If you’re trying to decide what to buy between Office 365 and Office 2019, you’ll find there’s a world of difference between the two. Both include fully-installed Office applications – the latest versions of Word, Excel, PowerPoint and Outlook. But Office 365 is also connected to the cloud, so you can access your content from any device, co-author with anyone in real-time (regardless of whether or not they’ve purchased a copy of Office) and use the power of artificial intelligence (AI) to create more impact with less effort.
On the flipside, Office 2019 is not cloud connected and doesn’t have Office 365’s AI-powered capabilities. These apps are “frozen in time” without the prospect of being updated with new features.
To further help you choose, Microsoft pitted Office 2019 and Office 365 against each other in a head-to-head showdown, challenging three sets of twins to complete the same tasks in both versions of Word, Excel and PowerPoint – and filmed them along the way.
Find out more and see the videos on the Microsoft 365 Blog.
Open core software promises the best of two worlds for enterprise IT, but a business model based on a free code base doesn’t guarantee longevity among open core vendors.
Enterprises’ preference for open core software vendors is almost as pronounced as the increasingly mainstream preference for open source. Some 61% of 261 respondents to a 2017 Enterprise Strategy Group (ESG) survey on cloud systems management buying preferences said they preferred open source software to commercial proprietary products, but only 17% of respondents wanted pure upstream code. A larger proportion of respondents (21%) preferred commercial software that included open source features or commercial open source products (18%).
“Enterprises need products, and open source is not a product,” said Tom Petrocelli, analyst at Amalgam Insights in Arlington, Mass. “Community support isn’t going to be any good at 2 a.m. when your system is down and your customers in China are really, really mad.”
Many of the major IT vendors of late are open core vendors that step in to provide support and curation for open source code. Of these, Red Hat is the most well-known. The company, which was acquired by IBM for $34 billion in 2018, first offered commercial support for the Linux operating system. And in the last decade, it added support for open source infrastructure as code, software-defined storage and container orchestration tools. Other major platform vendors, such as Docker and Mesosphere, have followed suit, as have open source application specialists, such as Elastic, Redis and MongoDB.
Pros and cons of open core software vendors
While enterprises prefer vendor support to community support, the open core business model presents problems for vendor longevity. Red Hat held its own against proprietary operating system vendors such as Microsoft, but it never grew to similar size and has now joined the ranks of open source standard-bearers swallowed by historically proprietary firms. Similarly, Oracle acquired Sun Microsystems in 2010, and Microsoft bought GitHub last year.
Legacy IT vendors, led by Microsoft and IBM, have embraced open source and the open core model much more enthusiastically in the last five years. However, there are signs that emerging open core vendors are concerned about their bottom line and that enterprise IT buyers question the longevity of open core platform businesses, such as Docker.
Open core software vendors MongoDB and Redis are in the midst of a fight with AWS about the rights to open source code and have put forth a new software license model that requires service providers such as Amazon to contribute either code or funds back to the open source community when they create services based on open source projects.
The Red Hat version of the open core business model is all but dead, said Edwin Yuen, an analyst at ESG at the time of his interview with us in January 2019, who has since taken a product marketing job at AWS.
“On every call with enterprise open source vendors, I ask what their plan is to differentiate with their business model,” Yuen said. “Almost no open core companies said their business model was based on support. They’re either enhancing open source software with additional features or offering a closed-source version.”
Even with fresh business model approaches, a business based on a core of freely available code carries some fundamental Catch-22s, Yuen said. Companies can take open source code and not contribute back to the community, a practice known as leeching, which is the accusation against AWS. Leeching may destroy the goodwill of the open source community and lead to forked code in the open core product or service, which doesn’t help long-term stability for enterprise users, Yuen said.
However, businesses can go too far in the other direction, where internal developers spend significant time on code that is contributed to the community — and resources are focused on things other than the company’s core value proposition and bottom line, Yuen said.
Among enterprise users, the balance-sheet struggles of open core vendors seem like inside baseball gossip. The open core model may present challenges, but it’s more viable than the proprietary route.
“Even if Amazon eats somebody’s lunch, like Redis, Mongo or Elastic, those companies have still done pretty well,” said Nir Valtman, chief information security officer at fintech startup Kabbage Inc. in Atlanta. “Would they have done well if they weren’t open source? That’s what brought them where they are, even if AWS is bigger.”
Enterprise open source recipe calls for healthy mixture
Nir Valtmanchief information security officer, Kabbage
In the end, even if an open core software vendor fails, it’s a better alternative to what users used to go through when proprietary software vendors went out of business, Valtman said.
“I hope open core vendors like HashiCorp stay in business a long time. But, if something happens, the code lives on,” he said.
It can be difficult to predict whether community support will remain for a code base without a commercial champion, but it’s easier to figure out how to port to something more viable with visibility into the code that’s already in use.
“Closed-source vendors say their code will be kept in escrow in the event they go out of business, but then what?” said Kevin Fleming, who works with various teams across Bloomberg to help produce and support the organization’s open software. “We get a huge dump of code and don’t know what to do with it. That’s not really insurance; that’s just checking a box.”
Even the license flap between open core vendors and AWS has the potential to work out in favor of enterprise users, Petrocelli said.
“Companies that thumb their noses at the social contract of open source may succeed in the short term, but I’m not so sure they’ll succeed in the long term,” Petrocelli said. “The romantic notion from the ’80s and ’90s of someone building something unique in their garage and gathering up friends to keep it going is gone, but there’s value in open source ideals of giving as much as you get, even if it’s a corporate affair.”
TomTom selects Microsoft Azure as its preferred cloud provider; TomTom location-based services will be utilized across Microsoft technologies for cloud services including Microsoft Azure, Bing Maps and Cortana
AMSTERDAM and REDMOND, Wash. — Feb. 4, 2019 — TomTom (TOM2) and Microsoft Corp. (MSFT) today announced that they are expanding their partnership, bringing TomTom’s maps and traffic data into a multitude of mapping scenarios across Microsoft’s cloud services. With this broadened integration, TomTom will be a leading location data provider for Microsoft Azure and Bing Maps. TomTom is also expanding its relationship with Microsoft, selecting Microsoft Azure as its preferred cloud provider.
Azure Maps delivers secured location APIs to provide geospatial context to data. The Azure Maps service enhances the value of the Microsoft Azure cloud platform that is helping enterprises and developers create IoT, mobility, logistics and asset tracking solutions. TomTom providing their map data and services is a significant component for completing these enterprise customer scenarios.
Anders Truelsen, Managing Director, TomTom Enterprise said, “TomTom is proud of the relationship we’ve built with Microsoft to offer Microsoft Azure customers access to build location-aware applications and look forward to deepening that relationship as we extend our high-quality location technologies to an even larger audience base. We’re excited to be chosen as the location data provider to power mapping services across all of Microsoft, including Bing, Cortana, Windows and many other leading products and the innovations that will come forward in this continued relationship.”
“This deep partnership with TomTom is very different from anything Microsoft has done in maps before,” said Tara Prakriya, Partner Group Program Manager of Azure Maps and Connected Vehicles. “TomTom hosting their services in the Azure cloud brings with it their graph of map data. Manufacturing maps in Azure reduces the latency to customer applications, ensuring we offer the freshest data through Azure Maps. Azure customers across industries end up winning when their geospatial data and analytics, TomTom data, and Azure Maps services are all running together in the same cloud.”
Azure Maps lights up a multitude of location scenarios for Microsoft. Azure customers now have native support ranging from building map-based dashboards to visualize IoT spatial analytics to mobility scenarios for vehicle movement. For example, in agriculture, customers can easily track utilization of farm sensors for crops, livestock, tractors and more to optimize production. Using the Azure Maps routing services powered by TomTom allows for insightful distribution of goods originating from farmlands to retail, restaurants and home delivery. Using the freshest maps and traffic information can determine delivery range, optimize delivery routes and provide customer insights into delivery status.
TomTom providing the freshest map and traffic information in combination with Azure Maps services and SDKs will help perpetuate improved smart city applications. Azure Maps SDKs using TomTom services make it simple to render a multitude of data sets from a variety of sources – such as real-time parking meter rates, street-specific traffic, addressing carbon footprint, reducing noise pollution and more in a consolidated, map-based application for visualization of pertinent city information crucial to its citizens.
Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.
TomTom is the leading independent location technology specialist, shaping mobility with highly accurate maps, navigation software, real-time traffic information and services.
To achieve our vision of a safer world, free of congestion and emissions, we create innovative technologies that keep the world moving. By combining our extensive experience with leading business and technology partners, we power connected vehicles, smart mobility and, ultimately, autonomous driving.
Headquartered in Amsterdam with offices in 30 countries, TomTom’s technologies are trusted by hundreds of millions of people worldwide. www.tomtom.com
Dell has joined forces with CrowdStrike and Secureworks for a new endpoint security portfolio to help enterprises — especially midmarket companies with limited cybersecurity infrastructure — tackle emerging threats.
The combined endpoint security portfolio, dubbed Dell SafeGuard and Response, combines CrowdStrike’s unified endpoint protection platform with managed security and incident response services from former Dell subsidiary Secureworks.
The endpoint security portfolio is designed to provide customers with the essential capabilities they need to protect their endpoint devices and data residing on those devices, the company said.
Brett Hansen, vice president and general manager of client software and security solutions at Dell, said there are three trends that shaped Dell’s decision to partner with CrowdStrike and Secureworks around endpoint security:
“While all companies are experiencing these trends and the challenges these trends present, we feel it is most acute with those in the midmarket, those who don’t have a robust cybersecurity organization, who don’t have their own security operations center or their own SIEM — basically the bulk of the market,” Hansen said.
The endpoint security portfolio will provide organizations — especially those that don’t have the expertise to make good decisions on what actions to take and how to remediate a threat — with the capabilities to allow them to improve their prevention strategies against malware-less attacks, mitigate the time it takes from compromise to detection and complement their existing infrastructure with cybersecurity professionals, Hansen said.
“Secureworks and ourselves led an effort to evaluate the marketplace to find the best technology out there for prevention, detection and remediation,” he said. “What attracted us to CrowdStrike was the fact that they had a single offering, a single lightweight agent that combined these different elements. Despite its robust capabilities, it didn’t have a detrimental impact on user experience and performance.”
What customers can expect
Brett Hansenvice president and general manager of client software and security solutions at Dell
Dell customers can select from a range of Dell SafeGuard and Response endpoint security products and services, Hansen said.
“Customers can purchase it like any other software as a subscription. We also offer it ‘on the box,’ so as I’m buying my next Dell client system, I can include the CrowdStrike and Secureworks offerings as well on there,” he said.
The first offering, CrowdStrike Falcon Prevent, will provide customers with CrowdStrike’s next-generation antivirus(NGAV) service, which uses artificial intelligence and machine learning to stop malware and malware-free attacks, Hansen said.
“We do have machine learning both in the cloud and on the agent itself, so even in an offline mode, you have the protection you need,” said Matthew Polly, vice president of worldwide business development and channels at CrowdStrike, based in Sunnyvale, Calif. “It is the best of both worlds in terms of machine learning ‘on the box,’ as well as really powerful AI in the cloud.”
The second offering, CrowdStrike Falcon Prevent and Insight, is a combination of CrowdStrike’s NGAV and endpoint detection and response (EDR) service, and it enables full visibility into endpoint threat activity, detects anomalous behavior and stops the attacks earlier, Hansen said.
Today, signature-based legacy antivirus products are relatively ineffective, Polly said.
“We do have the combination of NGAV and EDR, and the reason for that is more attacks today are malware-free,” Polly said. “An EDR component can help identify malware-less attacks where you’ve got an adversary that has penetrated through a malware-free attack and traversing laterally throughout the environment to identify where the good stuff is. That’s where the EDR comes in, and that’s the integration with Secureworks.”
Secureworks Managed Endpoint Protection is the third offering, and it’s a combination of CrowdStrike’s NGAV and EDR with Secureworks’ managed security services. In addition, Secureworks’ Security Operations Center and Counter Threat Unit will provide investigative services.
Once an anomalous activity is detected, a person can come in to help an organization detect if that anomalous activity is malicious and then offer appropriate response steps for remediation, said Wendy Thomas, senior vice president of business and product strategy at Secureworks, based in Atlanta.
“That sort of helps complete the full outcome set for an organization that simply doesn’t have that expertise,” Thomas said. “It helps them save time to focus on the things that are truly a danger to their assets in their organizations.”
The fourth offering is an incident response package, called Secureworks Incident Management Retainer, that “goes back to how do we help protect companies of all sizes, but especially those in the midmarket who have less sophisticated cybersecurity infrastructure,” Hansen said.
“In terms of the incident response, we can help those organizations not just in case of a breach where they will have that security of knowing there’s an expert who can quickly deploy to help them, but it can actually offer something more proactive about actually preparing for the response plans and procedures,” Thomas said.
Apart from bringing in the ability to reach out to tens of thousands of customers who might not realize that this level of capability is within their grasp, Hansen said, Dell also brings in its own support services.
“That support is a really big deal for especially in the target market which we’re going after, who doesn’t necessarily have the experience and the background in deploying cybersecurity capabilities like these,” he said.
The Dell SafeGuard and Response endpoint security portfolio is expected to be available globally in March.
The motherboard and case are new, never used before and the ram was taken from another machine, the hard drive has been used before but is in full working order.
Running Windows 7 Professional already activated with a key.
It does have a slot for a slimline DVD drive.
Mini-ITX case Jetway Mini-ITX NC9KDL-2550 Motherboard 2GB DDR3 Ram Seagate 500GB Hard Drive Intel Atom 1.86Ghz CPU PS/2 Mouse PS/2 Keyboard HDMI VGA USB 2.0 2 X Ethernet SPDIF
Power cable included.
Price and currency: 40 Delivery: Delivery cost is included Payment method: BT Location: Leeds Advertised elsewhere?: Advertised elsewhere Prefer goods collected?: I have no preference
______________________________________________________ This message is automatically inserted in all classifieds forum threads. By replying to this thread you agree to abide by the trading rules detailed here. Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:
Landline telephone number. Make a call to check out the area code and number are correct, too
Name and address including postcode
Valid e-mail address
DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.