Page 3,744«..1020..3,7433,7443,7453,746..3,7503,760..»

Axway to Provide Syncplicity for Remote Work at no Cost to Help Businesses With the Transition to a Remote Workforce – Yahoo Finance

Companies with surge in remote workforce now have free, secure resource for online storage and collaboration

PHOENIX, March 26, 2020 /PRNewswire/ -- Axway (Euronext: AXW.PA), a leader in enterprise integration technology, today announced that the company is commencing a temporary initiative to provide Syncplicity for Remote Work file sharing and content collaboration at no cost. Syncplicity by Axway can be deployed quickly to provide immediate support and relief for users who are new to working remotely. The step is designed to help employees transition to a remote work setting by providing easy access to corporate files and data, while ensuring data security, governance and auditability.

"We have a strong solution that can help teams work remotely and collaborate securely," said Axway CEO, Patrick Donovan. "As a service to enterprises who need to help large portions of their workforce transition to working remotely, we decided to offer Syncplicity for free so they can adapt to the current circumstances."

Specifically, this initiative will provide access to the Enterprise Edition (EE) of Syncplicity, including cloud storage. Furthermore, Axway will host remote work training sessions and provide other resources to help companies ramp up administration, security and user access and collaboration.

"We understand the needs and challenges companies face as they transition to a remote workforce in record time. We also understand the importance of doing so, securely. Axway has been providing secure file transfer and data sharing solutions to thousands of companies around the world for over 20 years," said Donovan. "Syncplicity is one of the many integration solutions we provide and we hope this action gives companies and remote workers peace of mind in this time of uncertainty."

Syncplicity provides companies the ability to provision employee accounts and to include storage for their users. With this initiative, global teams can access and share folder and files remotely, and collaborate efficiently while their IT departments retain overall control. At the end of the free period, customers willhave the option to continue the service or migrate their data off of Syncplicity.

Click this link for more information about Syncplicity for Remote Work at no cost.

About Axway

Axway gives heritage IT infrastructure new life, helping more than 11,000 customers use what they already have to invent their digital journeys, add new business capabilities, and drive growth. With the future-proof AMPLIFY platform which combines APIs, B2B integration, content services, and digital ecosystems we guide innovation and enhance the customer experience faster and more securely than ever. In business for more than 20 years, Axway employs over 1,800 people in 18 countries. axway.com.

Media Contact:

Joshua Molinajmolina@axway.com

View original content:http://www.prnewswire.com/news-releases/axway-to-provide-syncplicity-for-remote-work-at-no-cost-to-help-businesses-with-the-transition-to-a-remote-workforce-301030173.html

SOURCE Axway

Follow this link:
Axway to Provide Syncplicity for Remote Work at no Cost to Help Businesses With the Transition to a Remote Workforce - Yahoo Finance

Read More..

Autodesk Announces AutoCAD 2021Includes Free Extended Access to Cloud Tools – Architosh

New AutoCAD 2021 boasts excellent new features that will streamline the work of AutoCAD users on desktop, web, and mobile, integrating with Google Drive and AutoCAD Web App, plus lots more.

The new Autodesk AutoCAD 2021 boasts many excellent new features while retaining its relationship with online versions and other collaborative tools on the cloud and on mobile. AutoCAD Web and AutoCAD Mobile are included with a subscription to AutoCAD 2021, but due to the present pandemic situation, Autodesk has extended the temporary free access for several flagship cloud collaboration products through 31 May 2020.

Also, the company has announced that AutoCAD 2021 for Mac is coming soon and will also boast the new Xref Compare and floating command-line features.

The new version of AutoCAD features a new Drawings History feature that, along with Xref Compare, help you understand changes made to AutoCAD documents over time. Drawing History provides insights on the evolution of your drawings by allowing you to see a list of changes over time and gain insights by comparing previous versions of the file.

The new Drawing History feature will help deliver insight to customers on the evolution of documents.

Such a feature is quite useful for many purposes. Particularly with projects with intense iteration developmentiterations within iterationsone can use this feature to go back to iterative designs and decisions without having to record those items in Save-As versions of the file.

MORE: INSIDER: Marcus OBrien of AutodeskA Conversation About AutoCAD for Mac and Other Platforms

Xref Compare adds tod the already popular DWG Compare feature by allowing you to compare what has changed in an updated Xref. Red color is used to show what is not in the current (newer) Xref doc while Green color highlights what is in the new Xref doc. Red represents the past, Green the current and grey is what is the same.

Perhaps the best new features is the new Xref Compare which enables users to see visually what has changed between an outdated and updated Xref document.

Blocks get enhancement via the new ability to sync recent blocks in a drawing to a cloud storage location and then access them from desktop or web. (You can read more about Block enhancements here).

AutoCAD is already considered one of the fastest 2D CAD platforms in the world, but Autodesk continues to speed things up. Pan, zoom, orbit and similar screen navigation tasks are now powered via multi-core processor support. Regeneration of the screen happens automatically with multicore processor support and this extends to viewing 3D models as well.

AutoCAD 2021 adds the integration of Google Drive and AutoCAD web app. When users are browsing AutoCAD files in Google Drive they can now open those drawings directly in the AutoCAD web app, in addition to opening them in AutoCAD Mobile. And users can now connect and link up their Google Drive from within AutoCAD Web.

Businesses continue moving to collaborate in the cloud using Google Drive at a rapid rate, and as a result, were seeing the adoption of tools like the AutoCAD web app by many of our customers, says Alexander Vogenthaler, Director, Product Management at Google Drive. We are excited to launch a new integration with Autodesk, enabling our joint customers to open and save DWG files stored in Drive in the AutoCAD web app and helping our customers access the power of AutoCAD from desktop, web, or mobile.

Our subscribers will really appreciate what our development teams have been working on to modernize AutoCAD based on their feedback, says Marcus OBrien, Director of AutoCAD product management. This new release delivers enhancements and features that will make a difference in efficiency and productivity right away.

To learn more about AutoCAD 2021, visit here.

Architosh Analysis and Commentary

In many ways, Xref Compare is more valuable than DWG Compare. Architects, in particular, are constantly using Xref documents from engineers, like structural engineers, and to be able to visually understand what has changed speeds comprehension and makes it more certain that all the areas in the architects work get addressed with updated engineering data coming through the Xref.

The new multicore processor support for screen navigation is also a welcome addition, as rival CAD platforms have recently added such features in the past few versions or years. The multicore support doesnt just extend to 2D however, as it may in rival programs, complex 3D models are also more responsive due to multicore optimizations.

We hope to speak with Autodesk executives soon about AutoCAD 2021 once the new Mac version is released and we will dive into all versions, including cloud and mobile.

Related

Continue reading here:
Autodesk Announces AutoCAD 2021Includes Free Extended Access to Cloud Tools - Architosh

Read More..

UPDATED (March 25) Free Tools, Resources, and Financial Help for Business Owners Hit by Covid-19 – Inc.

A growing number of companies are offering their online tools, classes, and resources at no costin response to the impact on small-business owners from the coronavirus. Below is a list that Inc. is curating andcontinuously updating.

Ad credits and grants

Telecom giant Verizon isdonating $2.5 million to nonprofit Local Initiatives Support Corporation for its Small Business COVID-19 Recovery Fund, which will use the funds to provide grants of up to $10,000 to struggling businesses.

GoFundMe, the social fundraising platform, has launched the Small Business Relief Initiative, partnering with Yelp to provide small-business owners withgrants and resources. GoFundMe and Yelp have each donated $500,000 to theSmall Business Relief Fund, and it is open foranyone to make a donation.There will also be $500 matching grants to qualifying businesses that raise at least $500 on GoFundMe.

Legal and employment issues

Marketing

Business Warrior, the software platform for small businesses, is offering 12 months free access to its software and support, including personalized recommendations to drive new customers and improve profitability during this uncertain time.

Gift certificates, gift boxes, and more ways to support small businesses

Verizon has launched 'Pay it Forward Live,' a weekly charitable entertainment series, beginning at 8 p.m. ET on March 26, to supportsmall businesses affected by Covid-19. Dave Matthews will be the first among other artists to perform concerts from their homes that will stream live on Verizon's Twitter accountand on Yahoo Entertainment and encourage viewers to support their favorite local businesses.

Keep Your City Smiling, born out of the Covid-19 crisis, sells gift boxes of products to benefitstrugglinglocal businesses. It is currently focused on Seattle small businesses, but it's expected to expand to Los Angeles, San Francisco, and Portland--and more cities to come.

Social media services

Search engine optimization

Moz, the SEO software company, is offering free access to more than a dozen of itsMoz Academy SEO coursesthrough May 31, covering everything from keyword research to backlink basics and more.

Presentations design

E-commerce

Cloud storage

WFH skills and tools

Igloo Software, a digital workplace solutions provider, is offering its Business Continuity Bundle for free through July 6, which includes digital workplace tools to keep employees productive and supported through the crisis.

Team videoconferencing

Cybersecurity

Wellness

Fitness startup ClassPass has launched livestream classes for studios, with all proceeds going back to studios through June 1.The fitness startup is encouraging members to donate to their favorite studios, andit plans to match those donations upto $1 million. ClassPass also offers free access to 2,000 on-demand workouts.

Published on: Mar 26, 2020

View post:
UPDATED (March 25) Free Tools, Resources, and Financial Help for Business Owners Hit by Covid-19 - Inc.

Read More..

Operationalizing NSA Guidance (or any Guidance, For That Matter!) – Infosecurity Magazine

In January, the NSA issued guidance titled: Mitigating Cloud Vulnerabilities. With security organizations already overburdened with too many threat intelligences feeds, alerts, mandates and fire drills, its understandable that this information might go unnoticed, or be tossed onto the well get to it sooner or later pile.

However when an organization like the NSA speaks, it is generally a good idea to listen. Which raises the question: how does one operationalize guidance from the NSA and other elite security organizations? The short answer is the same as it is for all cybersecurity undertakings: prioritization and outcomes. Lets examine this approach, using the recent NSA guidance as our use case.

Vulnerability Components

The NSA broke down its guidance into four key vulnerabilities: misconfigurations, poor access control, shared tenancy vulnerabilities and supply chain vulnerabilities. It also provided this handy chart to articulate the prevalence and sophistication of exploit for each.

This chart provides clear prioritization for security professionals. In a time where resources (particularly skills on staff) are strained, it is critical to attack problems that represent the highest risk. Here is a look at each.MisconfigurationsIf weve learned nothing else about threat actors over the years, its that they want a good return on investment. This means theyll take the easiest route to stealing data, every time. It is for this reason that misconfigurations represent such a risk to enterprises there is nothing easier than stealing data left exposed by bad configuration management.

Cloud configuration management poses a particularly vexing problem because with the advent of DevOps, the cloud environment is constantly changing. This makes cloud monitoring a major challenge and, within that discipline, configuration and policy management need to transition to a continuous state. Here are the key elements of a modern cloud monitoring program:

Creating a continuous cloud monitoring program is the most important thing enterprises can do to operationalize the NSA guidance. Now lets look at the next most important thing.

Cloud Access ControlExploiting poor access control in cloud systems takes a higher degree of sophistication than simply looking for exposed data, so it is not yet a major contributor to cloud data breaches. However, the problem is widespread and stands to become such a contributor, if organizations do not improve their identity and access control processes.

The good news is the first step to ensuring strong access control in the cloud is also the first step to achieving continuous cloud monitoring visibility. Because cloud services and systems can be spun up by virtually anyone in an organization, it is critical to have the visibility required to understand when this is happening, so security pros can ensure proper access control.

The recurring theme in the NSA guidance is multifactor authentication. Enterprises can dramatically improve the integrity of cloud access control if they implement multifactor authentication across all cloud resources. Ideally, this will be part of a broader enterprise identity and access management (IAM) program that brings all enterprise resources on premises, in the cloud, and hybrid under appropriate identity governance.

Shared Tenancy and Supply ChainIm lumping these together because, for the most part, they are primarily the responsibility of cloud service providers, not the enterprise, and exploitation requires a high degree of sophistication. Therefore, as we sit here today, they are not a likely source of risk. The compromised hypervisor has been a nightmare scenario since the dawn of server virtualization, but according to the NSA, there have been no reported isolation compromises on major cloud platforms (although researchers have demonstrated the possibility of container of hypervisor compromises).

As for supply chain issues, that is the domain of cloud service providers (see chart below). They must do proper due diligence and continuous monitoring to ensure that none of their software or hardware components are vulnerable.

If nothing else, remember the two words that should define cybersecurity strategy and operationalization: prioritization and outcomes. If all security organizations prioritized activities based on the reduction of business risk (the desired outcome), the cyberworld would be a much safer, simpler place.

Read the original here:
Operationalizing NSA Guidance (or any Guidance, For That Matter!) - Infosecurity Magazine

Read More..

Security is the future of AIoT – TechRadar

The proliferation of smart phones and mobile devices has benefited our society an immeasurable amount, their existence enriches and simplifies our lives. The convenience that comes with using smart devices, and the Internet of Things (IoT) and Artificial Intelligence of Things (AIoT) is so ingrained in our society that we now take it for granted.

We have invested our trust in these devices, we store our schedules, contacts and photographs on our phones, allow smart devices to control the lights and heating in our homes, smart cameras watch over our property and valuables, smart speakers know what song we want next. We trust these devices with the most valuable commodity our data.

Albert Liu is the founder of Kneron.

With the convenience and peace of mind that smart devices bring us it is not surprising that over 22 billion IoT devices are being used in the world. Gartner estimates that by 2025 there will be 41.6 billion IoT devices. A recent study by Deloitte found that, in the US, households have an average of 11 connected devices, including seven smart screens to view content. The number of smart devices in US households is expected to increase once 5G becomes widely available, and 62% of consumers say they will replace their internet with mobile broadband.

Fully connected smart homes will soon be as ubiquitous as smartphones are today, but there is still a major obstacle to the adoption of a fully connected society: concerns over privacy and security.

With the number of IoT and AIoT devices expected to increase by such a huge percentage, we need to answer the question of security. As much as our lives have been improved by smart devices and the IoT and AIoT, there have been countless reports in the media of smart devices in homes that have been breached. When a device has been breached it can act as an open door into the users life, allowing the perpetrators to gain access to anything from the mundane, such as your smart bulbs, to those devices you need to have bulletproof security: cameras, speakers, and even locks.

The Artificial Intelligence (AI) in smart devices is what allows the device to learn our schedule, recognize our faces, suggest films and much more. Most devices utilize a cloud connection only to run AI applications and access the databases they require to function, as the cloud provides an easy way to access necessary storage and processing power.

Cloud services, for many years, was the go-to option for consumers and businesses, as the ease of access that the cloud offered was unrivaled. The recent, and frequent, security and privacy breaches have left many questioning if utilizing cloud storage on its own is still the only solution, and if privacy breaches are just the cost of using these devices.

There are several issues with using devices that rely solely on a cloud connection to work.

Security concerns remain the number one asterisk for cloud computing. There have been many publicized cloud breaches. From personal information, employees login credentials, to losses of intellectual property, once data is stored off the device there is a security risk.

In cloud computing, the question of ownership of data is one that many companies and consumers have struggled with. Data and encryption keys reside within your third-party provider, so if the unexpected happens and there is downtime, you may be unable to access that data. If this happens it could mean that the facial recognition camera that allows you access to your home wont automatically open the door.

Distributed Denial-of-Service (DDoS) attacks are already prolific and highly disruptive. Some of the services that have become so ingrained in our lives are at the mercy of bad actors at any time. With 41.6 billion IoT devices expected to be online in 2025, the resources for DDoS attacks will effectively double.

The current amount of data that needs to be transferred to the cloud for processing is huge and will only continue to grow as our reliance on cloud services grows. This will exponentially increase our bandwidth needs and the associated costs to store and compute everything in the cloud. In the end, the high costs will be passed down to consumers.

On-device edge AI processing is a way of augmenting the use of cloud. Its addition allows data to be processed and inferred locally on the device and it does not need to leave the device for the applications to work. As a result, massive amounts of data dont need to constantly be sent to and stored on servers run by big tech companies or governments.

Instead, most data will have been computed on the device, allowing for most data to be deleted, while only significant data that requires confirmation of action will be saved and sent to the cloud to be processed for further action. It is the most secure and private way of operating business applications and it significantly cuts down on costs associated with higher bandwidth needs and cloud storage.

In the past chips quickly became outdated, but on-device technology is at a point that the chips being used are reconfigurable, meaning they can adapt to upgrades and developments in AI technology and adjust to the AI models of the future. Essentially, by breaking AI models down into basic building blocks, they can be easily reconfigured to take advantage of next-gen software enhancements. So if AI technology sees a major update, the chips can be updated in the same device, rather than a whole replacement needed.

If on-device processing is adopted across the board, it has the power to create the most secure and private environment/network available to connect every AI/smart device and service in a users life. Rather than devices reporting back to the cloud, devices will instead talk to each other in a private network. This will enable seamless, secure, and private use of all AI that will enhance peoples lives.

To completely abandon the cloud and rely solely on on-device processing would be to make the same mistakes as developers did in the past. Its not a choice between cloud and on-device, instead, we should aim to have cloud and on-device work in tandem and complement each other.

The security and privacy of on-device combined with the vast storage and processing power of the cloud will shape the next generation of smart devices and IoT. This hybrid solution will allow AI to reach its full and true potential. The promise of a fully connected society, powered by advanced on-device chips and supported by robust clouds, is closer than ever before. With the right technical implementations, we can enrich our lives and take another step forward into the future.

View original post here:
Security is the future of AIoT - TechRadar

Read More..

Catch Of The Week: COVID-19 Phishing Via LinkedIn – Los Alamos Daily Post

Screenshot of a COVID-19 phishing message. Courtesy/Becky Rutherford

By BECKY RUTHERFORDLos Alamos

COVID-19 phishing scams so hot right now. Check out the latest and greatest, straight from my inbox (First screenshot of the phishing message above. Second screenshot is posted at the bottom of the story).

LinkedIn is a great way to build your professional network and make connections, but this is not the kind of connection I want to make. Yes, this is relatively obvious, but lets go over the signs that this is malicious:

Do I know the sender? Am I expecting information about a government grant from the CDC? No, I am not. If you dont know the sender, dont trust the message. Delete it. If you are concerned, it might be something legit, contact the company out of band; go directly to their website, call a verified customer service number, etc.

Typos. This message is from a Project Manager at the Centers for Decease Control and Prevention. Also, the OneDrive link is spelled CONVID rather than COVID. There are usually clues like typos or grammatical errors in phishing emails, though certainly not always.

A couple of things to note in the second example; this is linking to a legitimate Microsoft OneDrive ( a cloud storage provider) site, and the link is https. What is https? Hypertext Transfer Protocol Secure; this means that communications are encrypted to protect the information you send to and from websites. Back in the good old days (like a couple of years ago), we could tell users that if a link was https, it was probably safe to click. Unfortunately, now it is easy to get an SSL cert for your site and run the website as https. Https does not mean a site is safe to visit; it just means that your data will be encrypted while being stolen. Not helpful.

Another trend; bad guys like to abuse legitimate cloud hosting services like OneDrive, Google Drive, etc. to serve up phishing sites. Why? If your email service uses any kind of filtering (most do), it probably blocks emails with links to malicious websites. But if you get an email with a link to a legitimate cloud service like OneDrive, how will your email know to filter it out? It will probably get through, and you might click it. Just because a link is hosted on a legit service like OneDrive does not mean you can trust it; anyone can set up a site and host whatever they want on it.

I do not know what the actual phishing site looks like (dont click the link!), but I am betting it is a credential stealer. The phishing landing page will likely be spoofing Microsoft and asking you to log in to view the message. Then it will steal your credentials and use them to access your Microsoft account and any linked accounts, not good.

The profile this was sent from was likely compromised, though I cannot say for sure. If you do not have 2FA (Two Factor Authentication) set up on all of your social media accounts, now is the time to do so. Without that added layer of protection, your accounts are substantially more likely to get compromised. Microsoft engineers speaking at the RSA cybersecurity conference said that 99.99% of the compromised Microsoft email accounts they track did not have 2FA enabled. So if you enable 2FA, you have a .01% chance of your account being compromised; I like those odds. How can you set up 2FA? Either through text message authentication or an authenticator app like Google Authenticator, Authy, LastPass Authenticator, etc.

This message was sent to me via LinkedIn InMail, a messaging tool that recruiters and others can pay for as a premium service to directly message LinkedIn members. The scary thing is that in addition to the message going into my LinkedIn inbox, it also went straight into my personal email inbox. Cybercriminals love to abuse legitimate services; it adds that hint of authenticity to the scam.

If you get a suspicious message like this through any social media account, be sure to report it. In this case, I reported the message to LinkedIn as spam and also reported the profile it came from as likely to be compromised. I also contacted Microsoft and let them know the OneDrive site is likely a phishing site.

I deleted the messages from my inbox after reporting them. Im sure more scams will immediately pop up, but it is always good to report these.

COVID-19 has everyone scared and distracted, and the bad guys know its the perfect time to catch us off guard. Everyone is a target for scams like these; be aware and dont fall for a phish.

Second screenshot of the phishing message. Courtesy/Becky Rutherford

Editors note: Becky Rutherford works in information technology at Los Alamos National Laboratory.

See the original post:
Catch Of The Week: COVID-19 Phishing Via LinkedIn - Los Alamos Daily Post

Read More..

Police protection: What does it cost? – corneliustoday.com

By Dave Vieser. Chief Kevin Black is asking the Town Board for an additional $17,000 in the 2020-21 budget to provide front-line officers with body cameras.

The will be reviewed in greater detail during the towns budget discussions which get under way with the help of Zoom, a video conferencing tool, next week.

Body-worn cameras protect our officers who place their lives on the frontline of defense each day, said Black. He needs 12 to avoid the need for device sharing.

Body cams help protect officers and citizens against false accusations, claims of misconduct and abuse.

They also increase transparency and accountability of officers and may help de-escalate confrontational situations between officers and civilians.

The first generation of modern police body cameras was introduced around 2005 in the United Kingdom, while in 2014, large scale implementation began in the United States.

The $17,000 requested by the police would also cover the cost of cloud storage for a year.

The department is also seeking an additional $17,000 to hire a part-time officer for their animal control section, and $540,000 to continue its vehicle replacement program which calls for replacement of cars with more 100,000 miles. The department currently has a total of 54 vehicles in their fleet. Almost a quarter of the fleet has more than 80,000 miles on the odometer.

Pursuant to state law, the new, roughly $24 million budget must be adopted by June 30.

Continued here:
Police protection: What does it cost? - corneliustoday.com

Read More..

Are you an HPE user? Be warned about the self-destructing disk drives – Digital Information World

Our generation is nowadays moving more towards digital platforms, we still remember the Polaroid we used to take but now its all changed into digital pictures and sharing them through various devices via different digital platforms.

People end up having a huge collection of data on their digital devices and it is always a bit concerning for them to just have data on one device as it can be corrupted easily.

So, to secure their data on more devices, people use a variety of disk drives to move and secure their precious data so that it can be easy for them to use it whenever they want and wherever they want as clouds only save specific data free of cost and for more data, they charge so instead of cloud storage some users prefer disk drives for their data.

In 2015, When HP split its operation in two, Hewlett Packard Enterprise came into existence and since then, the enterprise has been serving its users a variety of products and services.

Recently, Hewlett Packard Enterprise started warning its users about its specific SAS solid-state drives that could fail after being operated for more than 40,000 hours.

If you do some calculations youll realize that 40,000 hours of operations mean the usage of their drives for 4 years, 206 days and 16 hours.

Yes, this is the life limit of the drivers that Hewlett is warning its users about and along with that Hewlett Packard Enterprise is also recommending the users of its drives to upgrade the firmware in an attempt to fix this issue.

Usually, OEM manufactures the SSDs but this issue of the drives could also affect the vendors and customers of HPE and thats why its already warning its users regarding the issue.

If youre trying to compare this warning with the incident that happened in November 2019 then you shouldnt as the failure of 2019 happened after 32,768 hours of operations and not 40,000 hours.

If you really want to save yourself from the trouble of data loss you need to update the drives to HPD7 firmware as for now it is being considered as the ultimate savior of this issue.

HPE is strongly recommending its users to update the firmware for this critical fix and negligence of this update to SSD Firmware Version HPD7 would pretty much result in the failure of your drives and loss of your precious data after 40,000 hours of operations and the only way to get the data back is by backup which can only happen if theres no fault tolerance.

Hewlett Packard Enterprise also listed out the affected SSD models used in a number of its servers and storage products which included HPE ProLiant, Apollo 4200m Synergy Storage Modules, Synergy, StoreEasy 1000 Storage and D3000 Storage Enclosure.

According to the listing provided by HPE, some platforms were not affected which included SAP HANA, XP Storage, StoreEasy 3000 Storage, StoreVirtual 4000/3200 storage, 3PAR StoreServ Storage, D6000/D8000 Disk Enclosures, StoreOnce, SimpliVity, Primera Storage, MSA Storage, Nimble Storage and ConvergedSystem 300/500 was also not affected with this issue.

You can download the Firmware Update from the HPE support bulletin to secure your derives from this issue.

Photo: DPA / Picture alliance / Getty Images

Read next: How Free VPNs can be Dangerous? [Infographic]

Here is the original post:
Are you an HPE user? Be warned about the self-destructing disk drives - Digital Information World

Read More..

6 Tricks You Need to Know About Zoom – Entrepreneur

Get familiar with this collaborative, remote-meeting tool.

March26, 20205 min read

Opinions expressed by Entrepreneur contributors are their own.

If you have recently been directed to work from home, odds are you're going to need to know about Zoom.Zoom is the premier application for remote work meetings and one of the best ways I've personally been able to keep my business running with a remote team. It is easy to use, but there are a few tricks that can make your Zoom experience seamless.

Applying the following tips can help you avoid potential disasters when organizing your first online business meeting.

Although Zoom allows you to schedulemeetings, you might find it easier to use a meeting ID instead. This ID can be used repeatedly, eliminating the need to set up a new room for every meeting. Team members can save this code to reference for every planned meeting. You can schedule your meeting on your companys calendarand start the meeting without having to schedule it in Zoom.

Related:25 Tech Tools, Tricks and Tips to Get the Most Out of Your Chromebook

While using Zoom for video or audio meetings, you can also use a chat feature for instant messaging. Messages can be sent to the entire group or privately to one individual. This allows communication to continue without interrupting the speaker.

Chat channels can also be created for use outside of meetings. These can be categorized for different groups or purposes and named accordingly. Files, imagesand screen captures can be shared here for reference in future meetings or to bring back something from a past meeting.

Being able to direct a meeting remotely can be tricky. Zoom provides host controls to help make meetings run smoothly. The meeting host has options for controlling the participants audio, videoand screen-sharing settings. Participants can alter their own preferences, but it is reassuring for a host to know that they have the capability of managing their group.

If the host chooses to mute all other participants unless called upon, the "raise hand"feature can be implemented. Just as if you were in a classroom, this button command allows a participant to notify the speaker that they have a question or comment to contribute. This feature prevents unneeded and distracting interruptions that can derail or drag out a meeting.

Hosts can also enable simultaneous screen sharing.

Related:15 Tips, Hacks and Tricks to Get the Most Out of Google Photos

Collaborating on a presentation is made easier with Zooms screen-sharing capabilities. The meeting host can enable multiple participants to share their screens based on their teams needs. Documents can be compared in real time, presentations can be given with multiple layersand more. This is the digital equivalent of distributing resources in the meeting room.

For a more lighthearted meeting for team-building or morale-boosting, consider using screen sharing for ice-breaking activities. Ask participants to make a quick drawing on their computers and compare them to each other in a silly contest. New members can easily share images of their personal life so the rest of the team can get to know them better.

Zooms video call technology provides active speaker viewing. Its software detects which user is speaking and changes the screen to their window. This, in theory, allows for seamless transition between contributors. If too many people are speaking and this feature becomes overbearing, you can quickly disable it by selecting a particular participant to lock your screen onto. Focusing on the host, even when others make comments, can create an online atmosphere that seems most similar to a real-life meeting.

For the especially daring, gallery view allows you to view up to 25 screens at a time, allowing you to see the entire team at once.

The free-to-use Zoom tools work great, with the exception of one caveat. The basic plan only allows meetings for up to 40 minutes. An upgrade to the paid pro plan gives you a 24-hour limit more than enough time if you plan on needing more than what the Basic plan allows. It also is amazing for running your business when you don't have wifi.

If you figure you only need 40 minutes or less for your meetings, you wont have to worry about upgrading your plan. Zoom allows all of its users to host unlimited meetings with up to 100 participants. Other features of the Basic plan, as mentioned above, are local recording of your meetings, the nifty hand raising feature, and simultaneous screen sharing among participants.

Besides extended meeting time allotment, the pro plan also offers 1 GB cloud storage for recording, a customized personal meeting IDand the additional add-on plans. For larger corporations, business and enterprise plans allow for more participants and more hosts.

Link:
6 Tricks You Need to Know About Zoom - Entrepreneur

Read More..

This is the cheapest MicroSD memory card per gigabyte in the world – TechRadar

Memory cards play an essential role in the digital lives of millions; they are crucial to the operation of dashcams and smartphones, but also IoT devices and more.

MicroSD cards are by far the most popular variety, and average prices have slowly fallen over the past few months. But, after reaching an historic low, prices have crept up again as a result of the ongoing coronavirus crisis.

Despite the price hike, we've managed to track down a 256GB microSD card - the Teamgroup TCUSDX256GUHS46 - for $28.99 (roughly 25) from Newegg, down from an SRP of $32.99.

Have you managed to get hold of a cheaper product with equivalent specifications? Let us know and we'll tip our hat to you.

This is not the cheapest price per gigabyte we've seen for a microSD card - they hit rock-bottom back in October 2019, and have been rising gradually over the past few weeks. However, Teamgroup's card is the most affordable on the market today.

The card is a UHS-1 U1 Class 10 model with a maximum read speed of 80MBps and a maximum write speed of 20MBps, although speeds are likely to be less impressive in practice. The card is also waterproof (IPX7) and shock-resistant.

As with all external storage devices, we would suggest you use a cloud storage service to back up your data to avoid loss.

Read the original:
This is the cheapest MicroSD memory card per gigabyte in the world - TechRadar

Read More..