National Bank of Canada reinvents workplace, empowers employees with Microsoft 365 – Microsoft 365 Blog

Logo of the National Bank of Canada.


Profile picture of Ron Markezich.National Bank of Canada—one of Canada’s leading integrated financial groups—set out to increase collaboration, speed up decision-making, and improve business results by reinventing their way of working. National Bank redesigned its headquarters, introducing open floor plans with no offices. All employees across business units can work together to deliver on strategic objectives, including the bank’s executives. But they didn’t just transform the physical environment, they embarked on a journey of digital transformation empowering their employees to drive innovation with Microsoft 365 technologies.

The way National Bank encouraged all 23,000 employees to adopt these transformative digital tools is a fascinating example of innovative “low touch” change management. It was also confirmation of how empowering Microsoft cloud technologies really are. When National Bank began its cloud journey with Microsoft 365, a survey revealed most people were content with the existing workplace. Despite their satisfaction with the status quo, employees embraced the new tools because they valued them, not because they were required.

Denis Rousseau, Modern Workplace program leader at National Bank, tells the story:

We had a vision to transform how people work. By giving employees the highly secure tools from Microsoft 365, they have access to any information on any device, from anywhere, so they can work the way they want. To encourage adoption, we treated employees the way we treat our customers, using internal marketing, peer influencers, self-learning, and corporate social media to motivate everyone to download Office apps from our portal.

With no formal directive, in just nine months 80 percent of the company had adopted new tools and were changing how they collaborate. And it only took six months for more than half of our workforce to adopt Microsoft Teams. As we transition into a cloud-first, mobile-first environment, we proved that people can work productively from anywhere with Microsoft 365.

Continuing this digital workplace transformation, National Bank plans to incorporate intelligent search and artificial intelligence (AI) services next. I’m excited to see how National Bank continues to reinvent productivity and agility in the banking industry.

Go to Original Article
Author: Steve Clarke

VMware NSX-T gets revamped UI, more automation

Since the release of NSX-T in 2016, VMware has been gradually bolstering the virtual networking and security product to make it the company’s premier software-based infrastructure for applications running on hybrid and multi-cloud environments. With the latest release, version 2.4, NSX-T gets a simplified user interface and features for automating more networking tasks.

In the newest iteration of NSX-T, VMware has rebuilt its management interface using HTML5, making the product easier to use, according to the vendor. For example, the new console provides direction on completing network configuration tasks faster.

Other improvements in VMware NSX-T 2.4, released this week, include Ansible modules for automating repetitive tasks and a new API model that takes a declarative approach toward automating network configuration. In essence, engineers specify the end state of the network infrastructure using JSON, and NSX-T makes it happen. JSON is a text-based, human-readable data interchange format.

For the cloud networks of enterprises and service providers, VMware has added support of IPv6 and the Data Plane Development Kit, which is a programmable forwarding module and API for virtual switching. The vendor also said it has added enhancements that let users manage “tens of thousands” of unique virtual networks per NSX-T instance.

The future for VMware NSX-T

Since NSX-T’s introduction, VMware has dedicated ever-increasing resources to the product, with the intention of convincing users of NSX-V in the data center to migrate to NSX-T for the cloud, said Brad Casemore, an analyst at IDC. VMware customers use NSX-V to provide networking and security to applications running on VMware’s vSphere server virtualization platform.

“It makes sense to have a network virtualization platform that can support traditional [data centers], as well as cloud-native application environments, especially within the context of hybrid IT and multi-cloud,” Casemore said.

VMware customers using NSX-V today are also running containerized applications in cloud environments that are not attached to VMware products, he said. The vendor wants those customers to add NSX-T for cloud environments.

“VMware recognizes that the larger market, as well as its own customer base, will be running applications across heterogeneous infrastructure and on multiple clouds, with containers and microservices setting the agenda for the next wave of growth,” Casemore said.

The market for private and public cloud infrastructure products, which include servers, storage and Ethernet switches, grew 47.2% year over year in the third quarter of 2018 to $16.8 billion, according to IDC. The research firm expects total spending on cloud IT infrastructure in 2018 to reach $65.2 billion, an increase of 37.2% over 2017.

NSX-T 2.4
The HTML5 user interface for NSX-T 2.4

VMware NSX-T’s evolution

In general, NSX-T is a software-defined networking product for kernel-based virtual machine, Red Hat Enterprise Linux or Ubuntu. Over the last three years, VMware has been closing the feature gap between NSX-T and NSX-V.

Initially, NSX-T had a distributed firewall, microsegmentation, and logical routing and switching for virtual machines. After the release of 2.1 last year, NSX-T had network virtualization, microsegmentation for containers, and support for Layer 4 and Layer 7 load balancing. VMware had also added integration with the Pivotal Container Service (PKS).

The PKS integration lets NSX-T users configure container-based applications with network virtualization from Layers 2 through 7. Companies do the actual configuration from Pivotal Cloud Foundry, which large enterprises in banking, the auto industry and retail use to manage container-based applications in a cloud platform.

NSX-T works in conjunction with NSX Cloud, which provides a single management console for delivering networking and security to applications running on multiple private and public clouds.

Go to Original Article
Author:

Announcing new Azure Security Center capabilities at RSA 2019

This is an exciting week for us at Microsoft. At RSA Conference 2019, we are announcing new and exciting capabilities in Azure and Microsoft 365. With this blog post, we wanted to share with you what we have been working on for Azure Security Center. Azure Security Center now leverages machine learning to reduce the attack surface of internet facing virtual machines. Its adaptive application controls have been extended to Linux and on-premises servers, and extends the network map support to peered virtual network (VNet) configurations.

Leveraging machine learning to reduce attack surface

One of the biggest attack surfaces for workloads running in the public cloud are connections to and from the public Internet. Our customers find it hard to know which Network Security Group (NSG) rules should be in place to make sure that Azure workloads are only available to required source ranges. Security Center can now learn the network traffic and connectivity patterns of your Azure workload and provide you with NSG rule recommendations for your internet facing virtual machines. This helps you better configure your network access policies and limit your exposure to attacks.

Azure Security Center uses machine learning to fully automate this process, including an automated enforcement mechanism, enabling its customers to better protect their internet facing virtual machines with only a few clicks. These recommendations also use Microsoft’s extensive threat intelligence reports to make sure that known bad actors are blocked.

Extending adaptive application controls

Adaptive application control is an intelligent, automated end-to-end application whitelisting solution from Azure Security Center. It helps you control which applications can run on your VMs located in Azure, which, among other benefits, helps harden your VMs against malware. Security Center uses machine learning to analyze the applications running on your VMs and helps you apply the specific whitelisting rules using this intelligence.

We are extending adaptive application controls in Azure Security Center to include Linux VMs and servers/VMs external to Azure (Windows and Linux) in audit mode. This means that Azure Security Center will identify applications running on your servers which are not in compliance with the Azure Security Center generated whitelisting rules and will audit those violations. This will enable you to  detect threats that might otherwise be missed by antimalware solutions; to comply with your organization’s security policy that dictates the use of only licensed software and to audit unwanted software that is being used in your environment.

Network map support for VNet peering

Azure Security Center’s network map has added support for virtual network peering, a configuration in which traffic flows between Azure Virtual Networks through the Microsoft backbone, as if they were virtual machines in the same virtual network, through private IP addresses only. The support includes displaying allowed traffic flows between peered VNets and peering related information on Security Center’s network map.

With these additions, Azure Security Center strengthens its role as the unified security management and advanced threat protection solution for your hybrid cloud workloads. We encourage you to take advantage of these new capabilities for all your Internet-exposed Azure resources. If you have not started using Azure Security Center in your Azure subscription, get started today.

Go to Original Article
Author: Steve Clarke

Announcing new Azure Security Center capabilities at RSA 2019

This is an exciting week for us at Microsoft. At RSA Conference 2019, we are announcing new and exciting capabilities in Azure and Microsoft 365. With this blog post, we wanted to share with you what we have been working on for Azure Security Center. Azure Security Center now leverages machine learning to reduce the attack surface of internet facing virtual machines. Its adaptive application controls have been extended to Linux and on-premises servers, and extends the network map support to peered virtual network (VNet) configurations.

Leveraging machine learning to reduce attack surface

One of the biggest attack surfaces for workloads running in the public cloud are connections to and from the public Internet. Our customers find it hard to know which Network Security Group (NSG) rules should be in place to make sure that Azure workloads are only available to required source ranges. Security Center can now learn the network traffic and connectivity patterns of your Azure workload and provide you with NSG rule recommendations for your internet facing virtual machines. This helps you better configure your network access policies and limit your exposure to attacks.

Azure Security Center uses machine learning to fully automate this process, including an automated enforcement mechanism, enabling its customers to better protect their internet facing virtual machines with only a few clicks. These recommendations also use Microsoft’s extensive threat intelligence reports to make sure that known bad actors are blocked.

Extending adaptive application controls

Adaptive application control is an intelligent, automated end-to-end application whitelisting solution from Azure Security Center. It helps you control which applications can run on your VMs located in Azure, which, among other benefits, helps harden your VMs against malware. Security Center uses machine learning to analyze the applications running on your VMs and helps you apply the specific whitelisting rules using this intelligence.

We are extending adaptive application controls in Azure Security Center to include Linux VMs and servers/VMs external to Azure (Windows and Linux) in audit mode. This means that Azure Security Center will identify applications running on your servers which are not in compliance with the Azure Security Center generated whitelisting rules and will audit those violations. This will enable you to  detect threats that might otherwise be missed by antimalware solutions; to comply with your organization’s security policy that dictates the use of only licensed software and to audit unwanted software that is being used in your environment.

Network map support for VNet peering

Azure Security Center’s network map has added support for virtual network peering, a configuration in which traffic flows between Azure Virtual Networks through the Microsoft backbone, as if they were virtual machines in the same virtual network, through private IP addresses only. The support includes displaying allowed traffic flows between peered VNets and peering related information on Security Center’s network map.

With these additions, Azure Security Center strengthens its role as the unified security management and advanced threat protection solution for your hybrid cloud workloads. We encourage you to take advantage of these new capabilities for all your Internet-exposed Azure resources. If you have not started using Azure Security Center in your Azure subscription, get started today.

Go to Original Article
Author: Steve Clarke

Windows 10 Tip: Look up definitions for words in web pages, books and PDFs | Windows Experience Blog

Did you know you can look up definitions while you’re reading web pages, books and PDFs, thanks to the Windows 10 October 2018 Update?
Microsoft Edge is the only browser with Microsoft Learning Tools built-in that help improve reading and focus.
While you’re in Reading view on Microsoft Edge, you can look up definitions for key words, even when you are offline. Simply select a single word to see the definition appear above your selection.
Check it out in action:

You can also choose to have a word read aloud so you can hear the correct pronunciation or expand more details from the definition. You can also toggle to choose whether definitions appear and which types of content they work in under the “General” tab of the Microsoft Edge settings menu.
If you like this, check out more Windows 10 Tips.

For Sale – 27″ 5K iMac 2017

I have a 2017 27″ 5K for sale which was bought from the Apple refurb store on 11/12/18.

3.8Ghz i5
16GB RAM
512GB SSD
8GB Radeon Pro 580

Change of circumstances means I’m having to go back to Windows.
Absolute mint, as new condition with the remaining Apple Care until Dec 2019 and tech support until 10/03/19.

I would prefer collection but if you need it posting I will do so on the proviso it is at your own risk and cost.

IMG_0106.JPG IMG_0107.JPG IMG_0109.JPG IMG_0110.JPG

Price and currency: £1750
Delivery: Delivery cost is not included
Payment method: Cash on collection or BT
Location: Chorley, Lancs
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Go to Original Article
Author:

New to Microsoft 365 in February—advancing security and empowering a modern workplace – Microsoft 365 Blog

This month, we released several new capabilities to help you stay ahead of threats, create a more productive workplace, and keep you in the flow of work.

Here’s a look at what’s new in February.

Stay ahead of threats and collaborate securely

New features and services help you better manage a complex threat landscape and communicate and collaborate securely.

Extend your security team’s capability with Microsoft Threat Experts—Our new managed threat-hunting service, called Microsoft Threat Experts, helps you proactively hunt and prioritize threats to get the most out of Windows Defender Advanced Threat Protection (ATP). The service provides access to world-class experts who can help you work through tough investigation challenges with the new Ask a Threat Expert button. Go to your Windows Defender ATP settings to apply for the public preview.

Image of a PC showing the Windows Defender Security Center.

Empower healthcare professionals to securely communicate and collaborate—This month, we announced new capabilities in Microsoft Teams that enable secure messaging and collaboration workflows for healthcare organizations. Priority notifications enable clinicians to focus on urgent messages to manage patient care. In addition, the ability to integrate FHIR-enabled electronic health records (EHR) data with Teams enables clinicians to securely access patient records, chat with other team members, and even start a video meeting—all in one hub for teamwork. These capabilities are now in private preview; visit the Microsoft 365 and health page and partner site to learn more about how Teams and Microsoft 365 can empower your healthcare teams.

Image of three phones showing a clinician getting a message in Teams.

Move confidently to the modern desktop and cloud with Desktop App Assure and Microsoft FastTrack—Our new service from Microsoft FastTrack, Desktop App Assure, provides app compatibility services for Windows 10 and Office 365 ProPlus. FastTrack also now offers guidance on how to configure Exchange Online Protection, Office 365 Advanced Threat Protection, Office 365 Message Encryption, and Data Loss Prevention policies. These services are now globally available to eligible customers with more than 150 seats at no additional cost. Sign in to Microsoft FastTrack and complete a Request for Assistance form to get started.

Get security alerts for your Microsoft account on your phone—Receive security notifications for important events on your personal Microsoft account now via the Microsoft Authenticator app. When you receive a push notification, you can quickly view your account activity and take actions to protect your account if needed. Microsoft Authenticator can also be used to add two-step verification to your account for added security. To get started, download the Microsoft Authenticator app and add your personal account.

Image of two phones showing a password being changed in Microsoft Authenticator.

Manage tasks and capture data with ease

New features expand capabilities to easily access all your apps and files, capture and convert data, and add context to your tasks.

Jump into your work quickly with the new Office app for Windows 10—The new, free Office app provides a simple experience to get started with and get the most out of Office. Anyone who signs in with a work, school, or personal Microsoft Account can use it to quickly access all the apps available to them and their most relevant files and documents. Organizations can also take advantage of the ability to integrate third-party apps, enable users to search for documents and people across the organization, and customize the experience with their own branding. The Office app can be downloaded from the Microsoft Store, requires a current version of Windows 10, and works with any Office 365 subscription, Office 2019, Office 2016, and Office.

Image of a tablet showing new Office apps for Windows 10.

Add data to Excel directly from a photo—Using the Excel app, you can take a picture of a printed data table on your Android device and automatically convert the picture into a fully editable table in Excel. This new image recognition functionality eliminates the need for you to manually enter hardcopy data. This capability is starting to roll out for the Excel Android app with iOS support coming soon.

Animated image of an Android phone snapping a picture and gathering Excel data from the image.

Quickly add photos and files to tasks in Microsoft To-Do—Attach files and photos to help make tasks more actionable with added context. This highly requested feature is now available on all platforms and syncs across your devices, so you can take your new file-attached tasks on the go.

Image of a phone using Microsoft To-Do to schedule prep time for a presentation.

Other updates

  • New one-time passcodes (OTP) from Azure Active Directory (Azure AD) make sharing and collaboration seamless for any user with any account.
  • Azure AD now supports automated user provisioning from Workday, enabling fast and efficient identity creation, so employees can access their Microsoft 365 apps and all other critical resources on day one.
  • Starting this month, the Teams desktop app will be installed along with the rest of the Office 365 ProPlus apps for all new installs.
  • Updates to the SharePoint Migration Tool make it even easier to bring your information to the cloud, with improvements like the ability to migrate web parts, pages, and site navigation.

Go to Original Article
Author: Steve Clarke

LogMeIn products Jive and GoToMeeting to be unified

LogMeIn plans to integrate Jive’s cloud telephony with GoToMeeting’s cloud video conferencing and collaboration. The move to unify the LogMeIn products comes as the vendor chases rivals Zoom and Cisco Webex, which already offer integrated portfolios.

The combined product would be among the most significant milestones in the company’s three-year campaign to establish itself in the unified communications and collaboration (UCC) market. LogMeIn plans to release more details on the new offering at the Enterprise Connect conference in Orlando, Fla., next month.

LogMeIn acquired Jive Communications, a cloud PBX vendor targeting the small and midsize markets, for $357 million in February, after buying the GoToMeeting suite from Citrix in 2016. Before those purchases, the company primarily made remote access software.

LogMeIn sold 80,000 seats on Jive and GoToMeeting after bundling pricing for the two platforms in the second half of 2018, LogMeIn CEO Bill Wagner told investors earlier this month, according to a transcript of LogMeIn’s fourth-quarter earnings call by the website Seeking Alpha. The bundling was “a precursor of our integrated product we’ll release here in 2019,” he said.

A LogMeIn representative said the company would unveil “a new UCC brand” at Enterprise Connect, but the company declined to comment further, saying it had not finalized the upcoming announcement.

LogMeIn products need better alignment

LogMeIn’s recent acquisitions have left the company with a set of collaboration products that are related to — but not integrated with — one another. In addition to Jive and GoToMeeting, the vendor also owns GoToWebinar for webcasting, OpenVoice for conference calls, and Join.me for small business web conferencing.

While LogMeIn has been figuring out how to handle this portfolio, smaller, more nimble vendors like Zoom and Slack have taken big chunks of the market, said Zeus Kerravala, founder and principal analyst at ZK Research in Westminster, Mass.

GoToMeeting’s market share has been hit particularly hard by the rise of Zoom, with anecdotal evidence suggesting that many customers have opted to switch to Zoom as their GoToMeeting licenses have expired, Kerravala said.

“At a bare minimum, if they are going to rebound and reemerge as a major collaboration vendor, they have got to bring [these products] together,” Kerravala said. “It seems like they’ve just been collecting collaboration stuff without much thought towards the long-term plans.”

From a technology standpoint, users currently get no benefit from using Jive and GoToMeeting together. Integrating the LogMeIn products so that users could seamlessly switch between the two of them could help boost sales of both by making the combination more appealing.

“They have a large install base on the different products that they have,” said Irwin Lazar, analyst at Nemertes Research. “The challenge for them is to build a cohesive platform that can compete with the likes of 8×8, RingCentral, or any one of a number of BroadSoft-based services out there.”

LogMeIn is trying to fight back from a beating over several months on Wall Street. The company’s share value dropped 16.4% after announcing a global leadership restructuring earlier this month and plunged 23% on the day they released third-quarter financial forecasts that fell short of analyst predictions, according to Seeking Alpha.

Go to Original Article
Author:

Wanted – Apple iMac Pro 27″ 1TB, 3.20GHz, 32GB, Pro Vega 56, Applecare

Discussion in ‘Desktop Computer Classifieds‘ started by smallangryboy, Feb 22, 2019.

    1. smallangryboy

      Active Member

      Joined:
      May 5, 2003
      Messages:
      2,003
      Products Owned:
      0
      Products Wanted:
      0
      Trophy Points:
      51
      Ratings:
      +82

      I’m hunting for one for my other half and her photography business. Unlikely people will be moving these on just yet but thought I’d see.

      Cheers

      Location: Thame | Oxfordshire

      ______________________________________________________
      This message is automatically inserted in all classifieds forum threads.
      By replying to this thread you agree to abide by the trading rules detailed here.
      Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

      • Landline telephone number. Make a call to check out the area code and number are correct, too
      • Name and address including postcode
      • Valid e-mail address

      DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Share This Page

    Loading…

Go to Original Article
Author: