For Sale – Massive clearout, monitors, cisco, hdd’s, odds and sods


i decided to clean up the computer room today and am selling off lots of old hdd’s i have lieing around, memory cards, odds and sods from various old auctions i won – previous adverts on here. willing to sell as a take all if someone wants it all. in the process of decorating the house so missus wants it all GONE! Prices include shipping unless stated. bank transfer preffered or paypal gift or cash in person.


i have upgraded to a 4K 32″ now so this needs to go. it is boxed but some of the inner polestyrene packaging i have repaired so not sure i’d trust shipping it but seems sturdy enough! buyer would need to take the risk. Shipping is NOT included, buyer to organise or pay me to ship.

Its a ACER B326 HUL 1440p monitor, no dead pixels or ghosting to my eyes. good overall condition. lovely in gaming as well as office work etc. over 2 yrs old so no warranty. few marks on stand. overall very nice. £150

Ilyama prolite B1780SD-1 17″ white monitor missing the base screws, brand new in its box. £30


I also have amassed a lot of CISCO gear that has been gained through auctions in the past – i did advertise this here some time ago. i want it all to go and collection is a must. all power on tested but cannot guarantee that it does. i have added it to a google docs. Take all. unsure on value as a lot is older tech now. All units show usage signs and no internal maintenance has been done. Sold as seen. looking for offers around £6-700 unless thats way off. open to offers.

Cisco and HP networking equipment

10 x CAT6 5MTR network cables £3.50 each


Intel core i5 7400 retail £140
intel i7 930 £25
intel i7 960 £30
3 x Xeon 5670 £25 each
1 x xeon 5650 £20
4 x xeon 5345 £5 each

CPU bundle sale:
all these cpus for £40
pentium G2030
pent E5500
pent g645
pent g840
3 x G6950
1 x G6960


Palit RTX 2080 jetstream edition refurb sealed in its boxed 6 mth warranty left £600

10 x HD 5450 1GB low profile cards £15 each

HDDs – all have been erased and error tested and bad sector ones have been destroyed:

HGST 4 TB refurb drive sealed anti static bag £80

western digital 2 TB SAS drive WD2001FYYG sealed anti bag £50
as above but 1 tb verion £30
9 x Toshiba 900 GB 2.5″ sas drives in caddies £80 each

2TB firecuda SSHD drive £60

3.5″ 500 gb seagate, £10

The following are all 2.5″ laptop hard drives:

seagate 1TB mobile hdd ST1000LM035 £25
WD blue 1TB WD10SPCX £25
Toshiba 1 TB MQ01ABD100 £25

Msata SSD drives:

5 x transcend TS128GMA340 128 gb drives £25 each
lite on 128 gb ssd LMT-128M6M £25
2 x samsung MPC2560 256 gb £30 each

Macbook air ssd:

1 x toshiba 256GB from a macbook air 2010 THNSNC256GMDJ £75
1 x toshiba 64 GB ssd for macbook – not sure what THNSNC064GMDJ £20

Server ram brand new:

1 x 8gb HP branded PC3L 10600 £75
2 x 4 GB HP PC3-10600R-9 kit £40 each
1 x 8GB PC4-2133P kingston server ram £60

2 x HP 4GB micro SDHC flash media kits £5 for both

Desktop/laptop Ram:
2gb samsung pc3 12800 sodimm. £4
2gb Elpida pc3 10600s sodimm £4
2 x 2 gb hynix pc3 10600 £4 each
2 x 4gb corsair vengeance 1600 mhz ddr3 sodimm £40
1gb kingston ddr2 667 ram £2
2 x 1gb samsung pc2 5300 £4
2 x 512mg ddr2 667 £2

2 x 8gb (16gb set) corsair vengeance 1866 mhz ram £65
4 x 2gb DDR2 800 low profile ram for AMD based systems only £10

Laptop docking stations, no power supplies and untested all at £15 inc each:

Lenovo thinkpad 4338 part number 76Y5728
2 x Lenovo thinkpad 4337 p/n 45N5887
Lenovo thinkpad basic dock 40A0 P/N SD20A06044

3 x Targus universal monitor stands £15 each
Extron SW2 USB switcher brand new £50

6 x Port designs port alto ipad 2/3 premium cases brand new £15 each
4 x Microsoft surface pro 3 docks new £70 each

Laptop screens:

i have a large number of LCD replacement laptop screens from AOU, Samsung and Chimei. 12.5 to 15.6″. These were won at an auction but hadn’t bothered to advertise them and all are grade b (unboxed) but i believe brand new, all individually bagged, some full hd. £20-30 each details available here:

Laptops screens

Price and currency: 15000
Delivery: Delivery cost is not included
Payment method: bank transfer
Location: heybridge cm9 4ua
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Go to Original Article

Microsoft announces quarterly dividend increase and new share repurchase program – Stories

Annual shareholders meeting set for Dec. 4, 2019

REDMOND, Wash. — Sept. 18, 2019 — Microsoft Corp. on Wednesday announced that its board of directors declared a quarterly dividend of $0.51 per share, reflecting a 5 cent or 11% increase over the previous quarter’s dividend. The dividend is payable Dec. 12, 2019, to shareholders of record on Nov. 21, 2019. The ex-dividend date will be Nov. 20, 2019.

The board of directors also approved a new share repurchase program authorizing up to $40 billion in share repurchases. The new share repurchase program, which has no expiration date, may be terminated at any time.

In addition, the company announced the date for the 2019 Annual Shareholders Meeting, to be held on Dec. 4, 2019. Shareholders at the close of business on Oct. 8, 2019, the record date, will be entitled to vote their shares.

This year’s annual shareholders meeting will be held virtually and hosted by Satya Nadella, chief executive officer; Amy Hood, chief financial officer; Brad Smith, president and chief legal officer; and John W. Thompson, Microsoft independent board chair. A virtual meeting format provides a consistent experience to all shareholders regardless of location, as well as the opportunity for global, multilingual and interactive access to a dialogue with its senior executives and directors.

As with previous shareholders meetings, a business update from senior executives will be followed by a 30-minute question and answer session with shareholders. Microsoft’s board of directors will also attend the meeting to hear shareholders’ questions and feedback. More information about the virtual format can be found on the Microsoft On the Issues blog.

In addition to providing the live webcast of the annual meeting, shareholders will have the option to view the annual meeting through Microsoft Teams at As with previous meetings, the transcript with video and audio of the entire meeting will be available on the Microsoft Investor Relations website following the meeting.

About Microsoft

Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more.

For more information, financial analysts and investors only:

Investor Relations, Microsoft, (425) 706-4400

For more information, press only:

Microsoft Media Relations, WE Communications, (425) 638-7777, [email protected]

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at Web links, telephone numbers, and titles were correct at time of publication, but may since have changed. Shareholder and financial information is available at

Go to Original Article
Author: Microsoft News Center

For Sale – GTX 1080ti, Dell 27″ Monitor & Lian Li PC343B case

ASUS Strix Radeon RX570 – £80 SOLD

Lian Li PC343B case (double width) – Had this in storage for about 3 years. It’s pretty rare now and still fairly sought after. Highly customisable and included are 3 x drive cages (hold 3 x 3.5mm drives each). Collection only £120

MSI GTX 1080ti Founders Edition 11G – £390

Adding a Dell 27″ LED monitor (1080p). Model number is S2740L. Great second display or gaming monitor for consoles. Collection only at this time unless buyer covers postage. Pretty sure I have original box and packaging – £70 collected

Price and currency: Various
Delivery: Goods must be exchanged in person
Payment method: Cash or BT
Location: north Kent
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

North Kent
Price and currency
Collection preferred
Prefer goods collected?
I prefer the goods to be collected
Advertised elsewhere?
Not advertised elsewhere
Payment method
Bt or cash

Last edited:

Go to Original Article

Sigfox network provides cheap, efficient connectivity for IoT

Forget 5G. The key to implementing IoT applications may lie in “zero G.”

Broadband networks like 5G (or 2G, 3G, 4G) can quickly send large amounts of data for streaming applications. But the networks are overly powerful for IoT devices, which produce and transmit small bits of data and don’t need to operate in real time. Scale IoT devices to the millions, and the ideal network for carrying lots of IoT-generated data may be the Sigfox “0G” network.

The Sigfox 0G network enables companies to connect IoT devices at a fraction of the cost and power consumption needed by broadband networks, according to Ajay Rane, vice president of business development for Sigfox, which is based in Labège, France.

A network like this has many uses for Industry 4.0 applications, including supply chain and logistics, industrial IoT (IIoT), smart cities and smart buildings, Rane said.

“[The Sigfox 0G network] can’t do high-speed data, but it works well for the market that we’re targeting,” he said. “We’re not about to replace cellular or any other technology; we have a spot at the bottom of the pyramid of IoT technologies and there are a lot of devices at the bottom of that pyramid which require low power, low cost connectivity.”

The Sigfox network is a Low Power Wide Area Network (LPWAN) that connects devices over large distances without consuming a lot of power. IoT sensors send data through the Sigfox network to a gateway called a Sigfox base station, which posts the messages to the Sigfox cloud at least every 10 minutes. The Sigfox cloud then pushes the messages to client applications.

Keeping the costs low

Asset tracking applications implemented as LPWAN network availability has increased in the last 18 months, and Sigfox has been able to deliver immediate ROI because it’s simpler to implement and the device cost is comparatively low, according to Adarsh Krishnan, principle analyst at ABI Research, which is based in Oyster Bay, New York. Krishnan covers IoT connectivity and LPWAN technologies.

“When you bring the cost of individual asset trackers down to that level, an enterprise looking to deploy these in large volumes can justify such an investment, and Sigfox has devices that can last many years and track across multiple regions,” he said.  “The initial capital investment is much lower because the cost of connectivity itself is very low, and then the cost of devices becomes low because you’re sending very small amounts of data infrequently, which lowers the device cost because you’re optimizing battery use on the devices.”

Battery costs are some of the biggest expenses in asset tracking applications, Krishnan explained, and it can break a business justification to continually replace batteries or pay maintenance costs on thousands of devices.

As IIoT applications become more feasible, other LPWAN options such as LoRa, and other connectivity methods such as cellular networks are also emerging, according to Krishnan. However, the Sigfox network connectivity capacity of just 12 bytes of data maximum and no more than 140 messages per day makes it attractive for IIoT applications.

“Their idea is less is more and they’re addressing very specific use cases within what we call massive IoT use cases, where the data requirements are very small with small packets of data being transmitted from the devices less frequently,” he said. “It’s not real-time tracking — the data transmission may be every half hour — so battery or power efficiency becomes the biggest requirement in some of these use cases.”

Sigfox enables supply chain track-and-trace

Safecube, a startup firm based in Lyon, France that provides supply chain track-and-trace applications, was able to scale its business globally after connecting to the Sigfox network.

Safecube’s service enables shippers to have direct, near real-time access to data about a shipment’s location and condition through IoT sensors that transmit data on the Sigfox network. The network’s growth in coverage in the last two years is the main reason why Safecube uses it, according to Waël Cheaib, Safecube CEO.

“Now the network covers between 60 and 70 countries in the world, so they can say that they have global footprint,” Cheaib said. “They’ve been also developing a technical feature that allows truckers to work worldwide. Until recently, it was not possible for any low power network to have something working in Europe, the U.S., South America and Africa.”

The Sigfox network is suited to Safecube’s application because the data needs to be precise about things such as shipment location, but it’s not a lot of data, Cheaib explained. The network also has to work globally.

“In order to send this information, you don’t need a 5G network. You need a network that is designed to communicate small loads of data, so there are very limited connectivity costs,” he said. “The other resources that are available are long range networks — 2G, 3G, 4G, 5G, which are very costly. But Sigfox is the only low-power network that’s able to provide a global solution.”

Go to Original Article

Global cryptomining attacks use NSA exploits to earn Monero

A new threat group has launched cryptomining attacks around the globe and is using exploits from the National Security Agency to spread its malware.

The threat group, dubbed ‘Panda,’ was revealed this week in a new report from Cisco Talos. Christopher Evans and Dave Liebenberg, threat researcher and head of strategic intelligence, respectively, at Cisco Talos, wrote that although the group is “far from the most sophisticated” it has been very active and willing to “update their infrastructure and exploits on the fly as security researchers publicize indicators of compromises and proof of concepts.”

“Panda’s willingness to persistently exploit vulnerable web applications worldwide, their tools allowing them to traverse throughout networks, and their use of RATs, means that organizations worldwide are at risk of having their system resources misused for mining purposes or worse, such as exfiltration of valuable information,” Evans and Liebenberg wrote in a blog post. “Our threat traps show that Panda uses exploits previously used by Shadow Brokers and Mimikatz, an open-source credential-dumping program.”

The NSA exploits include EternalBlue, which attacks a vulnerability in Microsoft’s Server Message Block (SMB) protocol. The researchers first became aware of Panda’s cryptomining attacks in the summer of 2018 and told SearchSecurity that over the past year they’ve seen daily activity in the organization’s honeypots.

“We see them in several of our honeypots nearly every day, which tells me they’re targeting a large portion of the internet,” Evans said. “Our honeypots are deployed throughout the world, and I’ve never seen a geographic focus of their attacks in the data. The applications they target are widely deployed, and without patching are easy targets.”

Since January, the researchers saw Panda’s cryptomining attacks changing by targeting different vulnerabilities — first a ThinkPHP web framework issue, then an Oracle WebLogic flaw — and using new infrastructure both in March and again over the past month.

“They also frequently update their targeting, using a variety of exploits to target multiple vulnerabilities, and [are] quick to start exploiting known vulnerabilities shortly after public POCs become available, becoming a menace to anyone slow to patch,” the researchers wrote. “And, if a cryptocurrency miner is able to infect your system, that means another actor could use the same infection vector to deliver other malware.”

Liebenberg told SearchSecurity, “It appears that instead of employing good OpSec they focus on volume. That’s one reason why they’ll keep using old, burned infrastructure while still deploying new ones.” 

Evans and Liebenberg said in their research that the Panda group has made approximately 1,215 Monero (a cryptocurrency that emphasizes privacy), which equates to almost $100,000 today. One Monero is currently equal to $78, but the value of Monero has fluctuated — beginning the year around $50 and peaking over $110 in June.

The researchers have confirmed Panda cryptomining attacks against organizations in the banking, healthcare, transportation, telecommunications and IT services industries. Evans and Liebenberg also told SearchSecurity that the best way for organizations to detect if they have been attacked would be to “look for prolonged high system utilization, connections to mining pools using common mining ports (3333, 4444), watching for common malware persistence mechanisms, watching for DNS traffic to known mining pools and enabling the appropriate rules in your IDS.”

Go to Original Article

CIO presentation to the board of directors: Candid tips from CIOs

Making a presentation to the board of directors can be a minefield for CIOs. Navigate it successfully, and you emerge as a business leader — and as a potential candidate for another company’s board. Get tripped up, and your reputation as a business pacesetter can take a hit. But, in today’s technology-centric business climate, the days are long gone when presenting to the board upped the odds of a CIO’s getting fired.

“Ten years ago, that might have been possible,” said Wayne Sadin, chief digital officer and CTO of Affinitas Life, a senior living company based in New York. “Today, just telling the story of IT can only help; telling it well can help more.”

Sadin currently serves as an advisory board member for two IT services companies, and he has been a National Association of Corporate Directors fellow since 2012. In his experience, many boards of directors today are “scared to death” by technology. They know it is critical to the business, but are confused by it.

Wayne Sadin, chief digital officer and CTO, AffinitasWayne Sadin

“These are folks who grew up as managers 30 years ago,” he said. They know finance and operations, but “they never dealt with technology” — or with IT leaders.

Sadin noted that, 30 years ago, he wore a white coat and walked on a raised floor in a room with tiny windows — the better to see the mainframe screens.

“That’s what a lot of board members think when they think of technology. Now, we’re telling them we’ve got to manage digital interaction, IoT, have AI that is smart enough to run your factories or cars — and they don’t have a clue,” Sadin said. CIOs should view a presentation to the board of directors as an opportunity to translate “what technology can do for the business.”

Jay Ferro, CIO, Quikrete Companies Jay Ferro

Jay Ferro, CIO of Quikrete Companies, a large manufacturer of packaged concrete based in Atlanta, is a board director for two startups and two not-for-profits. He said he is finding more boards are demanding that CIOs be present at meetings.

“All companies are, to a certain extent, tech companies, so there is really no reason for any board not to be interested in the technology strategy of an organization,” he said.

Sadin and Ferro were among the experts who offered advice on maximizing an appearance before the board at a recent event for IT leaders held at Boston College and moderated by Ginny Hamilton, community manager for The Enterprisers Project at Red Hat, based in Raleigh, N.C.

Here is a rundown of the panel’s expert advice, including which  IT topics are of most interest to boards, how CIOs get their foot in the door, tips on demeanor and speaking style, and the importance of not upstaging or undermining your CEO.

Cybersecurity: Board of directors’ top concern

“Cybersecurity, cybersecurity, cybersecurity, cybersecurity and anything that puts the company at risk,” Sadin said in answer to an audience question about the IT topics of chief concern to boards of directors.

Calibrating and mitigating a company’s risk are among the top fiduciary responsibilities of board members — and getting it wrong can put them in jail.

The panelists agreed, however, that while cybersecurity is “what gets you in the door,” as Sadin put it, CIOs should view the security conversation as the steppingstone to a broader discussion about two other current topics of high interest to boards: growth and innovation.

“Once the board realizes you have command of the business beyond its risk — which is the No. 1 thing they are interested in — you can land and expand,” Ferro said.

Tim Crawford, CIO strategic adviser, AVOA Tim Crawford

Tim Crawford, the CIO strategic adviser at AVOA and host of the podcast “CIO In the Know,” said he’s been privy to a number of CIO presentations on cybersecurity to the board.

“They are all over the map, from CIOs who have had no interaction with the board” to old hands who “try to scare the bejesus out of them just to open up the purse strings and get money, which they ultimately may use for other purposes,” Crawford said.

Asked if that gambit was a legitimate strategy, Crawford said, “It works for them, but it is not something I would recommend.”

Indeed, transparency and never lying to the board — especially when presenting bad news — were cited as givens by the panel.

An audience question from Isaac Sacolick, president of StarCIO and a former CIO at McGraw-Hill Construction and Businessweek, added another subtlety to the discussion around board interest in cybersecurity.

Isaac Sacolick, president, StarCIOIsaac Sacolick

“Let’s say you have an interest [in investing more] in cyber, and your CEO and C-suite want to invest in growth and innovation. Can you use the board to influence management decisions?” Sacolick asked.

“The CIO is not in the position to use that leverage. My guidance would be to never go down that path,” Crawford advised.

Sadin said those situations are rare in his experience. “Boards don’t manage; they govern,” so it is unlikely that boards will be debating with the CIO about strategy anyway, he said.

Unless there is fraud, in which case the CIO should raise that with the audit committee and not before the whole board, CIOs should think long and hard about doing an end run around their CEOs when presenting to the board, the panel argued.

CEO role in CIO presentations to the board of directors

That’s because, in almost every case, CEOs are the ones who bring CIOs to the dance, the panel said.

Establishing a “relationship of trust” with the CEO is a prerequisite for presenting to the board of directors, said Ferro, who recounted an experience that mirrored the exact scenario raised by Sacolick.

As a CIO at a large enterprise, Ferro said he was approached by the chair of the company’s audit committee and told that, if he needed more money for cybersecurity, he should let that person know. Ferro and his CEO had agreed cybersecurity could use more money, but it was not the top priority for the CEO.

“Now, imagine that conversation. I have a CEO who won’t give me everything I want. Do I ask [the audit chair] to put some pressure on [the CEO] to get me those dollars?” Ferro said. The answer was and should always be no, according to Ferro.

“I danced around it. I said, ‘We were making significant investments. We’re making terrific progress. And if something comes up, I will reach out to you.’ Then, I went back to the CEO and said, ‘By the way, this is what [so-and-so] just said, and I said we are making terrific progress,'” Ferro recounted. “The CEO rolled his eyes and said, ‘Thank you for sharing that with me.'”

He added that CIOs should not lie in situations like this. If necessary, they can say, “I’ll get back to you.” But going around the CEO is a “ticking time bomb. Remember who pays you.”

The panel agreed it is important to respect the chain of command in interactions with the board. In situations where CIOs, with the CEO’s blessing, are presenting to a board member tête-à-tête, “just make sure that whatever you say is the same as what you would say if the CEO were in the room,” Crawford added.

Board rules for effective CIO presentations

Keys to effective board communication

When presenting to the board of directors, CIOs must remember that the job is not to talk about technology, but about the opportunities technology offers the business, including being a vehicle for business model transformation.

Communicating effectively requires knowing your audience. The panelists agreed it is important to do your homework about the board members to understand what motivates them and what their interests are — and peg your talk to their experience.

It is important to remember that board members will also do their homework before meetings, reviewing notes from previous meetings to remind them what was said and what was promised. They are looking at the long-term narrative.

“If you are presenting points in time, and you’re not showing improvement, you’re going to lose them,” Ferro said.

Board members are typically compensated for their time. The panel cautioned the CIO audience to beware the boardroom newbie, eager to show his or her worth. “They will dive in and ask a million questions, and you need to be prepared for that,” Ferro said.

Act like you belong

Finally, keep your cool.

“Some CIOs, when they get their chance [to present], they think it is their one shot and get diarrhea of the mouth: ‘Oh, I’m at a board meeting. I can’t believe it, and I’m going to show them how smart I am.’ For God’s sake, do your homework and don’t look around starry-eyed,” Ferro said. “Act like you’ve been there before.”

Acting like you’ve been there before will not only raise your profile, Ferro said, but also redound to the company’s benefit.

“I’ve had CEOs come to me and say, ‘You made us all look really good. Thank you.’ And it wasn’t because I was amazing; it was because I showed the board that there is a senior executive at the wheel for IT.”

Go to Original Article

Wi-Fi Certified 6 launches new era for wireless connectivity

The next generation of Wi-Fi, originally known as 802.11ax, but now branded as Wi-Fi Certified 6, is ready for broad deployment.

The Wi-Fi Alliance has made public the availability of the Wi-Fi Certified 6 certification program that aims to qualify and help ensure that devices are compliant and interoperable with the new Wi-Fi standard. Among the numerous benefits that Wi-Fi 6 promises are boosted capacity and bandwidth speeds as well as improved energy efficiency over previous Wi-Fi standards.

“Wi-Fi 6 is most definitely a game-changer technology,” said Abel Nevarez, an analyst at IHS Markit Technology. “Not only will it increase capacity, interoperability and efficiency, but it’ll also make Wi-Fi access more secure, which will allow for new and innovative monetization schemes.”

Nevarez added that the Wi-Fi Alliance’s Sept. 16 rollout of the certification program is a big milestone for getting Wi-Fi Certified 6 handsets and routers into the hands of data-hungry consumers.

Why Wi-Fi Certified 6 matters

The certification itself is important because it helps guarantee that there will be a certain base level of interoperability among devices and infrastructures, said Anshel Sag, an analyst with Moor Insights and Strategy.

The IEEE 802.11ax standard that Wi-Fi Certified 6 is based on has many features, but not everyone will implement them all, Sag noted. The result could be interoperability problems, so by creating a minimum spec and certain set of interoperability expectations, the Wi-Fi Alliance has created a certification that helps both consumers and businesses.

Kevin Robinson, vice president of marketing for the Wi-Fi Alliance, noted that his organization had been working for many years on the certification effort leading up the formal rollout on Sept. 16.

Wi-Fi 6 is most definitely a game-changer technology.
Abel NevarezAnalyst, IHS Markit Technology

Robinson noted that Wi-Fi Alliance certification programs supporting new generations of Wi-Fi, are generally announced every five to seven years. The last was Wi-Fi Certified ac in 2013, which supported the IEEE 802.11ac standard.

He said that certification typically serves as an inflection point for industry adoption of a technology.

“We expect service providers, both fixed and mobile, to deploy the technology and expect users will very soon begin seeing the benefits of the technology, which includes 4x capacity and speeds of Wi-Fi 5,” Robinson said.

Wi-Fi Certified 6 in the enterprise

Meanwhile, one of the main advantages of Wi-Fi 6 is the improved efficiency of the Wi-Fi medium — that’s the reason why the standard uses the term High Efficiency, or HE, according to Anil Gupta, co-founder and CTO of Wi-Fi assurance vendor Wyebot, based in Marlborough, Mass.

Places that would benefit from Wi-Fi 6 are high-density areas like a cafeterias, stadiums and auditoriums. Other workspaces within an enterprise may not necessarily have the density of people or enough people or Wi-Fi devices to justify a full rip-and-replace upgrade to access points with Wi-Fi 6 technology.

“The most common applications within enterprises and different verticals that may require high-speed performance are video and web-conferencing,” Gupta said. “However, the speeds offered by 802.11ac (Wi-Fi 5) are more than enough to support such applications.”

In the view of Abhijit Sunil, a Forrester analyst, Wi-Fi Certified 6 will open up many use cases that can benefit from more reliable and faster connections, especially in closed spaces that were attributed or similar to those touted for 5G — such as office collaboration spaces and smart homes.

“Wi-Fi 6 will in no way replace 5G, but this milestone enables many use cases to be tested and when 5G matures in the near future, to complement high-speed connectivity to the internet,” Sunil said.

Go to Original Article

How AI and Teams are benefitting the littlest of patients – Stories

Smiling woman with arms raised surrounded by people
Felicitas Hanne raises her arms in delight, surrounded by some of the members of the Microsoft Germany team that developed solutions for Kinderhaus AtemReich. Photo: Microsoft

So last summer, when Hanne attended Microsoft Germany’s #Hackfest2018 in Munich, a two-day Microsoft employee hackathon to help customers, partners and nonprofit organizations, she wasn’t sure what to expect.

At that time, “It was my great hope that Microsoft would help me to expand and improve my work with Microsoft Access database,” she says.

But as Hanne spoke to the Microsoft employees about Kinderhaus AtemReich, “We listened really carefully to what she was saying about the children, and I think half of our colleagues had tears in their eyes,” says Volker Strasser, a Microsoft digital adviser who normally works with large companies. Moved by the children’s challenges and those faced by Kinderhaus AtemReich, he became the project lead for the effort.

Andre Kiehne, executive sponsor of the project and a member of the Microsoft Germany leadership team, also remembers talking to Hanne that first time. It was an “emotional moment,” he says. His twin daughters were born 13 years ago in the same children’s hospital where the idea for Kinderhaus AtemReich was raised, and around the same time. His girls were premature babies and faced some medical problems in their first weeks – “they are completely healthy now,” he says – but the worry he faced remains a fresh memory.

The night the hackfest ended, Strasser remembers being unable to sleep “as thoughts circled my mind as to how we’d help Kinderhaus succeed, how we could bring these ideas to life, and how we’d scale those ideas more broadly” for other potential and much-needed Kinderhaus AtemReichs in his country.

Mug shot of Volker Strasser
Volker Strasser

At 3 a.m., he got out of bed and started drafting a plan that would ultimately include bringing machine learning, artificial intelligence (AI), Microsoft Teams and a modern recruiting strategy to Kinderhaus AtemReich.

For the next year, the team met for a project call every Monday at 8 a.m. – “We put that meeting on Monday at that time because we wanted to start the week with the most important thing, Kinderhaus AtemReich,” Strasser says.

Hanne had no idea she would wind up with a dedicated army of 50 Microsoft volunteers and partners who, over the past year, have not only provided Kinderhaus AtemReich with a digital transformation, but who also spend their own time at the facility, about 5 miles from Microsoft’s Munich office, doing everything from helping clean out the cellar to tending the garden.

The technology solutions being put into place fit “the needs of AtemReich to get closer to the goal of more staff time with the children,” and less on paperwork, says Hanne. “That is what touches me most of all. This incredible combination of Microsoft and partner team members’ empathy, passion, know-how and time for our children can hardly be put into words because it is so great.”

Among the changes that have come to Kinderhaus AtemReich: shifting from a laborious, often manual, medical record-keeping system that only kept track of a child’s vital signs to a system that compiles information – such as heart rate, oxygen, breathing rhythm, blood pressure – from the children’s medical devices and uses machine learning, AI, IoT and Azure tools to produce data and analysis to see if there are safety or medically related problems or trends that should be addressed.

“Before, we just copied the data from the monitors onto paper. But we were not able to evaluate or compare the incredible amounts of data provided by our devices,” Hanne says. “Now we can evaluate and analyze data. This allows us to discover patterns in children and makes it possible to react faster than we could before.”

Go to Original Article
Author: Microsoft News Center

Eclipse launches Che 7 IDE for Kubernetes development

SAN FRANCISCO — The Eclipse Foundation has introduced Eclipse Che 7, a new developer workspace server and IDE to help developers build cloud-native, enterprise applications on Kubernetes.

The foundation debuted the new technology at the Oracle Code One conference here. Eclipse Che is essentially a cloud-based IDE built on technology Red Hat acquired from Codenvy, and Red Hat developers are still heavily involved with the Eclipse project. With a focus on Kubernetes, Eclipse Che 7 abstracts away some of the development complexities associated with Kubernetes and helps to close the gap between the development and operations environments, said Mike Milinkovich, executive director of the Eclipse Foundation.

“We think this is important because it’s the first cloud-based IDE that tends to be natively Kubernetes,” he said. “It provides all of the pieces that a cognitive developer needs to be able to build and deploy a Kubernetes application.”

Eclipse Che 7 helps developers who may not be so familiar with Kubernetes by providing not just the IDE, but also its plug-ins and their dependencies. In addition, Che 7 automatically adds all the build and debugging tools developers need for their applications.

Mike MilinkovichMike Milinkovich

“It helps reduce the learning curve that’s related to Kubernetes that a lot of developers struggle with, in terms of setting up Kubernetes and getting their first apps locations up and running on Kubernetes,” Milinkovich said.

The technology can be deployed on a public Kubernetes cluster or an on-premises data center, and it provides centrally hosted private developer workspaces. In addition, the Eclipse Che IDE is based on an extended version of Eclipse Theia that provides an in-browser experience like Microsoft’s Visual Studio Code, Milinkovich said.

Eclipse Che and Eclipse Theia are part of cloud-native offerings from vendors such as Google, IBM and Broadcom. And it lies at the core of Red Hat CodeReady Workspaces, a development for Red Hat OpenShift.

Moreover, Broadcom’s CA Brightside product uses Eclipse Che to bring a modern, open approach to the mainframe platform. Che also integrates with IBM Codewind to provide a low barrier to entry for developing in a production container environment.

Kubernetes is hard to manage, so it will be helpful to have an out-of-the-box offering from an IDE vendor.
Holger MuellerAnalyst, Constellation Research

“It had to happen, and it happened sooner than later: The first IDE delivered inside Kubernetes,” said Holger Mueller, an analyst at Constellation Research.

There are benefits of having developers build software with the same mechanics and platforms on the IDE side as their target production environment, he explained, including similar experience and faster code deployments.

“And Kubernetes is hard to manage, so it will be helpful to have an out-of-the-box offering from an IDE vendor,” Mueller said. “But nothing beats the advantage of being able to standardize and quickly launch uniform and consistent developer environments. This gives development team scale to build their next-gen applications and helps their enterprise accelerate.”

Eclipse joins a group that includes major vendors that want to limit the complexity of Kubernetes. IBM and VMware recently introduced technology to reduce Kubernetes complexity for developers and operations staff.

For instance, IBM’s Kabanero open source project to simplify development and deployment of apps on Kubernetes uses Che as its hosted IDE.

The future of developer tools will be cloud-based, Milinkovich said. “Because of the complexity of the application scenarios today, developers are spending a lot of their time and energy building out development environments when they could just move developer workspaces into containers,” he said. “It’s far easier to update the entire development team to new runtime requirements. And you can push out new tools across the entire development team.”

The IDE is the last big piece of technology that developers use on a daily basis that has not moved into the cloud, so moving the IDE into the cloud is the next logical step, Milinkovich said.

Go to Original Article

For Sale – 2015 MBP Retina 13″ 16gb 512gb


After upgrading to a 15 inch lifestyle, I find myself ready to part with my beloved 13 inch MacBook Pro.

Specs are:

MacBook Pro 13″ early 2015
16GB Ram
Intel core i5 2.9Ghz
intel graphics

condition wise, generally good, screen is pretty much pristine, its had a screen protector on it since day 0, and while that had one or two marks from use, simply peel it off and you’ll be left with a perfect display! (as much as I would love to do this, I will save that pleasure for the next person to enjoy)

the bottom casing has suffered a little bit from being inside one of those clear plastic cases. and there are a couple of scratches on the top of the unit, these have been pictured as best I could and a couple of the keys have some wear on them, this was a work machine and I tend to type a LOT.

Overall its been taken care of, but is not pristine, and I have adjusted price to reflect this. This specification is hard to find and has been a great tool.

Will also come with 2 chargers, one apple, 1 third party, so you can have 1 charger at home and one on the go.

this has been difficult to price and I’ve done my best to mark it fairly, but I am open to offers. UNADJUSTEDNONRAW_thumb_a.jpg UNADJUSTEDNONRAW_mini_18.jpg UNADJUSTEDNONRAW_mini_16.jpg UNADJUSTEDNONRAW_mini_c.jpg UNADJUSTEDNONRAW_mini_6.jpg UNADJUSTEDNONRAW_mini_7.jpg UNADJUSTEDNONRAW_mini_15.jpg UNADJUSTEDNONRAW_mini_3.jpg 7410d32b-8d19-4238-8e71-cdb0553af1e6.jpg 2249f9ee-6b5e-466a-bb24-46e11c95e672.jpg

Price and currency: 600
Delivery: Delivery cost is not included
Payment method: BT Preferred
Location: Bath/London
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Go to Original Article