How Moovit improved its app to help people with disabilities ride transit with confidence | Transform

Alexandr Epaneshnikov, a 19-year-old Russian student who is legally blind, recently decided he wanted to be more independent by commuting on his own and relying less on his mom for rides to school. It meant taking a streetcar to a subway to his high school in Moscow, a 30-minute trip that Epaneshnikov assuredly navigates with a cane and Moovit, an urban mobility app optimized for screen readers.

“I am very happy that Moovit is accessible and offers a good amount of information about Moscow public transportation,” says Epaneshnikov, who wants to study information technology at a university. The app has helped him meet friends at cafes and restaurants, and take a train to an unfamiliar city outside Moscow to visit his girlfriend’s family.

“I feel it adds more confidence and independence,” he says.

Launched seven years ago in Israel, Moovit has become the world’s most popular transit-planning and navigation app, with more than 400 million users and service in 2,700 cities across 90 countries. The company is also a leader in inclusive technology, with innovative work that helps people across the disability spectrum use buses, trains, subways, ride-hailing services and other modes of public transit.

In addition to offering a consumer app in 45 languages, Moovit has partnered with Microsoft to provide its multi-modal transit data to developers who use Azure Maps, and a set of mobility-as-a-service solutions to cities, governments and organizations. The partnership will enable the creation of more inclusive, smart cities and more accessible transit apps.

Headshot of Yovav Meydad
Yovav Meydad, Moovit chief growth and marketing officer. (Photo courtesy of Moovit)

“Our mission is to simplify urban mobility and make it accessible, because mobility is really a basic human right,” says Yovav Meydad, Moovit chief growth and marketing officer. “Efficient mobility opens a lot of opportunities for employment, education and a better life, and we want to help all users make their journey as easy as possible.”

For Moovit, the work means not only helping rural residents reach cities for work and school, but also helping people with any disability travel. Of the hundreds of daily emails sent to Moovit, emails from people with low vision are some of the most profound pieces of feedback.

“Sometimes, it’s very emotional,” says Meydad. “They say, ‘Thanks to Moovit, I’m more independent. I can now leave home on my own.’ It’s very, very important for us to make Moovit accessible for everyone.”

The company’s accessibility work began in earnest in 2015, when Meydad and other leading app developers met a focus group of people who are blind or low-vision to see how they used their apps.

“Honestly, I was shocked,” says Meydad, who wrote about the experience twice in Medium. “I saw people trying to use our product, but couldn’t do it efficiently or at all, because screens were not properly labeled or meaningful [for screen readers].” In one case, Moovit’s search button – a major feature to start a trip plan – had the unhelpful audio label of “Button 56.”

Meydad took notes and promised big changes. He worked with Moovit’s team and a developer who is blind to optimize the app for the mobile screen readers TalkBack on Android and VoiceOver on iOS. The team scrutinized every screen for accessibility, added useful labels and condensed intricate data – routes, trip duration, start and end times, entry and exit stops – into clear sentences for audio. They incorporated feedback from users around the world with low vision.

“After one quarter, we released a major version upgrade that completely changed their experience,” says Meydad.

The accessibility work didn’t stop there. To ease public transit for people who use a wheelchair, Moovit asked its “Mooviters” – 550,000 local contributors who help map transit systems for the app – to identify wheelchair-accessible stations in their cities. That enabled the company to add a feature that shows only routes with stations with ramps and elevators.

“This means the entire journey can be fully accessible,” says Meydad.

For users with hand motor disabilities, Moovit redesigned menus and buttons for easier use with one hand, especially on larger phones. For people who are colorblind and use color-coded transit systems, such as “the green line,” Moovit includes the name of the line, instead of just a colored dot or symbol, a space-saving practice in many maps.

The company also ensures no broken or overlapped text when a user needs to magnify the font. It partnered with Be My Eyes, an app that connects sighted volunteers with people who are blind or low-vision. It’s studying how to use a phone’s vibration and flashlight to serve users with hearing loss. And it continually works with people with a disability to improve or customize the app.

Man in wheelchair on a street uses Moovit app on his phone
A Moovit user in a wheelchair uses the app. (Photo courtesy of Moovit)

For Microsoft, working with Moovit, who has developed accessible features such as screen readers and global data on wheelchair-friendly routes, is part of a deep commitment to accessibility and inclusion in its products and services. Developers who use Azure Maps will soon have access to Moovit’s trip planner and rich transit data  to help build innovative, accessible tools.  

“What I love most about Moovit is how they’re empowering other companies to build inclusion into their solutions,” says Megan Lawrence, senior accessibility evangelist at Microsoft. “Our partnership can help people across the disability spectrum use technology to move more freely and independently, a key metric for improving quality of life.”

The clarity of Moovit’s live audio navigation also helps people with an intellectual disability who want extra guidance, such as alerts for when a bus is coming, when to transfer and when to get off. The features are a main reason why Community Living Toronto, an organization that supports people with an intellectual or developmental disability, chose Moovit as the platform for their branded transit app, Discover My Route.

“We tested many apps and Moovit was the full package,” says Angela Bradley, director of resource development and marketing at Community Living Toronto.

“It’s not just an app for riding transit. It’s almost like a coaching tool. It gives people the confidence to take transit and open up their world, which can mean seeing friends, getting a job, going to college or joining a dance class.”

Top photo: Alexandr Epaneshnikov in Moscow. (Photo courtesy of Epaneshnikov)

Go to Original Article
Author: Steve Clarke

Cisco and F5 launch F5 ACI ServiceCenter app

F5 Networks and Cisco have launched the F5 ACI ServiceCenter app, designed to combine L2-3 connectivity with L4-7 application services within the Cisco ACI environment.

According to F5, the app improves visibility and control throughout the network and application stack to help customers accelerate application deployment within flexible, software-defined IT structures.

The collaboration enables users to deploy services such as application layer traffic management. F5 hopes that further integration efforts will let users deploy F5’s portfolio of application and security services within Cisco’s ACI framework.

The app runs natively in Cisco’s APIC, and provides administrators a unified way to manage both L2-3 and L4-7 infrastructure. It also offers ACI-to-BIG-IP visibility, L2-3 stitching capability and L4-7 application services to ACI workloads.

Users can manage multiple BIG-IP devices by adding and logging in to the devices through the application. It also has a visibility tab that enables users to view BIG-IP Network elements like VLANs, VIPs and Nodes and co-relate them with APIC information. Users can also stitch between APIC Logical Devices and BIG-IP Devices using the L2-3 stitching tab.

The companies claim the F5 ServiceCenter app takes advantage of F5’s Automation Toolchain capabilities. This enables customers to deploy, configure and customize application services in ACI environments via declarative APIs.

Cisco’s ACI App Center is a platform that enables Cisco’s technology partners to build ACI applications using the programmable ACI toolkit. The F5 and Cisco app enables mutual customers to use application services across a variety of scenarios.

The new app is available through Cisco’s ACI App Center.

Go to Original Article

For Sale – Gaming PC, i5-4460, Asus Strix GTX970 4GB, EVGA Supanova G2 850w PS

Discussion in ‘Desktop Computer Classifieds‘ started by schillaci0, May 20, 2019.

  1. Hi All,

    Selling my son’s gaming PC.

    CPU:Intel Core i5 4460 3.2Ghz
    CPU Cooler: Zalman CNPS10X Optima
    Operating System: Windows 10 Pro
    Motherboard: Gigabyte Z97P-D3
    RAM: 8GB Corsair 1600mhz Vengeance – 2x4GB
    Hard Drive: Kingston 120GB SSD & Seagate 1TB SSHD
    Graphics card: Asus Strix GeoForce GTX970 4GB OC edition with original box
    PSU: EVGA Supanova G2 Gold 850w with original box
    Case: Corsair Carbide Spec-03
    will include a basic gaming keyboard if sold as whole ​

    May split

    Price and currency: £380
    Delivery: Delivery cost is not included
    Payment method: Bank Transfer
    Location: Bexhill on Sea
    Advertised elsewhere?: Advertised elsewhere
    Prefer goods collected?: I prefer the goods to be collected

    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Last edited: May 20, 2019

  2. Also have an additional 8GB Corsair 1600mhz Vengeance LP – 1x8GB ram stick £25

Share This Page


Go to Original Article

Xbox head Phil Spencer shares approach to PC gaming | Windows Experience Blog

In a blog post on Xbox Wire, Phil Spencer, head of Xbox, shares share steps Microsoft is taking to contribute to the thriving PC gaming ecosystem: introducing Xbox Game Pass designed for PC players and making Xbox Game Studios PC games available in multiple stores (including Microsoft Store on Windows) at their launch.
Xbox Game Pass for PC will give players unlimited access to a curated library of more than 100 high-quality PC games on Windows 10. Microsoft is working with over 75 developers and publishers to bring PC content to the service. Xbox Game Pass for PC members will also receive discounts in the Microsoft Store on Windows of up to 20% on games currently in the library and up to 10% off related game DLC and add-ons.
“We want to bring players together to create a shared player community regardless of where they play, so it’s our intent that new Xbox Game Studios titles include features such as voice and text chat, LFG, friends lists and cross-play across PC and console,” Spencer writes. “On Windows 10 you’ll find this functionality in the Xbox Game Bar, which we’ll continue to evolve and expand.”
Another step Spencer mentioned: enabling full support for native Win32 games to the Microsoft Store on Windows, which will unlock more options for developers and gamers.
Get all the details in Spencer’s post on Xbox Wire.

How to set up Office 365 modern authentication

As Microsoft implements modern authentication across Office 365, administrators need to understand how to use and control the authentication framework to avoid disruptions.

Modern authentication is an updated set of authentication protocols and policies for Office 365 and Azure that allow improved authentication scenarios. Modern authentication is the term Microsoft uses for its version of OAuth 2.0 to utilize multifactor authentication, smart card authentication and other advanced authentication flows that were not possible with basic, or legacy, authentication.

Using modern authentication on Exchange Online

Modern authentication isn’t one protocol or one feature in Microsoft’s cloud-based collaboration platform. Office 365 modern authentication can look and feel different in different Office 365 applications and in different scenarios. To keep it straightforward, this tutorial will focus on modern authentication for Exchange Online, the hosted email platform.

If your organization uses modern authentication, the authentication prompt you’ll see in Outlook 2013 or later will look like notification in the screenshot when you have multifactor authentication turned on. You may also see an authentication prompt for PowerShell sessions or logging in to Outlook on the web.

Outlook authentication prompt
With modern authentication enabled, a user might see this type of authentication prompt in one of the later versions of Outlook.

Modern Authentication for Exchange Online only works with Outlook 2013 and later, supported web browsers, Outlook Mobile, Outlook for Mac 2016, and Exchange ActiveSync in iOS 11 or later. If you use Outlook 2010 or earlier, modern authentication will not work.

To verify Office 365 modern authentication is turned on, enter the following command into a PowerShell session connected to Exchange Online.

Get-OrganizationConfig | Format-Table -Auto Name,OAuth*

As you can see in the screenshot, I have Modern Authentication turned on for my tenant.

Modern authentication status
After connecting to Exchange Online, use a cmdlet to check the status of modern authentication on the Office 365 tenant.

As of the publication of this article, most Office 365 tenants should have modern authentication turned on by default for Exchange Online. A few organizations that have it turned off have most likely taken steps to disable it. One reason for this could be that modern authentication caused problems with some of the Exchange protocols. This is where authentication policies can help.

Working with authentication policies

When Microsoft introduced modern authentication to Exchange Online, it was an all-or-nothing prospect. The recently introduced New-AuthenticationPolicy cmdlet gives administrators the flexibility to build policies to control which protocols in Exchange Online use modern authentication and which do not.

As Microsoft implements modern authentication protocols across Azure and Office 365, administrators need to understand how to use and control these new authentication flows.

You are not restricted to a single authentication policy, so you can create a unique policy to use a different authentication method for different user groups.

Why would you want to create one or more authentication policies? You might have an application that needs Exchange Web Services access to mailboxes, but also only uses basic authentication. Maybe you have a group of users who have an Outlook plugin they need, but it only runs in Outlook 2010.

Authentication policies are not the only way to control how users access your organization’s data in Office 365. Setting an authentication policy that forces some or all your users to use multifactor authentication is effective, but you can get the same result with conditional access policies. However, authentication policies do not require an additional license, while conditional access does.

How to set up an authentication policy

Using the New-AuthenticationPolicy cmdlet is simple. This cmdlet toggles basic authentication for the following Exchange protocols: ActiveSync, Autodiscover, IMAP and POP3, SMTP, MAPI HTTP, RPC over HTTP (Outlook Anywhere), Exchange Web Services, REST API access, offline address book, Reporting Services, Outlook Service and PowerShell.

Run the following PowerShell command to create a default policy:

New-AuthenticationPolicy -Name "Base Company Policy"

To disable basic authentication for each of the listed protocols, add a switch such as -AllowBasicAuthActiveSync $false for each protocol. Set-AuthenticationPolicy can be used to set the allowed protocols after a policy is created.

How to assign authentication policies

You’ll find Get, Set, and New as the verbs for the AuthenticationPolicy cmdlets, but you won’t find Assign. The assignment of authentication policies is handled via other PowerShell cmdlets.

After you create your authentication policies, you can assign them to a single user with the Set-User cmdlet as shown in the sample below:

Set-User -Identity [email protected] -AuthenicationPolicy "Base Company Policy"

As you can surmise, this is not an efficient way to assign a policy to 10,000 users. The PowerShell pipeline is one solution for this problem. Do a Get-User and filter it to the set of users you want, then pipe that to a Set-User to assign the authentication policy.

If you want to assign a default authentication policy to your entire tenant, use the Set-OrganizationConfig cmdlet as shown in the example below:

Set-OrganizationConfig -DefaultAuthenticationPolicy "Base Company Policy"

This is how you assign authentication policies. Remembering they are assigned with Set-User or Set-OrganizationConfig will save you a bit of frustration.

As of this article’s publication, there is no reporting in Office 365 that tells you which or how many clients use basic authentication. If someone in your organization is using a client that requires basic authentication, the only way you will know it is after you disable basic authentication. Be careful when assigning policies and be ready to undo them if you find a number of users get locked out of their email.

Go to Original Article

How do I avoid Exchange disk space issues?

Why is Exchange disk space always running low?  This is a common issue that vexes many administrators.

Exchange Server writes many log files and stores its database on the C drive by default. The platform needs to be sized properly to keep Exchange disk space issues from bogging down the system. If the default database is used for user mailboxes, which are stored in the default location upon installation, and the database is not backed up, then the drive will fill up with log files quickly.

When Exchange disk space runs low and goes beyond certain configured thresholds, such as available disk space, mail flow can stop or the database will go into a disconnected state, leaving all users in a disconnected state in Outlook. In short, no one will be able to send or receive email.

In Exchange Server 2010, a 200 GB drive might be sufficient; however, Exchange Server 2013 and newer versions generate many more log files such as performance logs and event trace log files. Another space-eating culprit is the transport queue database and the logs it generates.

In my experience, a 300 GB drive for Exchange Server 2013 is just not enough if you don’t move your transport queue database and logs. A 600 GB drive is a bit better, but will most likely require some hands-on management to avoid space issues. It is best to follow the recommendations of Microsoft by using the Exchange Server role requirements calculator to be sure.

One way to free up space is to use a PowerShell script I wrote that removes the log files in a number of locations. I have reclaimed more than 40 GB of space.

Last, now that drive space is not as expensive, be sure to err on the side of caution and get the maximum possible for Exchange. Spend the money now and avoid problems in the long run.

Go to Original Article

Take your analog data digital for a faster, more efficient way to work

We live in an increasingly digital world. We’re used to having almost all the data we need at our fingertips with the click of a button or a tap of the screen. But frequently information still gets relayed to us in ways that aren’t digital—such as paper receipts, handouts at conferences, or notes from a whiteboard at a meeting. That’s why, at Microsoft, we’ve been developing ways for you to easily move your analog data into a digital format to help you be more productive.

Quickly capture paper-based data to unlock new insights

To help you bring analog data into Excel, we developed the Insert Data from Picture feature, which became available for Android this past March, and as of today, is now generally available for iOS with the iPhone Excel app. Also, starting today, the feature will support 21 languages on both iOS and Android. With this feature, you can easily grab any data in a table format—financial spreadsheets, work schedules, task lists, timetables, and so on—and convert it to a digital format in Excel, so you can arrange and analyze that information quickly and in context to make better decisions on the fly.

The Insert Data from Picture feature works by combining advanced optical character recognition (OCR) technology, layout understanding techniques, and machine learning models to transform paper-based information into digital data. We’ve used these and other technologies across Office apps, including the PDF Reflow feature for Word and Office Lens and in the Seeing AI app.

Read more about the Insert Data from Picture feature in this article.

Animated screenshot of Insert Data from Picture in Excel.

Insert Data from Picture is now available in 21 Latin languages. 

Convert handwritten notes to digital text with ease

Let’s look at how we’re helping users go from analog to digital. Before, you had to copy whiteboard notes by hand at the end of meetings. Later, you could take photos of whiteboards with your phone. Either way, you still had to type in the notes later. Now, with ink grab you can take a picture of notes scribbled on a physical whiteboard, convert them to digital ink in the Microsoft Whiteboard app, and continue brainstorming with others on the digital canvas. We also built handwriting recognition into tools like OneNote, so you can convert notes to text quickly to share in messages, documents, or presentations.

Animated screenshot of an ink grab in Microsoft Whiteboard.

We’re also exploring more advanced ways to help you convert analog data to digital information that you can use across your Office apps. For example, we envision that you’ll be able to take a picture of handwritten notes on paper and import the text directly. Other areas we’re exploring include scanning a picture, PDF annotation, and signing.

Analyzing the physical world

In addition to importing data from a physical piece of paper, there are many other ways we see customers leveraging Excel to help them analyze data from the real world. For example, with the Hacking STEM program, teachers use Excel to help students explore and analyze real-world phenomena. Leveraging the Excel Data Streamer add-in, students can easily move data from the physical world in and out of Excel—introducing them to data science and the internet of things (IoT)for example, using pressure sensors to measure brain impact during a concussion.

Animated screenshot of a brain impact workbook using Data Streamer in Excel

Brain impact workbook using Data Streamer in Excel.

At Microsoft, we’re dedicated to finding ways to build artificial intelligence (AI) algorithms and machine learning models into user apps to help you be more productive and stay focused on critical deliverables instead of mundane tasks.

Download the Excel iPhone app today. To learn more about Insert Data from Picture, read this article and watch this Inside Excel episode.

Availability note: You can find the list of all the languages Insert Data from Picture supports in this article.

Go to Original Article
Author: Microsoft News Center

System administrator resources you’ll actually use

Reading official documentation from vendors about products can feel bland and tedious, but a variety of nontraditional system administrator resources can spice up the learning process.

Alternative resources come in a multitude of forms, including podcasts, social media feeds, YouTube channels and messaging boards. With the quantity of information available, admins might find it challenging to know where to begin to find these system administrator resources and keep up with vendor offerings.

SearchWindowsServer advisory board members introduced their favorite resources and discussed how to find valuable sources of information.

Technology forces admins to change the way they learn

Reda Chouffani: Long gone are the days when admins got excited about buying an IT book from a store front or reading databases containing hundreds of pages. Now IT administrators — covering everything from database administration to supporting a client’s IT systems — can readily find the resources that work best for them or find people willing to help.

I use both Microsoft Teams and Slack to learn or find a resolution on an issue that I can’t locate through an internet search. When learning what’s the latest and greatest, I use several news outlets and conference coverage. The trick with conferences is to invest time post-conference on additional content. Microsoft publishes most of the sessions’ presentations from conferences such as Ignite on their website.

Another option is to look at Slack communities for specific topics. There are also a number of popular tech Twitter feeds from IT folks like Scott Hanselman and Leo LaPorte. On the YouTube channel Geek’s Lesson, there is a lot of valuable video content. For learning a new skill, I personally use Pluralsight, Coursera and Microsoft’s virtual academy as my three go-to sites.

Find the system administrator resources that work for you

Adam Fowler: My primary source of news is on Twitter, but it takes a fair bit of effort to find and curate what you’re after. It’s often not the company-run accounts either, but individuals who share the tidbits of information they find. Many accounts have automated tweets, too, but there’s a big and overall friendly tech community that spends a lot of time on Twitter. Asking for help can fall on deaf ears, however, unless you put the time into talking to others and helping out, too. I’ve had plenty of issues resolved on Twitter by having the right eyes on my account compared to any other path I’ve taken, including talking to vendors directly.

For another interactive experience, I participate in a Slack channel called Windows Admins, which can be good for helping out others and asking your own questions. It’s not for amateurs though, which is why it’s important to find communities that fit what you’re after.

Beyond that, podcasts are good if you can find someone who you like listening to and covers the topics you’re interested in. They might have vendor sponsorship, but they are passionate about the topics and generally knows what they’re talking about. Podcasts are a good way to find out about new things or dive into areas you want to hear more about. You get the added bonus of being able to learn while driving if you commute to work.

Blogs are a bit harder unless they’re a dedicated news feed to a particular topic — you’re better off Googling what you’re after and discovering one for the exact thing you want to know about, but it might also be worth creating your own RSS feed of the blogs that cover the topics that interest you.

Understand the motivation of the resource authors

Brian Kirsch: One of the first channels is always company reps, but at the end of the day, they want additional or continued sales. That doesn’t mean this is a bad avenue, but it does have a clear and alternative purpose other than simple education.

People often use social media — which includes Slack, Facebook and Twitter — as a news source. These great tools let you know what has been released, what is coming and critical details that you might need to know. Although they are good at giving you alerts and even answering questions, they are not the ideal learning platform. They often provide links to additional materials, but they lack in overall substance by themselves.

Blogs, feature articles and other more in-depth materials often are the most ideal platforms because they provide enough materials for many to get a deeper understanding of what it’s trying to deliver. Now, blogs can be hot and cold depending on the publisher. Featured pieces tend be a bit more regular.

How do you know when something is new and worthy of your attention? For me, Twitter with the character limit helps to provide a snapshot of the material in question and, from there, you can make the decision to investigate further or pass on it. You don’t have to be an expert at Twitter or have thousands of followers. Use it as a news collector to help you filter out what you need and don’t.

Some of my favorites are the vExpert and VMware channels for both Slack and Twitter. I tend to look at more reading materials over video channels because I can go through the materials faster than a video. That being said, Twitter accounts from the vendors and engineer teams are critical, such as specific accounts like @vmwarensx, @vmwarevsan and @vmwarecloudonaws. Find the main channels and then look for the product-specific channels that you own, these can give you the ideal news and informational feeds. I don’t personally follow blogs. Even though they have ideal information, it’s often not at a consistent level for most topics.

Go to Original Article

IT resilience requires simpler tools, survey says

A recent global survey of IT professionals found nearly all of them experienced a successful malicious attack in the past year, and most of the attacks led to unrecoverable data. Overwhelmingly, the IT pros said they want to converge backup and disaster recovery tools to reduce cost and complexity.

The State of IT Resilience survey consisted of 500 globally distributed respondents. IDC conducted the survey and presented the results at ZertoCon 2019 last week.

According to the survey, 89% of respondents said they experienced a successful malicious attack in the past 12 months, and 56% said these attacks led to some unrecoverable data. Perhaps IT complexity is part of the problem. The study also found 93.4% of respondents want to converge data protection tools.

Sixty percent of the survey’s respondents reside in North America, with 20% each in the Europe, Middle East and Africa and Asia-Pacific regions. Respondents were IT professionals from a range of verticals that included manufacturing, professional services and financial.

IDC research director Phil Goodwin suggested backup, disaster recovery (DR) and business continuity are simply different ways of achieving IT resilience. He said they were all similar processes that, at their core, create data copies you can use to restore from when something bad happens to the originals.

“When you think about it, backup is just a mechanism of replicating data,” Goodwin said during a ZertoCon keynote. “We can’t have separate environments and tests. They need to be seamlessly integrated.”

Historically, organizations have used separate products to handle backup, DR and data archiving. This approach also creates silos for those functions. Naveen Chhabra, senior analyst at Forrester Research, said this separation isn’t strictly necessary, but has been the result of how vendors have built and categorized their offerings over the past few decades.

Data protection vendors have moved to converge secondary storage functions in recent years through single platforms designed to protect and manage data in on-premises appliances and public clouds.

Photo of Phil Goodwin's keynote at ZertoCon 2019
IDC research director Phil Goodwin spoke at ZertoCon 2019.

“As a direction, this convergence of backup, archival and DR sounds good. [Their separation] had been essential not because of purpose, but because of how the industry solutions were developed and aligned,” Chhabra said. “The big challenge now would be changing the old habits and processes that organizations have developed for decades.”

When you think about it, backup is just a mechanism of replicating data. We can’t have separate environments and tests. They need to be seamlessly integrated.
Phil GoodwinResearch director at IDC

Goodwin said while it’s impossible to prevent all data loss from cyberattacks, it’s not impossible to build systems to restore that data after an attack occurs. Yet, organizations are still losing data.

According to the survey, these are the top reasons leading to unrecoverable data:

  • 59.8% of respondents said data loss occurred in the gap between snapshots.
  • 53% said their backup or recovery system failed.
  • 48% said it was human error.
  • 41.6% said tapes with backup data were lost or damaged.

“Other than human error, all of these are totally avoidable causes,” Goodwin said.

The rest, he concluded, could be solved with the right technology and training. A combination of finding or building systems with shorter recovery point objectives, frequently testing and refining the recovery system, and moving off tape for backup would significantly cut down on unrecoverable data.

Goodwin said the survey results showed many organizations are keenly aware of their shortcomings. More than half of respondents self-assessed themselves as below average when it came to business resilience — that is, the ability for their organization, and not just IT, to weather a disruptive event.

“Overall, within the industry, there’s a very low level of resiliency,” Goodwin said in an offstage interview. “Almost a quarter of organizations rate themselves as ad hoc when it comes to DR and business resilience. By that, I mean they have no plan, no people [and] no infrastructure in place.”

The full results of the 2019 State of IT Resilience survey will be released later this year. You can find the 2018 resiliency report here.

Go to Original Article

For Sale – Intel NUC DN2820FYKH with 300Gb Drive, 4Gb Ram and Licenced Windows 10

Discussion in ‘Desktop Computer Classifieds‘ started by lscolman, Apr 26, 2019.

  1. lscolman

    Well-known Member

    Jul 31, 2003
    Products Owned:
    Products Wanted:
    Trophy Points:
    Tyne & Wear


    For sale an Intel NUC. Cracking machine, that can be mounted on a wall mount or the back of a monitor. Supplied with original packaging and all original supplied accessories.

    Spec’s are here

    Intel® NUC Kit DN2820FYKH Product Specifications

    Cheers, Lee

    Price and currency: 110
    Delivery: Delivery cost is not included
    Payment method: Bank Transfer, Paypal or Cash on Collection
    Location: Sunderland, North East England
    Advertised elsewhere?: Advertised elsewhere
    Prefer goods collected?: I prefer the goods to be collected

    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

  2. lscolman

    Well-known Member

    Jul 31, 2003
    Products Owned:
    Products Wanted:
    Trophy Points:
    Tyne & Wear

Share This Page


Go to Original Article