Tag Archives: central

HP Microserver Gen8

What have you got ?

Can met in Central London to avoid postage / damage issues too 😉

Location: Norfolk

This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party…

HP Microserver Gen8

HP Microserver Gen8

What have you got ?

Can met in Central London to avoid postage / damage issues too 😉

Location: Norfolk

This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party…

HP Microserver Gen8

CORD project updates platform to support edge computing

The Open Networking Foundation this week upgraded the Central Office Re-architected as a Datacenter architecture to merge the three primary subscriber packages into one platform.

Formerly available as individual options, the CORD project announced that the 4.1 release combines the residential, mobile and enterprise packages on a common platform to streamline the building process, according to Timon Sloane, vice president of marketing and ecosystem at the Open Networking Foundation, which hosts the CORD project.

Users pick the type of profile they require — residential, mobile or enterprise — and the platform takes it from there.

“You click a box and everything else is automated; it just flows right through — it builds, deploys and boots, and the whole data center comes up and starts running,” Sloane said.

The platform also comes with a library of 25 virtual network functions (VNFs) and the needed management and orchestration. A short list includes virtual evolved packet core, virtual subscriber gateway and virtual network as a service. The mobile 5G and residential XGS-PON VNFs — the latter a new fiber transmission technology — are some of the more popular ones among subscribers, he said, reflecting the need to support edge computing — be it the cloud edge or the mobile edge.

“There are a lot of mobile [VNFs] since it’s a complicated space,” he said. “[There are] a lot of different pieces in connecting subscribers to mobile core and authenticating them all.”

CORD 4.1 also supports third-party VNFs, recognizing the need for some services to stay proprietary. As such, Sloane said CORD provides the open infrastructure that supports those proprietary options, a benefit for edge computing and 5G deployments. He attributed part of CORD’s momentum to the open source community, stating it can move more quickly than traditional standards bodies.

CORD has also started migrating VNFs that run on servers to a software-defined switch fabric that connects the CORD data center, he said.

“Obviously, infrastructure makes sense running on a server, but for the bulk of individual packets, you want them to flow through the switch fabric,” he said, touting the benefits of increased space and traffic speeds and lowered costs.

Sloane said the CORD project will focus on technologies like augmented and virtual reality, the internet of things and autonomous vehicles for its next release.

Juniper plans to move OpenContrail governance to The Linux Foundation

Juniper Networks this week announced it will be sharing its OpenContrail codebase with The Linux Foundation.

In 2013, Juniper open sourced its Contrail products, creating an open source community called OpenContrail. Since then, OpenContrail has been used as a network virtualization platform for cloud environments.

This week’s move will bring the network virtualization control plane under The Linux Foundation’s governance and development umbrella. The goal is to persuade more cloud providers and operators to consider using OpenContrail to anchor their networks, with hopes to further integrate OpenContrail into cloud ecosystems.

“Over the past year, we have been working closely with the community to transition the governance for OpenContrail’s codebase because we believe it has the unique opportunity to be a ubiquitous cloud-grade network fabric used everywhere,” said Randy Bias, Juniper’s vice president of technology for cloud software, in a company statement.

Masergy updates managed SD-WAN Go

Masergy added support for application performance and security to its SD-WAN Go offering.

The provider said the service — which uses technology from Silver Peak — now features more sophisticated application routing and automatic path control. For security, Masergy added an embedded firewall and router.

“Managed SD-WAN Go now gives businesses of any size additional enterprise-grade capabilities at a fraction of the cost of comparable solutions,” a company statement said. Masergy unveiled SD-WAN Go earlier this year, targeting the service to both small and large enterprises.

Masergy also offers SD-WAN Pro, tailored to enterprises with more complex networks.

Introducing Cortana in Skype—Microsoft’s intelligent assistant comes to your chat window | Skype Blogs

Conversation is central in our everyday lives. We chat to stay in touch, to share news and ideas that excite us, and to make plans for getting together with family and friends. But we often find ourselves in need of information—a fact to share, a place to meet, a movie time, or the perfect restaurant. Looking for information often requires interrupting the conversation, even if briefly, and switching apps to find what we’re looking for and bring it back into the conversation. But shouldn’t technology make our lives easier and truly bring the answers we need to our fingertips? At Skype we are certain about it, and it’s with this goal in mind, that we are bringing Cortana, Microsoft’s intelligent assistant, into Skype to help you in your everyday conversations.

With Cortana’s in-context assistance, it’s easier to keep your conversations going by having Cortana suggest useful information based on your chat, like restaurant options or movie reviews. And if you’re in a time crunch? Cortana also suggests smart replies, allowing you to respond to any message quickly and easily—without typing a thing.

Cortana can also help you organize your day—no need to leave your conversations. Cortana can detect when you’re talking about scheduling events or things you have to do and will recommend setting up a reminder, which you will receive on all your devices that have Cortana enabled. So, whether you’re talking about weekend plans or an important work appointment, nothing will slip through the cracks.

In addition to being your ‘behind-the-scenes’ assistant, Cortana is also a contact in Skype. So now, you can have natural conversations in one-on-one chats with Cortana—just like you would with your friends, family, and coworkers. Get answers to your burning questions, like the name of the lead actor in your favorite movie or what the weather outlook is for the weekend. You can also ask Cortana to check your flight status, give you a stock quote, or suggest the best restaurants in your area. With Cortana at your disposal, every day can be a bit more productive—and a lot more fun.

At Skype, we’re committed to making your Skype experience even better. With Cortana, we’ve added a powerful, intelligent assistant to help you with your everyday tasks right where you are and save you time.

Cortana in Skype will be gradually rolled out, starting today, to our Android and iOS customers in the United States. Your feedback is key to continue improving Cortana, so please visit our community page and let us know what you think or send us your recommendations. To learn more about how to start using Cortana and find other quick answers, please visit the FAQs.

Stepping up protection with intelligent security

With digital transformation, technology becomes increasingly central to every business and organization. This makes ensuring cybersecurity increasingly important. And, as employees increase their use of mobile devices and cloud-based apps, protecting their work requires a new approach for IT. With 80% of employees admitting to the use of non-approved cloud apps for work, ensuring data protection cannot be left to employees to manage.

To address these needs, Microsoft continues to take a multi-faceted approach to providing built-in security capabilities. These span areas across:

  • Protecting at the front door
  • Protecting data anywhere
  • Achieving data security compliance objectives
  • Detecting and recovering from attacks
  • Managing the security tool set

The Microsoft security tools continuously improve with insight from the Microsoft Intelligent Security Graph, which serves as the connective tissue across Microsoft security solutions. Today at Ignite, we are announcing new integrations, expanded capabilities, and partnerships toward addressing the complex areas of cybersecurity for all organizations.

Protect at the front door

The vast majority of security breaches continue to trace back to weak or stolen passwords. Because it’s proving to work, attackers are increasing their focus on stealing passwords to access corporate systems. The latest Microsoft Security Intelligence Report shows a 300 percent increase in user account attacks. To address this growing issue, it is essential to focus on securing identities and access. Our cloud-based approach is through broadly implemented conditional access.

Conditional access enables you to control who has access to your organization’s resources based on a combination of risk factors, such as user account activity, physical location, and the trustworthiness of the device. Azure Active Directory analyzes these factors and applies continuous cybersecurity threat intelligence, powered by Microsoft’s Intelligent Security Graph. This insight provides real-time risk assessment, and triggers the appropriate authentication requirements needed for accessing apps and data. Today, we are expanding conditional access capabilities by integrating with Microsoft Cloud App Security, Azure Information Protection, and our partners in the ecosystem:

  • Microsoft Cloud App Security performs real-time monitoring and helps IT gain control over cloud apps and how employees use these apps. Now with Cloud App Security, users’ actions taken in cloud applications can be managed and controlled based on conditional access policies and proxy-enforced session restrictions. For example, you can allow users to access cloud apps from an unfamiliar location or unmanaged device, but prevent them from downloading documents.
  • To further enhance security at the file level, we’re introducing conditional access for sensitive files. With the integration of Azure Information Protection and Azure Active Directory, conditional access can be set up to allow or block access to documents protected with Azure Information Protection. You can also enforce additional security requirements such as multi-factor authentication or device enrollment.
  • Not only are we providing better integration within our own solutions to deliver holistic and identity-driven security, we also are working with our partners to extend conditional access in the ecosystem. In addition to Azure multi-factor authentication (MFA), you can now use RSA, Duo or Trusona for two-step authentication as part of your conditional access policy.

Protect your data anywhere

Employees are using more SaaS apps, creating more data, and working across multiple devices. While this has enabled people to do more, it has also increased the risk of data loss – it is estimated that 58% of workers have accidentally shared sensitive data with the wrong person.

Microsoft’s Information Protection solutions help you detect, classify, protect and monitor your data – regardless of where it is stored or shared. Today, we’re announcing several new investments in the integration across our information protection solutions – helping provide more comprehensive protection across the data lifecycle.

A key part of this vision is to provide a more consistent and integrated classification, labeling and protection approach across our information protection technologies, enabling persistent protection of your data – everywhere. Microsoft Cloud App Security natively integrates with Azure Information Protection to classify and label files that reside in cloud applications.

Finally, we are announcing the general availability of improvements to Office 365 message encryption, which makes it easier to share protected emails with anybody – inside or outside of your organization. Recipients can view protected Office 365 emails on a variety of devices, using common email clients or even consumer email services such as Gmail and Outlook.com.

Achieve your data security compliance objectives

Regulated organizations have additional needs to demonstrate compliance, and we’re investing in tools to help achieve those goals.

Customer Key can help regulated customers meet their security compliance obligations by providing added control and management of encryption keys. To learn more, check out this video example of how Customer Key works in SharePoint Online.

Beyond just security compliance, achieving organizational compliance is a complex challenge. It’s hard to stay up-to-date with all the regulations that matter to your organization, and to define and implement controls with limited in-house capability. We’re pleased to introduce the upcoming preview of Compliance Manager, which enables you to manage your compliance posture from one place and stay up-to-date on evolving data protection regulations. Compliance Manager enables real-time risk assessment with one intelligent score reflecting your compliance posture against data protection regulations when using Microsoft cloud services. It also provides recommended actions and step-by-step guidance to help you improve your compliance posture.

Detect and recover from attacks

On average breaches exist for over 90 days in a customer’s environment before they are detected. In response, many organizations are moving to an assume breach posture. We continue to invest in tools that help detect attacks sooner and then remediate. But, we know it’s also important to continue investing in pre-breach attack prevention tools.

Today, we are announcing several new capabilities to further improve our anti-phishing capabilities in Office 365 Advanced Threat Protection, with a focus on mitigating content phishing, domain spoofing, and impersonation campaigns. Office 365 Advanced Threat Protection is also expanded to help secure SharePoint Online, OneDrive for business, and Teams. In Office 365 Threat Intelligence, we have introduced threat insights and tracking to help with detection and remediation. In Windows, we are adding Windows Defender Application Control, which is powered by the Microsoft Intelligent Security Graph to make it less likely that malicious code can run on the endpoint.

On the post-breach detection side, we are announcing the limited preview of a brand-new service – Azure Advanced Threat Protection for users – that brings our on-premises identity threat detection capabilities to the cloud and integrates them with the Microsoft Intelligent Security Graph. Powered by the graph, our Advanced Threat Protection products have a unified view of security event data so your security operations analysts can investigate an incident from endpoint to end-user to e-mail. Finally, as previously announced earlier in the month, Windows Defender Advanced Threat Protection is integrating Hexadite’s AI technology to automatically investigate new alerts, determine the complexity of a threat, and take the necessary actions to remediate it.

Security management

Protecting resources across distributed infrastructure against evolving cyberthreats demands a new approach to security management – a solution that provides comprehensive visibility, consistent controls and actionable intelligence and guidance.

We are announcing today that Azure Security Center, which helps customers protect workloads running in Azure against cybersecurity threats, can now also be used to secure workloads running on-premises and in other private and public clouds. Azure Security Center reduces management complexity by delivering visibility and control over workloads across clouds, enables adaptive threat prevention to reduce your exposure to threats, and provides intelligent detection to help you keep pace with rapidly evolving cyberattacks.

Azure Security Center also has new capabilities to enable central management of security policies, better detect and defend against advanced threats, and streamline investigation of threats for your hybrid workloads. Read the Azure blog to learn more about these and other new features.

Getting started

We have made it easier than ever to get end-to-end security solutions up and running. FastTrack for Microsoft 365 now provides deployment services for key security scenarios, giving you the resources, tools, and support you need from Microsoft engineers.

FastTrack for Microsoft 365 can work with you directly, work with your existing partner, or help you get matched with a trusted Microsoft partner to deploy comprehensive security solutions. And the best part is this isn’t a one-time benefit. It is a repeatable resource that you can use to ensure you have the help and resources you need.

You can go to fasttrack.microsoft.com and get help to deploy Microsoft products to address some of the most common security scenarios including:

  • Working securely from anywhere, anytime on almost any device enabling a flexible workstyle
  • Protect your data on files, apps and devices within and across orgs
  • Detect and protect against external threats
  • Protect your users and their accounts
  • Securely collaborate on documents in real time
About the Author
Julia White

Julia White

Corporate Vice President, Microsoft Azure & Security

Microsoft establishes Quantum Centre at the University of Copenhagen – University of Copenhagen

06 September 2017


The University of Copenhagen plays a central role in an ambitious Microsoft multi-million dollar investment.
Today, the tech company and the University signed a long-term collaboration agreement on the development of a general-purpose, scalable quantum computer. This is a project which opens up tremendous new opportunities for science and technology.

The Niels Bohr Institute’s Centre for Quantum Devices (Qdev), headed by Professor Charles Marcus, will be pivotal in the collaboration between Microsoft and the University of Copenhagen.

The Niels Bohr Institute’s Centre for Quantum Devices (Qdev), headed by Professor Charles Marcus, will be pivotal in the collaboration between Microsoft and the University of Copenhagen.

By virtue of a new collaboration agreement with the University of Copenhagen, Microsoft is intensifying its investment at the Niels Bohr Institute. Microsoft employees will be working closely with the Institute’s researchers to develop and build the world’s first general-purpose, scalable quantum computer. The task for the Microsoft employees is to turn knowledge gained from research into tangible reality. The announcement of this deepened partnership, which includes the expansion of facilities at the University’s North Campus, will further establish Niels Bohr’s Copenhagen as a global epicentre for quantum mechanics in perfect alignment with the vision of Greater Copenhagen as a global hub for science and innovation.

“The University of Copenhagen’s quantum research contributes to placing Danish research at the very top, which was evidenced today by the IT giant, Microsoft, expanding its investment in a Quantum development centre in Denmark. It’s a perfect example of how a university can create value in collaboration with the business sector from all over the world,” says the Danish Minister for Higher Education and Science, Søren Pind.

Basic research and business meet

For Thomas Bjørnholm, Prorector for Research and Innovation at the University of Copenhagen, today’s multi-year agreement with Microsoft is the culmination of a sustained and extremely focused research partnership within quantum technology.

“When a company such as Microsoft chooses to situate and invest heavily into a research development center at the University of Copenhagen, it’s because we’ve had a significant focus on building up one of the world’s leading quantum research environments. We’re very proud of this and are confident that it will reinforce a strengthened perception of Denmark as an attractive destination for international investments,” the Prorector says.

It started with Bohr

The Niels Bohr Institute’s Centre for Quantum Devices (Qdev), headed by Professor Charles Marcus, will be pivotal in the collaboration between Microsoft and the University of Copenhagen. The research at the Institute draws on Niels Bohr’s own research into quantum physics and is amplified by Microsoft’s investment in state-of-the-art laboratories and specialized Quantum equipment and tools at the University of Copenhagen over the coming years. This, in turn, makes the University of Copenhagen and Denmark an increasingly attractive destination for global Quantum talent.

“The critical pillars for successful and productive Quantum research already exist at the University of Copenhagen – an aligned vision between Microsoft and the University, an exceptional team of top Quantum researchers, a broad and deep pool of post doctorate and student talent, and a solid baseline of facilities and equipment dedicated to Quantum research. We look forward to harnessing this to make impressive advancements in the research and development of a useful, scalable quantum computer capable of transforming the global economy and solving the world’s hardest problems,” says David Pritchard, Chief of Staff for the Artificial Intelligence and Research division at Microsoft.

One of four centres

Together with the effort and activities across Qdev and Microsoft, the other quantum research centres at the University of Copenhagen, including the Centre for Quantum Optics (Quantop), the Centre for Quantum Photonics, the Villum Centre for the Mathematics of Quantum Theory (Qmath) and the Quantum Innovation Centre (QuBiz), will augment the open Quantum research that the University will generate, further propelling the University into the global Quantum spotlight.

In addition to establishing ‘Station Q Copenhagen’ via this new chapter of Microsoft and the University’s partnership, Microsoft has also established partnerships with universities in the Netherlands, Australia and the United States. Station Q Copenhagen is one of only four prestigious experimental Station Q sites in the world, alongside Purdue University, Delft University of Technology, and the University of Sydney.

Computers based on quantum technology have the potential to solve and execute complex mathematical calculations much faster than any existing computer built with ordinary bits. Bits that are based on quantum particles, known as qubits, will –when stabilised and integrated into a computer– generate unprecedented performance. This will translate into the ability to create significant opportunities and tackle pressing challenges like global warming, material and drug design, IT security and encryption, and more.

Main points of the collaboration agreement

• Microsoft is establishing state-of-the-art Microsoft research and development laboratories at the University of Copenhagen North campus in close proximity to the Niels Bohr Institute.

• Presently, over a dozen Microsoft employees ranging from engineers to developers are situated at the University of Copenhagen. Over the course of the new long-term agreement, the size of this team will grow, partnered with University personnel in the development of a topological quantum computer.

• In addition to the multi-million dollar investment in state-of-the-art facilities and equipment, Microsoft is also committing to significant quantum research funding at the University of Copenhagen.

• The collaboration between the University of Copenhagen and Microsoft will be based at the Centre for Quantum Devices (Qdev) and helmed by Professor Charles Marcus. Charles Marcus is Microsoft’s Scientific Director of Station Q Copenhagen.

• An agreement capturing the elements of the collaboration has been signed covering the license rights to Microsoft and the University of Copenhagen. The agreement reflects the interests of the parties and takes into account applicable legislation and guidelines in this area.

The collaboration between the University of Copenhagen and Microsoft is a landmark example of the science and research made capable by joining public and private interests. Together, via this new phase of the partnership, the team is poised to make critical strides in topological quantum computing in furtherance of the quantum economy – locally and globally.


Prorector for Research and Innovation Thomas Bjørnholm tel.: + 45 28 75 18 35

Communications adviser Christian Hedegaard tel.: + 45 31 14 87 82