must (as I doubt you’ll want to come and pickup). I can’t let it go for £450 delivered, especially as there is always the chance of something happening within shipping and then causing an issue.

    Let me know if you change your mind – I’m keen to sell, but I want to ensure that whomever purchases it gets it in one piece (or picks up )

  12. Coheed

    Active Member

    Joined:
    Nov 25, 2010
    Messages:
    872
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Ratings:
    +66

    Hey, sorry about not including my area, I completely forgot to add that. Yeah, I live in London.

    That’s a shame as £450 is my budget! This PC looks great though, I’m sure someone else will snap it up. Good luck with your sale.

  13. Wiggz

    Active Member

    Joined:
    Jul 17, 2010
    Messages:
    541
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    31
    Location:
    Nuneaton
    Ratings:
    +40

    Bump.. Price drop

Share This Page

Loading…

Go to Original Article
Author:

Try the fun, free and teacher-tested STEM workshops at your local Microsoft Store |

Students participate in the free Ohbot the Robot immersive, educational workshop at the Microsoft Store where they learn to code Ohbot to talk and move.

Today, technology jobs make up 50 percent of our workforce and that number will move to 77 percent in the next decade. With the growing gap in access to STEM learning – especially for girls and students of color – how will we ensure students have the right skills to fill the jobs of tomorrow?

To help teachers save time both in and out of the classroom, Microsoft Store offers professional development and field trips for teachers and students providing free content and fun workshops.

Teachers ignite STEM interest with workshops and field trips

In teaching STEM, teachers often need support to build their own skills and confidence in the subject matter. Microsoft provides access to free professional development resources including in-person workshops and online learning courses.

Teachers can learn how to deliver STEM content in their own classroom from professionally trained Microsoft Store MIE (Microsoft Innovative Educator) learning specialists or bring their students into a Microsoft Store for a fun, free, immersive technology enabled field trip.

For the first time, Microsoft Store will be live streaming a workshop on Facebook on February 9 at 12:30 p.m. PST showcasing students and teachers building a STEM project, a shark swimmer controller, in real time. This ocean-inspired lesson plan, developed in partnership with BBC Learning, teaches students how to write code, build sensors, create 3D visuals and experience mixed reality all while learning how sharks swim. This program is even being featured by BBC Learning. Access to the live stream will be available through Microsoft Education’s Facebook page.

Susan A. Gold, the Co-Founder and Head of Feynman School recently brought students into the Microsoft Store at Westfield Montgomery in Bethesda, Maryland for an Hour of CodeTM training session.

“The Hour of Code program was engaging, educational and most of all fun for all of our students,” Susan said. “I thought that the staff members assisting us were extremely knowledgeable and related well to our middle school students.”

Microsoft Stores across the U.S., Canada and Australia conduct over 2,300 hours of free workshops during the year. These workshops can be tailored to the age of the students and the education goals of the teacher whether it is coding OhBot the Robot to talk and move, make a robotic hand from $3 of household items, code an undersea Minecraft world or how to manage cyberbullying.

Visit your local Microsoft Store to find the latest list of available workshops.

Students learn skills today that will help them solve the world’s problems of tomorrow

Today’s generation of students will study higher-education courses that don’t yet exist, work in roles that have not yet been created and will be tasked with solving the most complex environmental, social and economic issues of any generation in history. Microsoft Store programming and workshops help students learn real-world problem-solving and computational thinking skills through interdisciplinary STEM experiences that will prepare them for the future.

Microsoft Store team members have been visiting Elma Primary School for the past two years and recently taught Minecraft Hour of Code to over 50 students and parents.

Emily Rautenstrauch, Community Development Specialist at Microsoft Store, Walden Galleria in Buffalo, New York, said the events have helped showcase the workshop opportunities to teachers and parents.

“Most parents didn’t realize Microsoft Store offered free workshops,” Emily said. “But by offering in-school workshops and additional information on our youth events, dyslexia, cyberbullying and gaming workshops, we have been able to generate a great partnership with Elma Primary teachers and parents.”

If you see an opportunity for a school, class or teacher you know could benefit from Microsoft Education, encourage them to visit their local Microsoft Store location and together we will continue to unlock limitless learning with free customized field trips for classes and free STEM lessons every Saturday in February.

Find the right technology for your school

Find the right technology for your school

Go to Original Article
Author: Steve Clarke

Keeping kids safe in a digital world | Windows Experience Blog

Using Windows 10 and Xbox family settings is now easier than ever

The internet is a dynamic place that is changing every day, so today, Safer Internet Day, is a great time to take a moment to evaluate your family’s digital habits and online safety, and ensure you have all the proper guardrails in place. As the lead of strategy and product for the family team, and a mom of two, it’s something I think about all the time, at home and at work. Yet I hear from a lot of people that they don’t know what tools are available or how to use them. I think most parents today wonder how to ensure their children are safe when using technology, be it playing the latest games, using apps, or simply browsing the web from their many devices. Today, I am sharing a few tips that I personally use with my kids that might help your family.

Take advantage of free, built-in features in the devices you use. Go to account.microsoft.com and set up a Microsoft account to take advantage of all the great family settings across Windows, Xbox, Microsoft Launcher for Android, and the web. Family settings are a free set of features that span devices and can help you set guardrails that work for your family – manage screen time, set permissions for games or apps purchases, enable safe browsing on the web, and more. And we’re excited that we’re making the consent process for a child account easier than ever, eliminating the need to enter a credit card to confirm an adult account – which is often a barrier for families in this process. Beginning now on Xbox, and coming to Windows, mobile apps and the web over the coming months, the process is simpler and more efficient for parents, requiring only an e-signature.

Have an open dialog with your children about expectations and appropriate digital behavior. While there are tons of tools and apps available to track your child’s behavior or monitor their every move, there is a lot to be said for using digital time as a learning opportunity. I always encourage people to sit down with their kids and talk about what is expected of them, what is good and bad online, and to discuss what the appropriate guardrails are going to be before you set them up. This can help foster an ongoing conversation and empower kids to be a part of the process in learning how to manage their own relationship with technology.

Set a good example. Just like our kids wanted to cook or vacuum like us when they were small, they are still looking to us as their example as they get older. The best way to teach our kids about responsible digital habits and online safety is to demonstrate good behaviors ourselves.

Visit microsoft.com/family for more information and tips. My team and I continue to work hard to build features that can help families thrive in our digital world – we are excited to bring you more this year!

How much does Azure Update Management cost?

The Azure Update Management cost is free, up to a certain point. There are no separate charges to use the patching tool, but access to complementary features might affect the bottom line.

Azure Update Management is part of the Azure Automation service. Organizations can use the capabilities and features of Azure Update Management at no cost. Users can check a system’s status and deploy updates across the environment without any extra fees.

However, Azure Update Management relies on logs to track systems and drive update behaviors, and those logs are typically stored in the Azure Log Analytics service. Charges can add up when using Azure Log Analytics — now part of the cloud monitoring tool Azure Monitor — for Azure Update Management log data ingestion and storage.

Consequently, the collateral cost for Azure Update Management will largely depend on the size of the environment.

For example, East Coast U.S. region users can access up to 5 GB per month of data ingestion and use 31 days of log data storage as part of a free tier, then pay $2.30 per GB of ingested data and $0.10 per GB of stored data per month after that.

Consequently, the collateral cost for Azure Update Management will largely depend on the size of the environment. That is, larger environments with more systems under management will typically generate more log data and require more stored data, driving up the Azure Update Management cost for the business.

As with all projects that work on a cloud consumption model, it’s worth the effort to estimate the financial impact of these services in advance, and then track the charges over the duration of a pilot program to ensure the expenses are in line with expectations.

Go to Original Article
Author:

Eight ways to protect yourself online this Safer Internet Day – Microsoft News Centre Europe

Use unique passwords1. Use complex, unique passwords for different accounts
If someone has your house key, they can enter and burglarize every room in your home. The same is true of passwords and online accounts. Too often we choose passwords that are easy to remember, such as names or birthday dates. But if it’s easy for you to remember, it’s likely to be easy for cybercriminals to guess. If you use the same, simple password for multiple accounts, then cybercriminals can – and will – be able to access all your sensitive personal information.

Use a password manager to save multiple passwords to different accounts safely and make sure that each password is complex; using at least 10 characters and a mixture of numbers, letters, capitalizations and special characters.

Social media icons2. Don’t accept invites from strangers on social media
Not everyone you meet online is who they claim to be. It’s common for cybercriminals to create fake social media profiles to foster relationships with unwary users and pick their cyber pockets – or worse.

If you’re approached by a stranger online, who insists you share personal information or requests money, that should set off alarm bells. If possible, search the person directly to see if the account is authentic. Still unsure about the person’s identity but want to accept their friend request anyway? Just to be on the safe side, limit the information that person can view on your profile using privacy setting.

Remember: the same rules apply online as they do in the real world – don’t share sensitive or private information with strangers.

Personal info icons3. Online actions can have offline consequences
Think of the Internet like a town square or a sidewalk: it’s a public space, where anyone can see or share anything you publish, irrespective of whether it’s meant for them or if you’ve given permission.

Before you post something online, ask yourself; would I want my employer, customer or relative to know this? Even things like your relationship status or home address, which might seem harmless, can be misused if the wrong people see them.

Online action icon4. Protect sensitive and personal information
With a few exceptions, unfortunately there is no permanent delete key for content posted online. Any image, comment or photo you post online is like to remain there forever. Even if you remove the original post, you can’t be sure that others have not made copies or shared your content on other networks. So don’t put anything online that you wouldn’t want others to see.

Careful click icon5. Be careful where you click
A tried-and-tested cybercriminal tactic is to trick you into downloading malware that allows them to steal information. From a popular game to an email offering tech support, malware can be disguised in a variety of different ways.

Avoid downloading apps that look odd or come from an unknown site. Not sure if an email is legitimate? Ask yourself the following questions: Does the sender have a bizarre email address? Is the greeting impersonal? Are there a lot of spelling mistakes? Is there a strange sense of urgency?

If you’re still unsure, get in touch with the brand or company through their official channels such as their website or social media page. It is always better to triple check than risk compromising your security.

Privacy setting icon6. Update your privacy settings & antivirus
If you don’t update your defences, cybercriminals will eventually come up with a way to overcome them. Be sure to stay current with your operating system’s updates and make an effort to check the privacy settings on the applications and browser you use.

Secure connection icon7. Always use a secure connection
When using a public internet connection, such as Wi-Fi in a shopping center, you have no direct control over its security. If you’re unable to establish a secure connection or ensure your device is protected, don’t share sensitive information. It’s safer to wait until you’re at home and using a secure Wi-Fi network.

Ask advice icon8. Ask advice from those you trust
Never feel rushed to click on a link or publish a post. There is nothing more urgent than our online safety.

Navigating online threats can be stressful, but there are plenty of resources to help you out. Whenever you find yourself in a situation where you are unsure or suspicious, always defer to the expertise of those you trust – whether a friend, parent, teacher or even a technology partner.

Looking for a fun way to teach youth about internet safety? Download the free Safer Internet Day chatterbox and discussion guide.

Go to Original Article
Author: Steve Clarke

Facebook and Google exploit Enterprise Certificate loophole on iOS

A loophole in Apple’s enterprise certificate program for iOS apps allowed Facebook and Google to bypass the App Store review with market research apps designed to collect user data.

The enterprise certificate program on iOS allows developers to distribute internal corporate apps without needing to pass Apple’s App Store reviews and can allow apps with much broader permissions than would be allowed through the App Store.

A new report from TechCrunch revealed that Facebook compensated users as young as 13 years old via gift cards to install the Facebook Research app, which could collect messages and media from social media and instant messaging apps, as well as constant location tracking. TechCrunch reported the Facebook Research app was similar to another app from the social media giant, Onavo Protect, which used Facebook’s enterprise certificate to root access to users’ device traffic and was banned from Apple’s App Store.

Facebook shut down the iOS version of its Research app after the report broke, but Apple still revoked all of Facebook’s enterprise certificates, meaning no Facebook apps in development internally can be run on iOS devices. The Android version of Facebook Research is still running; Google did not respond to requests for comment as to whether that app is in violation of any Google policies.

Apple said in a statement that its Developer Enterprise Program was designed “solely for the internal distribution of apps within an organization.”

“Facebook has been using their membership to distribute a data-collecting app to consumers, which is a clear breach of their agreement with Apple,” an Apple spokesperson said. “Any developer using their enterprise certificates to distribute apps to consumers will have their certificates revoked, which is what we did in this case to protect our users and their data.”

Google shut down its own market research app, dubbed Screenwise Meter, following another TechCrunch report claiming it used the same enterprise certificate loophole to allow users to install the app on iOS. As yet, Apple has not taken any action against Google’s internal developer certificates.

Facebook did not respond to requests for comment but provided a statement to other media outlets that claimed the Facebook Research app wasn’t “spying” on users and that less than 5% of users were teens.

In an interview with CNBC, Sheryl Sandberg, COO of Facebook, said the company pulled the app as soon as it realized the app “wasn’t in compliance” with Apple’s enterprise certificate program, implying no one realized the program was only for internal corporate apps.

Experts noted that these issues with companies bypassing the rules of Apple’s enterprise certificate program should be a warning to other organizations and employees.

Francis Dinha, CEO of OpenVPN, said there’s not much enterprises can do to protect company data “if employees willingly give permission to an application to harvest data.”

“Short of regular device audits or banning any BYO [bring-your-own] device program, enterprises simply have to trust their employees,” Dinha said. “That’s where education becomes so essential: If your company data is going to be on your employees’ devices, you need to make sure they know the critical steps to take to protect that data. Educate them about the risks, cybersecurity best practices, the basic structure of the device and how information is shared, so they can be more aware of how to protect your company’s information. You can’t blame your employees for putting data at risk if you don’t fairly inform them of your expectations — or how exactly to implement them.”

Chad McDonald, vice president of customer experience at cybersecurity vendor Arxan in San Francisco, said the key to effective administrative policies is enforcement.

“If a user is providing their own device, then it’s easy to fall into a ‘my device, my rules’ posture. The enterprise has an obligation to clearly establish and communicate data ownership and usage criteria regardless of the geography of the data itself,” McDonald said. “Sharing corporate data existing even in something as innocuous as a contact list on your phone may be a violation of privacy regulations. The responsible enterprise has an obligation to provide not only awareness to its constituency, but also the tools necessary to help users remain diligent in their own efforts to do the right thing.”  

Dinha added that employees should also be careful when installing any internal corporate apps.

“If you’re downloading an internal corporate app, ideally you’d have developed trust there and understand clearly the amount of access that app will have to your private data. If you have reason not to trust your company, don’t install the corporate app on your personal device,” Dinha said. “Use a work phone. If they expect you to download an internal app, they’ll be providing a device for it anyway. You’re under no obligation to reveal deeply personal data to your employer and should not be penalized for protecting it.”

Go to Original Article
Author:

For Sale – Monster Small Form Factor PC (i7-8700K/RTX 2080 Ti etc)

Hello,

For Sale I have a monster PC. I bought it in November last year for £2,600 but have so far only switched it on once, and it’s unlikely to get switched on in the near future.

The full spec is as follows:

Corsair Crystal Series 280X RGB Gaming Case
Intel® CoreTM i7 Six Core Processor i7-8700K (3.7GHz) 12MB Cache
ASUS® ROG STRIX Z370-I GAMING: Mini-ITX, USB 3.1, SATA 6GBs
16GB Corsair VENGEANCE DDR4 3600MHz (2 x 8GB)
11GB NVIDIA GEFORCE RTX 2080 Ti – HDMI, 3x DP GeForce – RTX VR Ready!
NOT REQUIRED
1TB INTEL® 760p M.2 NVMe PCIe SSD (upto 3230MB/sR | 1625MB/sW)
NOT REQUIRED
CORSAIR 550W TXm SERIESTM SEMI-MODULAR 80 PLUS® GOLD, ULTRA QUIET
Corsair H55 Hydro Series High Performance CPU Cooler
COOLER MASTER MASTERGEL MAKER THERMAL COMPOUND
Genuine Windows 10 Home 64 Bit – inc. Single Licence [KUK-00001]
United Kingdom – English Language

3 Year Standard Warranty (1 Month Collect & Return, 1 Year Parts, 3 Year Labour) STANDARD expires on 7th Nov 2021

Price and currency: £2050
Delivery: Delivery cost is included within my country
Payment method: BT/PPG
Location: Hartlepool
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Go to Original Article
Author: