Tag Archives: could

Z77 Motherboard

My MSI Z77A has crapped out on me, so I need a replacement. Please could you send me your offers.

Location: South West London

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves…

Z77 Motherboard

Z77 Motherboard

My MSI Z77A has crapped out on me, so I need a replacement. Please could you send me your offers.

Location: South West London

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves…

Z77 Motherboard

Z77 Motherboard

My MSI Z77A has crapped out on me, so I need a replacement. Please could you send me your offers.

Location: South West London

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves…

Z77 Motherboard

Z77 Motherboard

My MSI Z77A has crapped out on me, so I need a replacement. Please could you send me your offers.

Location: South West London

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves…

Z77 Motherboard

How Apple Business Chat could change contact-center market

When Apple Business Chat launches in beta this spring, it could elevate the mobile reach of contact centers — if, as expected, enterprises direct customer service reps to connect to the hundreds of millions of iPhone users.

Industry experts expect Apple Business Chat to draw more enterprise attention than competitors in the business messaging market for two reasons: Apple Pay and download-free access to the service.

Most business messaging platforms require users to install an app and create a profile. In contrast, Apple Business Chat will be instantly accessible to every iPhone user following a software update, and it will allow those users to message companies without having to divulge any personal information.

Through Apple’s platform, iPhone users can converse with businesses through iMessage to ask a question, schedule an appointment or place an order. For participating businesses, their search results in Safari, Maps, Spotlight and Siri will feature an iMessage icon, allowing customers to start a chat with one tap.

“If you’re trying to be customer-centric and you’ve got a lot of customers who are Apple users, if this mode [Business Chat] takes for them, then you’ve got to support it,” said Jon Arnold, principal of Toronto-based research and analysis firm J Arnold & Associates.

Apple has released a developer preview of Business Chat and is accepting online registrations from businesses that want to use it in the future. The company has partnered with four customer service vendors — LivePerson, Genesys, Salesforce and Nuance — to support the platform’s beta release with the iOS 11.3 upgrade this spring. Discover, Hilton Hotels and Resorts, Lowe’s and Wells Fargo will be among the first businesses to deploy it.

Companies using Apple Business Chat will find that unlike competing platforms Facebook Business Messenger, WhatsApp, WeChat, Line and Kakao Talk, the Apple service is “baked into the surrounding operating system,” said Keith Dawson, principal analyst for customer experience and commerce with 451 Research.

“It means that for anyone who’s not an Android user, it’s ever present on their device as a contact mode,” Dawson said. Rivals, on the other hand, will have the additional hurdle of convincing consumers to download their apps.

Apple Business Chat release could accelerate a restructuring of contact centers

In a 2017 survey by Nemertes Research, based in Mokena, Ill., 27% of 225 participating companies said they planned to support social messaging services like WhatsApp, Facebook Business Messenger and Apple Business Chat as customer engagement channels.

“So, I see the Apple announcement as a positive development, as companies look for new ways to engage with customers, especially among a younger demographic that is more reliant on their cellphone than a traditional web browser for shopping,” said Nemertes analyst Irwin Lazar.

Social media and chat apps are contributing to a “fundamental rethinking of how businesses engage with customers,” Dawson said. Contact centers are beginning to work more closely with marketing and sales teams to make sure the company is taking advantage of the customer connections these platforms offer.

The standout connection Apple has with its customers is Apple Pay

“If Apple didn’t have Apple Pay, [Business Chat] wouldn’t be as interesting, because that’s one of the things that the contact-center experience can’t deliver as seamlessly,” Arnold said.

An interaction initiated by a customer asking a question could end with a product sale, facilitated by an Apple Pay thumbprint within the iMessage chat. This should motivate companies to invest more in their contact centers, which have the potential to become revenue-generators.

Nevertheless, Apple and other chat platform providers will have to show a solid return on investment before contact centers deploy the technology broadly.

“The last thing contact centers want to do is have to jump for the next shiny ball and just try the next thing that comes along,” Arnold said. “They can only handle so many platforms in the business, and they can only adapt to so many new things at a time.”

Critical Cisco ASA vulnerability patched against remote attacks

A new critical flaw in Cisco’s Adaptive Security Appliance software could allow dangerous remote attacks and requires a patch to mitigate.

The Cisco ASA vulnerability received the highest severity rating of 10.0 on CVSS and according to Cisco, it could “allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.”

“The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system,” Cisco wrote in a security advisory. “An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device.”

Kevin Beaumont, a security architect based in the UK, said on Twitter the Cisco ASA vulnerability was disclosed early and called it “one of the bigger bugs.”

According to the official advisory, the Cisco ASA vulnerability has no mitigations, and the only way to secure affected devices is to apply the patch.

Potential damage

Craig Young, computer security researcher for Tripwire’s Vulnerability and Exposures Research Team, said the Cisco ASA vulnerability could be exploited by an attacker “to harvest credentials as well as to monitor and manipulate traffic which should be protected by the VPN.”  

“The danger is further compounded by the fact that attackers can easily locate public SSL VPN terminals through services like Shodan as well as by searching certificate transparency logs for security certificates containing the word VPN,” Young told SearchSecurity. “In general, an attacker must have some degree of knowledge or control over the remote memory layout. In practical terms, this means that attackers will need to study the vulnerability and develop reliable exploit methods specific for different firmware versions. Developing these exploits would not be within reach of the average hacker as it requires rather extensive knowledge about the ASA operating system and how it manages system memory.”

Mounir Hahad, head of threat research at Juniper Networks, said described a range of attacks that could leverage the Cisco ASA vulnerability.                                       

“Typically, WebVPN is enabled on edge firewalls, which means this particular vulnerability is exploitable directly from the internet. It is fairly easy to exploit as it only requires crafting specific XML packets to a WebVPN configured device. An attacker could take full control of the firewall: they could change the running configuration of the device, allow inbound traffic that should be blocked and infiltrate the organization,” Hahad told SearchSecurity. “They could also simply launch a denial of service attack by restarting the device continuously, which will basically shutdown internet connectivity to an entire organization. For cloud services, the entire service could go offline.”

Wanted – Z77 Motherboard

My MSI Z77A has crapped out on me, so I need a replacement. Please could you send me your offers.

Location: South West London

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – Z77 Motherboard

My MSI Z77A has crapped out on me, so I need a replacement. Please could you send me your offers.

Location: South West London

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Set Office 365 group limits to avoid administrative hassles

Office 365 group limits to rein in unchecked access, which could lead to unintended consequences.

An Office 365 group not only contains the membership list for a collection of people, but also manages provisioning and access to multiple services, such as Exchange and SharePoint. At a fundamental level, this means each time a user creates a group for something — a project, or perhaps a team — they add a SharePoint site, group inbox, calendar, Planner, OneNote and more.

Groups is also the foundation behind new services such as Microsoft Teams, Office 365’s chat-based collaboration app. In addition to messaging via channels, Teams enables users to chat with colleagues over voice and video calls, collaborate on documents and use tabs to display other relevant team information. Teams uses Office 365 Groups to produce a team within Teams, not only for the membership list, but also to connect the underlying group-enabled services for data storage.

Why Office 365 group limits are crucial

By default, Office 365 users can create groups without any restrictions. While this appears to be a great idea to prompt viral adoption, it is likely to backfire.

The strength of Office 365 Groups is only one group is needed to manage a team’s calendar, share files among colleagues, and hold group video calls and chats. However, this is not immediately obvious to workers as they explore available services.

For example, a user starts work on a project and, being new to Microsoft Planner, decides to add a plan with the name Project Z Plan. The user also sees he can create a group calendar in Outlook, which he names Project Z Calendar. He feels he could also use a SharePoint site for the project, so he makes one called Project Z. Later, the user discovers Microsoft Teams and feels it can help with the project collaboration efforts, so he generates a new team named Project Z Team.

Each of those actions creates a new group in Office 365. A combined lack of guidance and structure means the worker’s actions — intended to build a seamless fabric that connects multiple Office 365 services — added multiple silos and redundant resources.

This scenario illustrates the need for administrators to develop Office 365 group limits to avoid similar issues. Users need instruction on what tool to use and when, but also some understanding of what a group is in the context of the organization.

Checklist for a proper Office 365 Groups configuration

Before enabling Office 365 Groups for widespread adoption, the administrator should adjust the basic settings to provide limits and help users adhere to corporate standards.

At a minimum, the IT department should consider the following Office 365 Groups configuration:

  • the email address policy for group Simple Mail Transfer Protocol addresses;
  • usage guidelines;
  • group creation restrictions; and
  • group classifications.

Apart from the email address policy, all other configurations require an Azure Active Directory Premium license, as documented here.

Next, define the settings to adjust:

Policy to update

Configuration to implement

Reason for the change

Email address

groupname@contoso.com

The company will use the main domain name because all the mailboxes were moved to Office 365.

Usage guideline URL

https://contoso.sharepoint.com/usage

Shows users best practices for producing Office 365 Groups.

Group creation restrictions

Enables line managers group to add Office 365 Groups

Only managers can create new Office 365 Groups.

Group classifications

Low risk, medium risk and high risk

Enables users to classify groups and be aware of the sensitivity of the information within the group.

To make these changes, we use PowerShell to change the configuration in multiple places.

For the email address policy configuration, add a new policy that applies to all groups with the New-EmailAddressPolicy cmdlet:

$UserCredential = Get-Credential

$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $UserCredential -Authentication Basic -AllowRedirection

Import-PSSession $Session

New-EmailAddressPolicy -Name GroupsPolicy -IncludeUnifiedGroupRecipients -EnabledEmailAddressTemplates “SMTP:@contoso.com” -Priority 1

For the group configuration settings, use the Azure AD preview module. After connecting to Azure AD, use this code to confirm there is a template for group settings:

Connect-AzureAD -Credential $UserCredential

$Template = Get-AzureADDirectorySettingTemplate | Where {$_.DisplayName -eq “Group.Unified”}

$Setting = $Template.CreateDirectorySetting()

Next, define the group settings based on the configuration defined in the table and apply it:

# Configure the URL for our guidelines

$Settings[“UsageGuidelinesUrl”] = “https://contoso.sharepoint.com/usage”

# Disable group creation except for the Line Managers group

$Settings[“EnableGroupCreation”] = $False

$Settings[“GroupCreationAllowedGroupId”] = (Get-AzureADGroup -SearchString “Line Managers”).ObjectID

# Create our list of classifications

$Settings[“ClassificationList”] = “Low Risk,Medium Risk,High Risk”

# Apply the settings

New-AzureADDirectorySetting -DirectorySetting $Settings

Verify those settings with the following command:

(Get-AzureADDirectorySetting -All $true).Values

Office 365 Groups configuration
Use PowerShell to check the settings for Office 365 Groups.

With those adjustments in place, the new Office 365 Groups creation process changes, as shown below.

Office 365 Groups plan
A new plan shows the configuration settings defined by the Office 365 administrator.

Now, new Groups will have appropriate email addresses assigned — existing groups remain unchanged.

Office 365 Groups email
With a configuration in place for Office 365 Groups, the proper email address gets produced automatically.

Add boundaries and reduce complications

It’s important for administrators to employ Office 365 group limits. This practice prevents unchecked access to resources in the collaboration platform, which maintains order and avoids problems with redundancy and wasted resources.

Change key settings to put basic governance in place to steer users toward usage guidelines for Office 365 Groups. This helps the administrator ensure the groups are created correctly and can be managed properly as adoption grows.

How net neutrality repeal could affect health IT

The FCC’s net neutrality repeal vote could hurt video telemedicine providers and consumers and restrict the ability of less affluent healthcare providers to exchange data-intensive medical images, health IT advocates said.

The Federal Communications Commission’s 3-2 vote along partisan lines also widened another ideological fissure between ruling Republicans and congressional Democrats and had tech giants, such as Amazon, criticizing the net neutrality repeal as dangerous deregulation that would drive up consumer costs for internet bandwidth.

“It absolutely impacts telemedicine, and this dials back the whole forward momentum of digital health and innovation,” telehealth expert and advocate Nick Adkins, an advisory board member of telemedicine vendor Cloudbreak, told SearchHealthIT.

Repeal backers see free internet market

Supporters of repealing the two-year-old, Obama-era rules that treated internet service providers (ISPs) as public utilities that could not set different prices for different customers say repeal opens the internet service market to competition and more consumer choice.

It absolutely impacts telemedicine, and this dials back the whole forward momentum of digital health and innovation.
Nick AdkinsTelehealth expert

“We have a free and open internet going forward,” FCC Chairman Ajit Pai said on a Fox TV show on Dec. 15, the day after the vote. “The FCC and the FTC [Federal Trade Commission] going forward are going to make sure that happens.”

Under the net neutrality repeal, the FTC will share with the FCC enforcement of transparency rules that are part of the repeal – formally, the Restoring Internet Freedom Order. The FCC will look into complaints about ISPs slowing down or blocking legal internet traffic, and the FTC will investigate whether ISPs have engaged in illegal, unfair or deceitful business practices.

Slower internet for smaller users

Adkins argued that big ISPs (such as Comcast, AT&T and Verizon) could throttle bandwidth speeds for smaller customers under a deregulated system in which ISPs could provide “fast lanes” on the internet for big, cash-rich customers and slow processing for lesser customers.

According to net neutrality repeal critics, smaller, less well-heeled healthcare systems and providers could see delays or even an inability to send and receive MRI and CT scan results, and health researchers working in remote locations could experience slow or nonexistent internet connections.

“Especially with bidirectional video, you’re talking a significant amount of bandwidth,” Adkins said. “Large healthcare systems would be at an advantage. But if you’re a rural system or small practice or provider, you’re at a disadvantage.”

Another net neutrality repeal critic, Boston lawyer and health IT blogger David Harlow, said in an interview that, under net neutrality, there was a provision to allow ISPs to prioritize medical data traffic; that is gone now.

Questions about FTC enforcement

Harlow also questioned the enforcement and consumer protection capabilities of the FTC in the internet arena.

“It’s ad hoc, complaint-driven enforcement, which is really not the way to do this,” he said.

Harlow said he was most worried about how the FCC’s move could affect clinical applications requiring internet bandwidth.

He described a scenario under net neutrality repeal in which rural providers’ potential inability to quickly receive medical images could hurt ordinary medical consumers.

“If I’m in the emergency room in Montana and my treatment depends on accessing an MRI of my head taken in Boston when I was relatively healthy, then I want that image to be zapped to Montana instantaneously,” he said.

Harlow also noted that less data-hungry health IT applications, such as care coordination platforms, might be affected if ISPs charge vendors higher prices. Those vendors would then presumably pass the added costs onto the healthcare system, which would drive up healthcare costs for patients and profits for ISPs.

Potential millennial political issue

Politically, Adkins said, the net neutrality repeal could be a galvanizing issue for millennial smartphone and Amazon Echo users who may not be affected much by healthcare issues, yet could suddenly find themselves hit with sharply higher monthly internet fees.

“They’re relatively healthy. They’re on mom and dad’s insurance plans. They’re relatively insulated from this whole healthcare discussion,” he said. “Now, you’re going to talk about what’s really important to me: my internet connection.”