Tag Archives: product

8×8 Video Meetings replaces outdated offering in X Series

8×8 has replaced its old online meetings product with a new one that offers more features and is easier to use. The platform is available only to businesses subscribed to 8×8’s unified communications suite, but the company said it may make the service available as a stand-alone app in the future.

The old 8X8 video conferencing product — built with a mix of technologies, including some from Vidyo — didn’t cut it for many customers, executives said. The company used the Jitsi open source video conferencing software that it acquired from Atlassian last year to build the new product, called 8×8 Video Meetings.

“The feedback that we heard from our customers, and where we saw the market going, really necessitated that we … swap out our whole meetings product for a new and modern video communications solution,” said Meghan Keough, 8×8’s vice president of marketing.

The new platform lets guests join meetings without having to install a plug-in or download an app. 8×8 follows the lead of Cisco, BlueJeans, Highfive and others in embracing WebRTC, the latest standard for internet-based communications.

8×8 Video Meetings also gives users their own virtual meeting rooms and lets them live-stream meetings to YouTube. Other new features include more detailed analytics and the ability to remotely control a user’s desktop while in a meeting, which could be useful for IT troubleshooting.

“I like what 8×8 has done,” said Wayne Kurtzman, analyst at IDC. “They basically updated the system, made it more usable in more places in an enterprise and are not charging more for it.”

8×8 also rolled out an early access program for software to manage video conferencing hardware in conference rooms. The product offers a way to connect third-party video cameras from vendors like Logitech and Crestron (powered by minicomputers by Mac and Intel) to 8×8’s video services.

In July, Gartner named 8×8 one of four leaders in the unified communications as a service (UCaaS) market, alongside Microsoft, Cisco and RingCentral. But the research firm previously cautioned that 8×8 offered an unintuitive video conferencing platform with a limited set of features.

8×8 Video Meetings is part of the vendor’s X Series offering, which combines calling, messaging, meetings and contact center.

The company has attempted to differentiate itself from competitors by its own technology, rather than relying on partners. RingCentral, nearly twice as large as 8×8 by revenue, relies on Zoom for video calling and Nice inContact for contact center.

“8×8 is trying to be a complete one-cloud solution for communication and collaboration,” Kurtzman said.

Go to Original Article
Author:

VMware vSAN HCI: Complete stack or ‘vaporware’?

Days after VMware’s CEO proclaimed his vSAN product the winner in the hyper-converged infrastructure space, the CEO of VMWare rival Nutanix countered that VMware “sells a lot of vaporware.”

“We’re crushing Nu … I mean we’re winning in the marketplace,” VMware CEO Pat Gelsinger said during his opening VMworld keynote last week. “We’re separating from No. 2. We’re winning in the space.”

Two days later on Nutanix’s earnings call, CEO Dheeraj Pandey took a shot at VMware without mentioning the company by name. “We don’t sell vaporware,” he said, when referring to why Nutanix wins in competitive deals.

In an exclusive interview after the call, Pandey admitted the vaporware charge was aimed mostly at VMware’s vSAN HCI software.

Pat Gelsinger, VMware CEOPat Gelsinger

“VMware sells a lot of vaporware,” Pandey said. “A lot of that vaporware becomes evident to customers who buy that stuff. When bundled products don’t deliver on their promise, they call us. What we sell is not shelfware.”

Whatever VMware is selling with its vSAN HCI software, it is working. VMware reported license bookings of its vSAN HCI software grew 45% year-over-year last quarter, while Nutanix revenue and bookings slipped from last year. VMware’s parent Dell also claimed a 77% increase in orders of its Dell EMC VxRail HCI appliances that run vSAN software. Those numbers suggest Dell increased market share against Nutanix, even if Nutanix did better than expected last quarter following a disappointing period. IDC listed VMware as the HCI software market leader and Dell as the hardware HCI leader in the first quarter of 2019, with Nutanix second in both categories. Gartner lists Nutanix as the HCI software leader, but No. 2 VMware made up ground in Gartner’s first-quarter numbers.

Nutanix’s Pandey attributed at least some of VMware’s HCI success to bundling its vSAN software with its overall virtualization stack. Like VMware, Nutanix has its own hypervisor (AHV) and its share of hardware partners — including Dell — but VMware has a huge vSphere installed base to sell vSAN into.

Dheeraj Pandey, Nutanix CEODheeraj Pandey

Pandey said he was unimpressed by VMware’s Kubernetes and open source plans laid out at VMworld, which included Tanzu and Project Pacific. Both are still roadmap items but reflect a commitment from VMware to containers and open source software.

“That’s worse than vaporware, that’s slideware,” Pandey said of VMware’s announcements. “Everything works in slides. We’re based on Linux; we get a lot of leverage out of open source. AHV was based on Linux, and we’ve made it enterprise grade.”

Making vSAN part of its vSphere virtualization platform has paid off for VMware. Customers at VMworld pointed to their familiarity with VMware and vSAN’s integration with vSphere, and its NSX software-defined networking as reasons for going with vSAN HCI.

 “What really end up selling it for us was, we were already using VMware for our base product and the vast majority of the deliverables that our customers request is in vSphere,” said Lester Shisler, senior IT systems engineer at Harmony Healthcare IT, based in South Bend, Ind. “So whatever pain points we learned along the way with vSAN, we were going to have to learn [with a competing HCI product] as well, along with new software and new management and everything else.”

Matthew Douglas, chief enterprise architect at Sentara Healthcare in Norfolk, Va., said Nutanix was among the HCI options he looked at before picking vSAN.

“VMware was ultimately the choice,” he said. “All the others were missing some components. VMWare was a consistent platform for hyper-converged infrastructure. Plus, there was NSX and all these things that fit together in a nice, uniform fashion. And as an enterprise, I couldn’t make a choice of all these independent different tools. Having one consistent tool was the differentiator.”

Despite losing share, Nutanix’s last-quarter results were mixed. Its revenue of $300 million and billings of $372 million were both down from last year but better than expected following the disappointing previous quarter. Nutanix’s software and support revenue of $287 million increased 7%, a good sign for the HCI pioneer’s move to a software-centric business model. Nutanix also reported a 16% growth in deals over $1 million from the previous quarter.

However, operating expenses also increased. Sales and marketing spend jumped to $254 million from $183 million the previous year. Nutanix, which has never recorded a profit, lost $194 million in the quarter — more than double its losses from a year ago. It finished the quarter with $909 million in cash, down from $943 million last year.

Pandey said he is more concerned about growth and customer acquisition than profitability.

“Profitability is a nuanced word,” Pandey said. “We defer so much in our balance sheet. Right now we care about doing right by the customer when we sell them subscriptions.”

Go to Original Article
Author:

SAP Product Content Hub underpins CX initiatives in C/4HANA

SAP has introduced cloud-based software that lets C/4HANA customers distribute critical product information across e-commerce, marketing, sales and customer support teams.

The new Product Content Hub, released this week, includes APIs that companies can use to maintain up-to-date product catalogs, documentation and pricing on 1,500 e-commerce platforms, including Amazon, eBay and Google.

SAP built the software into C/4HANA to also provide users with a single tool for distributing vital product information across customer service, sales and marketing teams. C/4HANA is SAP’s cloud-based customer experience and e-commerce platform.

SAP developed Product Content Hub to improve product information management (PIM) within C/4HANA, said Riad Hijal, vice president of commerce strategy. AI built into C/4HANA can tag and route content from the PIM platform as managers make product updates.

Keeping product data on e-commerce sites currently is difficult because organizations often have disparate sources, said Constellation Research analyst Nicole France. Having one trusted place where users know the latest product information resides could save time for workers.

Product Content Hub launches SAP into the PIM market, where it will compete with products from InRiver, Salsify and Pimcore. SAP will differentiate itself from the pack by integrating its PIM platform with back-end product integration with in the company’s flagship ERP system as well as C/4HANA.

The reason tools like these are getting more attention is that companies are figuring out that when they rethink processes, it really doesn’t make sense to have a bunch of isolated islands of information.
Nicole FranceAnalyst, Constellation Research

However, using C/4HANA as a one-stop repository for managing product data will require users to change how they work, France said.

“The reason tools like these are getting more attention is that companies are figuring out that when they rethink [workflow] processes, it really doesn’t make sense to have a bunch of isolated islands of information,” France said.

However, even with Product Content Hub, SAP customers are likely to continue using some separate content management repositories, such as Box, OpenText and Microsoft Excel.

“The idea here is not to tell customers to stop using any existing tools that do the job,” Hijal said.

SAP went live with Product Content Hub early this year, but waited to formally announce it to iron out technical issues and add a few features, Hijal said. Monthly subscription pricing varies, depending on the number of products on the SaaS platform and the number of distribution channels.

Go to Original Article
Author:

New Gurucul network traffic analysis tool debuts

Gurucul has launched Network Behavior Analytics, a new network traffic analysis product that uses machine learning analytics to identify cyberthreats.

This tool identifies and monitors unusual behavior from any entity, including workstations; servers; firewalls; robotic process automation tasks; IoT devices, such as CCTV or vending machines; operational technology infrastructure; and point-of-sale devices.

Using machine learning algorithms on network flows and packet data, Network Behavior Analytics identifies unknown threats by creating behavior baselines for each device on a network. The product uses network flow data such as source and destination IPs, protocol, bytes in and out, and Dynamic Host Configuration Protocol logs to correlate IP-specific data to machines and users.

Network Behavior Analytics is integrated with the Gurucul User and Entity Behavior Analytics platform to give users a full view across the network, including identity, access and activity on enterprise apps and systems. The tool comes with prepackaged machine learning models designed to run on high-frequency network data streams.

According to Gurucul, Network Behavior Analytics can identify threats such as zero-day exploits, fileless malware and ransomware. It does this by detecting behaviors that are unusual to the baseline it created, related lateral movement within the network, command and control communication, suspicious account activity from a compromised account, and access misuse. The framework can detect threats in real time, in addition to advanced persistent threats or stealth attacks that are dormant between various stages of cyberattack.

Monitoring network traffic to identify threats has become more common in recent years, with new tools emerging to help enterprises understand their network activity. In July, Datadog added a product called Network Performance Monitoring to its cloud monitoring program to give admins visibility into network connections and data flows.

The Awake Security Platform is another product that continuously monitors a network environment and can detect and respond to threats. It provides a complete view of each user, device and application, and it is able to detect malicious intent.

Go to Original Article
Author:

AWS Summit widens net with services for containers, devs

NEW YORK — AWS pledges to maintain its torrid pace of product and services innovations and continue to expand the breadth of both to meet customer needs.

“You decide how to build software, not us,” said Werner Vogels, Amazon vice president and CTO, in a keynote at the AWS Summit NYC event. “So, we need to give you a really big toolbox so you can get the tools you need.”

But AWS, which holds a healthy lead over Microsoft and Google in the cloud market, also wants to serve as an automation engine for customers, Vogels added.

“I strongly believe that in the future … you will only write business logic,” he said. “Focus on building your application, drop it somewhere and we will make it secure and highly available for you.”

Parade of new AWS services continues

Vogels sprinkled a series of news announcements throughout his keynote, two of which centered on containers. First, Amazon CloudWatch Container Insights, a service that provides container-level monitoring, is now in preview for monitoring clusters in Amazon Elastic Container Service and Amazon Fargate, in addition to Amazon EKS and Kubernetes. In addition, AWS for Fluent Bit, which serves as a centralized environment for container logging, is now generally available, he said.

Serverless compute also got some attention with the release of Amazon EventBridge, a serverless event bus to take in and process data across AWS’ own services and SaaS applications. AWS customers currently do this with a lot of custom code, so “the goal for us was to provide a much simpler programming model,” Vogels said. Initial SaaS partners for EventBridge include Zendesk, OneLogin and Symantec.

Focus on building your application, drop it somewhere and we will make it secure and highly available for you.
Werner VogelsCTO, AWS

AWS minds the past, with eye on the future

Most customers are moving away from the concept of a monolithic application, “but there are still lots of monoliths out there,” such as SAP ERP implementations that won’t go away anytime soon, Vogels said.

But IT shops with a cloud-first mindset focus on newer architectural patterns, such as microservices. AWS wants to serve both types of applications with a full range of instance types, containers and serverless functionality, Vogels said.

He cited customers such as McDonald’s, which has built a home-delivery system with Amazon Elastic Container Service. It can take up to 20,000 orders per second and is integrated with partners such as Uber Eats, Vogels said.

Vogels ceded the stage for a time to Steve Randich, executive vice president and CIO of the Financial Industry Regulatory Authority (FINRA), a nonprofit group that seeks to keep brokerage firms fair and honest.

FINRA moved wholesale to AWS and its systems now ingest up to 155 billion market events in a single day — double what it was three years ago. “When we hit these peaks, we don’t even know them operationally because the infrastructure is so elastic,” Randich said.

FINRA has designed the AWS-hosted apps to run across multiple availability zones. “Essentially, our disaster recovery is tested daily in this regard,” he said.

AWS’ ode to developers

Developers have long been a crucial component of AWS’ customer base, and the company has built out a string of tool sets aimed to meet a broad set of languages and integrated development environments (IDEs). These include AWS Cloud9, IntelliJ, Python, Visual Studio and Visual Studio Code.

VS Code is Microsoft’s lighter-weight, browser-based IDE, which has seen strong initial uptake. All the different languages in VS Code are now generally available, Vogels said to audience applause.

Additionally, AWS Cloud Development Kit (CDK) is now generally available with support for TypeScript and Python. AWS CDK makes it easier for developers to use high-level construct to define cloud infrastructure in code, said Martin Beeby, AWS principal developer evangelist, in a demo.

AWS seeks to keep the cloud secure

Vogels also used part of his AWS Summit talk to reiterate AWS’ views on security, as he did at the recent AWS re:Inforce conference dedicated to cloud security.

“There is no line in the sand that says, ‘This is good-enough security,'” he said, citing newer techniques such as automated reasoning as key advancements.

Werner Vogels, AWS CTO
Werner Vogels, CTO of AWS, on stage at the AWS Summit in New York.

Classic security precautions have become practically obsolete, he added. “If firewalls were the way to protect our systems, then we’d still have moats [around buildings],” Vogels said. Most attack patterns AWS sees are not brute-force front-door efforts, but rather spear-phishing and other techniques: “There’s always an idiot that clicks that link,” he said.

The full spectrum of IT, from operations to engineering to compliance, must be mindful of security, Vogels said. This is true within DevOps practices such as CI/CD from both an external and internal level, he said. The first involves matters such as identity access management and hardened servers, while the latter brings in techniques including artifact validation and static code analysis.

AWS Summit draws veteran customers and newcomers

The event at the Jacob K. Javits Convention Center drew thousands of attendees with a wide range of cloud experience, from FINRA to fledgling startups.

“The analytics are very interesting to me, and how I can translate that into a set of services for the clients I’m starting to work with,” said Donald O’Toole, owner of CeltTools LLC, a two-person startup based in Brooklyn. He retired from IBM in 2018 after 35 years.

AWS customer Timehop offers a mobile application oriented around “digital nostalgia,” which pulls together users’ photographs from various sources such as Facebook and Google Photos, said CTO Dmitry Traytel.

A few years ago, Timehop found itself in a place familiar to many startups: Low on venture capital and with no viable monetization strategy. The company created its own advertising server on top of AWS, dubbed Nimbus, rather than rely on third-party products. Once a user session starts, the system conducts an auction for multiple prominent mobile ad networks, which results in the best possible price for its ad inventory.

“Nimbus let us pivot to a different category,” Traytel said.

Go to Original Article
Author:

Microsoft Partner Network licensing changes put channel on alert

Pending Microsoft Partner Network policy changes affecting product licensing have alarmed some partners, with more than 5,000 people signing a petition to register their disapproval.

A key area of contention is Microsoft’s plan to eliminate the internal use rights (IUR) association with product licenses included in Microsoft Action Pack and those included with a competency. Action Pack gives partners access to product licenses and technical enablement services, through which they can create applications and develop service offerings. Microsoft positions Action Pack, which ranges from OSes to business applications, as a way for new MPN members to get started. Competencies are business specializations in areas such as cloud business applications and data analytics.

The revised IUR association policy will compel Microsoft partners to pay for licenses they have been using in-house under the current Microsoft Partner Network membership terms. The new policy goes into effect July 1, 2020.

Paul Katz, president and chief software architect at EfficiencyNext, a software developer in Washington, D.C., said the policy change will cause the company to purchase five Office 365 Enterprise E3 seats. In addition, EfficiencyNext stands to lose the Microsoft Azure credits the company uses to run its website, although Katz said the policy change’s effect on the Azure benefit is somewhat ambiguous at this point. The licensing fees coupled with the potential loss of Azure credits would result in an annual net cost of about $2,400 a year, he added.

“That’s a thorn in the side, but it doesn’t change our world,” Katz said.

The stakes are much higher, he said, for larger partners with more licenses they will need to pay for. A partner with 100 Office 365 E3 licenses, for example, would need to shell out $24,000 annually, based on the $20 per user, per month seat fee.

Charles WeaverCharles Weaver

Charles Weaver, CEO of MSPAlliance, an association representing managed service providers (MSPs), said he found out about the Microsoft policy change when a board member sent him the online petition. “It’s going to sting most of them,” he said of the licensing shift’s effect on service providers. “It is probably not going to be received well by the rank-and-file MSPs.”

The partner petition, posted on Change.org, stated Microsoft’s policies represent unfair treatment, noting partners “have been so loyal to the Microsoft business.” Microsoft couldn’t be reached for comment.

Microsoft Partner Network: Policy consequences

Katz advised partners to “get licensed up” in light of the IUR change, noting that Microsoft has been aggressive in the past with software asset management engagements.

Weaver, however, said he hopes that won’t be the case.

“I can’t think of anything more destructive to the relationship between Microsoft and the channel than that,” he said, noting the audits software vendors pursue tend to target large customers, where millions of dollars are at stake.

People don’t want to come to terms with the fact that we are resellers and we don’t, in any way, shape or form, control the products.
Stanley LouissaintPresident, Fluid Designs Inc.

In addition to causing some partners to incur higher licensing costs, the Microsoft IUR policy shift could also hinder partners’ use-what-you-sell strategies. Resellers and service providers that use a vendor’s products to help run their business gain technology experience, which they can transfer to end customers when deploying those products.

Katz said “dogfooding” — as in, eating one’s own dog food — is the best way to test products, especially for companies that can’t afford to set up a separate test environment.

But the restriction on IUR would discourage this approach and could cause Microsoft to miss out on opportunities down the road.

Weaver pointed to a potential unintended consequence of Microsoft’s action: “They stop the freeloading of MSPs from using their software, as they look at it, and they lose potentially thousands of MSPs who no longer try that stuff out and no longer have access to it and may go to different vendors and different solutions.”

A part of doing business

Stanley LouissaintStanley Louissaint

Stanley Louissaint, president of Fluid Designs Inc., an IT services provider in Union, N.J., said the MPN policy changes don’t affect his company but noted the unease among partners. Louissaint suggested changes in vendor policies are simply part of doing business as a channel partner.

“People don’t want to come to terms with the fact that we are resellers and we don’t, in any way, shape or form, control the products,” he said. “If [Microsoft] changes how they want to deal with us, it is what it is.”

Louissaint said the bottom line is Microsoft wants partners to become paying customers when using the vendor’s products to run their businesses. As for creating test beds to assess products, channel partners still can download software on a trial basis — for up to 180 days, in some cases, he added.

Jeff Aden, executive vice president of marketing and business development at 2nd Watch, a Seattle MSP, said the new policy “is not going to change what we do” unless there is an unforeseen effect. 2nd Watch is a Microsoft Gold partner and an AWS Premier Consulting Partner.

EfficiencyNext’s Katz said the licensing changes don’t mean Microsoft is greedy. He noted Windows Insider members can download preview versions of Windows for free, and there is a community version of Visual Studio that is free for up to five users in nonenterprise organizations.

“They are still a great company, and we are still happy to be working with them,” he said.

Go to Original Article
Author:

IT experts exchange container security tips and caveats

News
Stay informed about the latest enterprise technology news and product updates.

Real-world container security requires users to dig in to the finer points of container, host, Kubernetes and application configurations.


BOSTON — Blue-chip IT shops have established production container orchestration deployments. Now, the question…

“;
}
});

/**
* remove unnecessary class from ul
*/
$(“#inlineregform”).find( “ul” ).removeClass(“default-list”);

/**
* Replace “errorMessageInput” class with “sign-up-error-msg” class
*/
function renameErrorMsgClass() {
$(“.errorMessageInput”).each(function() {
if ($(this).hasClass(“hidden”)) {
$(this).removeClass(“errorMessageInput hidden”).addClass(“sign-up-error-msg hidden”);
} else {
$(this).removeClass(“errorMessageInput”).addClass(“sign-up-error-msg”);
}
});
}

/**
* when validation function is called, replace “errorMessageInput” with “sign-up-error-msg”
* before return
*/
function validateThis(v, form) {
var validateReturn = urValidation.validate(v, form);
renameErrorMsgClass();
return validateReturn;
}

/**
* DoC pop-up window js – included in moScripts.js which is not included in responsive page
*/
$(“#inlineRegistration”).on(“click”,”a.consentWindow”, function(e) {
window.open(this.href, “Consent”, “width=500,height=600,scrollbars=1”);
e.preventDefault();
});

is how to make them fully secure within large, multi-tenant infrastructures.

For starters, users must make changes to default settings in both Docker and Kubernetes to close potential security loopholes. For example, a default component of a container image, called docker.sock, that’s mounted without proper security tools to control its usage is vulnerable to an attack that can use it to access the host operating system and then back-end databases to exfiltrate data. Similarly, the Kubernetes API’s default setting could potentially let containers access host operating systems through a malicious pod.

“Containers also have the same problem as any other VM: They can talk to each other via an internal network,” said Jason Patterson, application security architect at NCR Corp., an Atlanta-based maker of financial transaction systems for online banking and retailers, in a presentation at the DevSecCon security conference held here this week. “That means that one misconfiguration can compromise pretty much all the containers in the environment.”

Container security configuration settings are critical

NCR uses Red Hat’s OpenShift, which restricts the Kubernetes API settings out of the box, but OpenShift users must set up security context constraints, Patterson said.

Etienne Stalmans at DevSecCon
Heroku’s Etienne Stalmans presents on container security at DevSecCon.

In general, it’s best to constrain a user’s permissions and each container’s capabilities as tightly as possible and, ideally, configure container images to whitelist only the calls and actions they’re authorized to perform — but this is still uncommon, he added.

It’s possible to limit what a container root user can do outside the container or the host on which the container runs, said Etienne Stalmans, senior security engineer at Heroku, based in San Francisco, in a separate DevSecCon presentation. To do this, container administrators can adjust settings in seccomp, an application sandboxing mechanism in the Linux kernel, and configure application permissions or capabilities.

“That still makes them a privileged user, but not outside the container,” Stalmans said. “Overall, it’s best to drop all capabilities for all container users, and then add them back in as required.”

Some highly sensitive applications require isolation provided by a hypervisor to remove any possibility that an attacker can gain host access. Vendors such as Intel, Google and Microsoft offer modified hypervisors specifically tuned for container isolation.

DevSecCon presenters also touched on tools that can be used to minimize the attack surface of container and host operating systems.

Beeline, which sells workforce management and vendor management software, uses an Oracle tool called Smith that strips out unneeded OS functions. “That shrank our Docker image sizes from as much as 65 MB to 800 KB to 2 MB,” said Jason Looney, enterprise architect at Beeline, based in Jacksonville, Fla.

Container security experts weigh host vs. API vulnerabilities

Overall, it’s best to drop all capabilities for all container users, and then add them back in as required.
Etienne Stalmanssenior security engineer, Heroku

Most of the best-known techniques in container security restrict attackers’ access to hosts and other back-end systems from a compromised container instance. But prevention of unauthorized access to APIs is critical, too, as attackers in recent high-profile attacks on AWS-based systems targeted vulnerable APIs, rather than hosts, said Sam Bisbee, chief security officer of Boston-based IT security software vendor Threat Stack, in a DevSecCon presentation.

Attackers don’t necessarily look for large amounts of data, Bisbee added. “Your security policy must cover the whole infrastructure, not just important data,” he said.

Kubernetes version 1.8 improved API security with a switch from attribute-based access control to role-based access control (RBAC). And most installers and providers of Kubernetes, including cloud container services, now have RBAC Kubernetes API access by default. But users should go further with configuration settings that prevent untrusted pods from talking to the Kubernetes API, Stalmans said.

“There is some discussion [in the Kubernetes community] to make that the default setting,” he said. It’s also possible to do this programmatically from container networking utilities, such as Calico, Istio and Weave. But “that means we’re back to firewall rules” until a new default is decided, he said.

Dig Deeper on Managing Virtual Containers

PlayerUnknown’s Battlegrounds Full Product Release Now Available on Xbox One – Xbox Wire

Today, the Full Product Release (1.0) update for PlayerUnknown’s Battlegrounds (PUBG) released for new and existing owners across the Xbox One family of devices. This is a big moment for the PUBG Xbox community, now over nine million players strong, who have been every bit an important part of the development process since we first launched in Xbox Game Preview in December 2017. With the support of fans and the team at Microsoft, it’s been an incredible journey and we’re just getting started.

The Full Product Release comes with several exciting updates, including the Xbox One debut of the Sanhok Map, available today, along with Event Pass: Sanhok, which unlocks awesome rewards for leveling up and completing missions. The Sanhok Map is included with the Full Product Release 1.0 update, and Event Pass: Sanhok can be purchased in the Microsoft Store or the PUBG in-game Store beginning today. For additional details on all of the new features included in the Full Product Release update today and in the weeks ahead, click here.

While Full Product Release represents an exciting milestone for PUBG on Xbox One, it does not represent the end of the journey. The game will continue to be updated and optimized, and we have an exciting roadmap of new features and content ahead in the months to come, including the winter release of an all-new snow map.

The Full Product Release of PUBG for Xbox One is available for $29.99 USD digitally and as a retail disc version at participating retailers worldwide. If you already own the Xbox Game Preview version of PUBG on Xbox One you will receive a content update automatically today at no additional cost.

As shared previously, we’re also providing some special bonuses both to new players and those who have supported PUBG over the past nine months.

To enhance the ultimate PUBG experience on Xbox, fans can also look forward to the PlayerUnknown’s Battlegrounds Limited Edition Xbox Wireless Controller, which is now available for pre-order at the online at the Microsoft Store and starts shipping to retailers worldwide on October 30 for $69.99 USD.

Be sure to tune into Mixer’s very own HypeZone PUBG Channel to catch the most exciting, down-to-the-wire PUBG action that give viewers the opportunity to discover streamers of all levels during the most intense moments of the game.

Whether you’re already a player or your chicken dinner hunt starts today – now is the best time to jump into PUBG on Xbox One!

Cisco refused to participate in NSS Labs report on SD-WAN

Cisco refused to activate the Viptela software-defined WAN product NSS Labs bought for testing, leaving the research firm with a noticeable hole in its recent comparative report on SD-WAN vendors.

Cisco did not provide a reason for refusing to activate the product NSS Labs had purchased for between $30,000 and $40,000, NSS Labs CEO Vikram Phatak said this week. “There was no reason given other than, effectively, they didn’t want to be tested (for the NSS Labs report).”

Cisco’s action marked the first time a vendor had refused to turn on a product NSS Labs had bought for evaluation, Phatak said. Cisco’s Viptela team had initially told NSS Labs it would support the test, which led the firm to buy the product.

“That’s a first for us, candidly,” Phatak said. “And given Cisco’s ethical rules and so on — rules of conduct — I’m in shock because normally, they’re pretty straightforward to work with.”

Cisco refused to discuss the matter, saying in a statement “We believe our customer traction, standing in the market and the continued productive innovation we’re driving speak for themselves.”

NSS Labs wants a refund

NSS Labs wants Cisco to refund the money spent on Viptela. It is hoping it can get the money back without going to court.

“I hope it doesn’t come to that,” Phatak said. “We haven’t talked to any lawyers. I’m assuming that we’ll be able to have the conversation and get our money back.”

Typically, NSS Labs buys products, and the vendors turn them on like they would for any other customer.

“If someone says they don’t want to be tested, we say, ‘That’s great, but if a product is good enough to be sold to the public, it’s good enough to be tested,'” Phatak said. “We’re going to buy it, and we’ll report to the public.”

That’s a first for us, candidly. And given Cisco’s ethical rules and so on — rules of conduct — I’m in shock.
Vikram PhatakCEO, NSS Labs

NSS Labs noted Cisco’s refusal to activate the Viptela purchase in its SD-WAN Comparative Report, which was the company’s first SD-WAN test. Not having Cisco in the evaluation left out one of the largest SD-WAN vendors and a major tech company.

In the first quarter, London-based IHS Markit listed Cisco as No. 4 in the SD-WAN market, just behind Silver Peak. VMware was first with a 19% share, followed by Aryaka with 18%.

The NSS Labs report, released this month, compared the products of nine vendors, including VMware’s NSX SD-WAN, formerly VeloCloud. VMware is Cisco’s largest competitor.

NSS Labs had also planned to include Silver Peak in the comparison but noted it was unable to obtain the product in time for testing.

Tech companies often cite recommended ratings in NSS Labs reports in marketing materials. In April, Cisco highlighted in a blog post the organization’s “recommended” rating for the Cisco Advanced Malware Protection for Endpoints product.

Based on its recent SD-WAN tests, NSS Labs recommended products from VMware, Talari Networks and Fortinet and listed products from Citrix Systems, FatPipe Networks, Forcepoint and Versa Networks as “verified.” Tech buyers should consider recommended and verified products as candidates for purchase, according to NSS Labs.

The company issued “caution” ratings for Barracuda Networks and Cradlepoint, which means companies should not deploy their products without a comprehensive evaluation, NSS Labs said.

The Microsoft AI Idea Challenge – Breakthrough Ideas Wanted!

This post is authored by Tara Shankar Jana, Senior Technical Product Marketing Manager at Microsoft.

All of us have creative ideas – ideas that can improve our lives and the lives of thousands, perhaps even millions of others. But how often do we act on turning those ideas into a reality? Most of the time, we do not believe in our ideas strongly enough to pursue them. Other times we feel like we lack a platform to build out our idea or showcase it. Most good ideas don’t go beyond those initial creative thoughts in our head.

If you’re a professional working in the field of artificial intelligence (AI), or an aspiring AI developer or just someone who is passionate about AI and machine learning, Microsoft is excited to offer you an opportunity to transform your most creative ideas into reality. Join the Microsoft AI Idea Challenge Contest today for a chance to win exciting prizes and get your project featured in Microsoft’s AI.lab showcase. Check out the rules, terms and conditions of the contest and then dive right in!

The Challenge

The Microsoft AI Idea Challenge is seeking breakthrough AI solutions from developers, data scientists, professionals and students, and preferably developed on the Microsoft AI platform and services. The challenge gives you a platform to freely share AI models and applications, so they are reusable and easily accessible. The ideas you submit are judged on the parameters shown in the figure below – essentially half the weight is for the originality of your idea, 20% for the feasibility of your solution, and 30% for the complexity (i.e. level of sophistication) of your implementation.

The Microsoft AI Challenge is accepting submissions between now and October 12th, 2018.

To qualify for the competition, individuals or teams are required to submit a working AI model, test dataset, a demo app and a demo video that can be a maximum of three minutes long. We encourage you to register early and upload your projects soon, so that you can begin to plan and build out your solution and turn in the rest of your materials on time. We are looking for solutions across the whole spectrum of use cases – to be inspired, take a look at some of the examples at AI.lab.

Prizes

The winners of the first three places in the contest will respectively receive a Surface Book 2, a DJI Drone, and an Xbox One X.

We hope that’s motivation to get you started today – good luck!

Tara