Go Retro to Build a Spectre and Meltdown-Proof x86 Desktop

The content below is taken from the original ( Go Retro to Build a Spectre and Meltdown-Proof x86 Desktop), to continue reading please visit the site. Remember to respect the Author & Copyright.

[Yeo Kheng Meng] had a question: what is the oldest x86 processor that is still supported by a modern Linux kernel? Furthermore, is it actually possible to use modern software with this processor? It’s a question that surely involves experimentation, staring into the bluescreen abyss of BIOS configurations, and compiling your own kernel. Considering Linux dropped support for the 386 in 2012, the obvious answer is a 486. This supposition was tested, and the results are fantastic. You can, indeed, install a modern Linux on an ancient desktop.

This project got its start last month at a Super Silly Hackathon where [Yeo] and [Hui Jing] installed Damn Small Linux on an ancient IBM PS/1 desktop of 1993 vintage. The hardware consists of an AMD 486 clone running at 133MHz, 64 MB of RAM, a 48x IDE CDROM drive (wow!), a floppy emulator, a Sound Blaster, 10Mbps Ethernet card, and a CompactFlash to IDE adapter. By any account, this is a pimped-out rig for 1993 that would have cost more than a car at the time. The hardware works, but can you run a modern Linux kernel on it?

[Yeo] decided to install the Gentoo x86 minimal installation, but sanity and time constraints meant compiling a kernel on a 486 wasn’t happening. That was done on a modern Thinkpad after partitioning all the drives, verifying all the compilation parameters, and configuring the kernel itself. The bootloader is LILO (Grub2 didn’t work), but for the most part, this is entirely modern software running on a 25-year-old machine. The step-by-step instructions for becoming a /g/entooman on a 486 are available on GitHub.

The entire (boring) boot process can be seen in the video below. One interesting application of this build is that the 486 does not support out-of-order execution, making this completely safe from Meltdown and Spectre attacks. It’s an impressive retrocomputing achievement that right now could not be more timely.

Filed under: classic hacks , Slider

Alexa is coming to Windows 10 PCs from HP, ASUS and others

The content below is taken from the original ( Alexa is coming to Windows 10 PCs from HP, ASUS and others), to continue reading please visit the site. Remember to respect the Author & Copyright.

Amazon’s Alexa recently arrived on headphones and even toilets, but it’s about to become much more ubiquitous by hitting Windows 10 PCs later this year. HP, ASUS and Acer have revealed that the voice assistant is coming to various models, including A… including…

TransferWise begins private launch of its consumer borderless account and bright green debit card

The content below is taken from the original ( TransferWise begins private launch of its consumer borderless account and bright green debit card), to continue reading please visit the site. Remember to respect the Author & Copyright.

Money transfer company TransferWise has begun a private launch of its “Borderless account” ‘Borderless account’ for consumers. It marks the first time the European unicorn has offered a debit card, card (pictured below), a move that is bound to draw further comparisons with newer fintech upstarts such as Revolut. Read More

Whitepaper: Lift and shift to Google Cloud Platform

The content below is taken from the original ( Whitepaper: Lift and shift to Google Cloud Platform), to continue reading please visit the site. Remember to respect the Author & Copyright.

Today we’re announcing the availability of a new white paper entitled “How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform.” This is the first in a series of four white papers focused on application migration and modernization. Stay tuned to the GCP blog as we release the next installments in the coming weeks.

The “Lift-and-Shift” white paper walks you through migrating a Microsoft Windows-based, two-tier, expense reporting, web-application that currently resides on-premises, in your data center. The white paper provides background information, and a three-phased project methodology, as well as pointers to application code on github. You’ll be able to replicate the scenario on-premises, and walk through migrating your application to Google Cloud Platform (GCP).

The phased project includes implementation of initial GCP resources, including GCP networking, a site-to-site VPN and virtual machines (VMs), as well as setting up Microsoft SQL Server availability groups, and configuring Microsoft Active Directory (AD) replication in your new hybrid environment.

Want to learn more about how to lift and shift your own application by reading through (or following the same steps) in the white paper? If you’re ready to get started, you can download your copy of the white paper and start your migration today.

Microsoft Posts Office 365 Information Protection Guide for GDPR

The content below is taken from the original ( Microsoft Posts Office 365 Information Protection Guide for GDPR), to continue reading please visit the site. Remember to respect the Author & Copyright.

GDPR from Microsoft

GDPR from Microsoft

Less Than Five Months to GDPR

The European Union’s General Data Protection Regulation (GDPR) comes into force on May 25. Any company doing business in the EU or EEA needs to follow GDPR, and with the countdown towards the May deadline, companies are busy reviewing their exposure and understanding where they need to make changes to achieve compliance. Remember, GDPR dictates how to collect, store, process, and share personal data, so there’s a lot to think about.

GDPR Tools from Microsoft

Microsoft’s Compliance Manager breaks down GDPR into a set of tasks. Some of the tasks might not apply to your tenant, but it’s better to be safe than sorry, so consider them all. In addition, Microsoft has an online GDPR assessment tool designed to help companies understand their overall level of readiness.

Potential GDPR Impact on Office 365 Applications

Once you understand how GDPR affects data stored in Office 365, you can figure out how to protect and control that data. And, very importantly, how to educate users to deal with personal data correctly. Data that might come under the scope of GDPR can exist in repositories used by applications like Exchange, SharePoint, OneDrive, and Teams. The need therefore exists to understand:

  • What types of personal data exists inside your Office 365 tenant (passport numbers, credit card numbers, other identifiers).
  • How users gather and use personal data. For example, the HR department is likely to store tax identifiers for employees. Although this information is probably in a HR data system, it might also exist in spreadsheets, documents, and email.
  • The protection currently applied to personal data. You might already protect personal data with techniques such as applying rights templates to email and documents. If so, the question might be how to improve protection through new software capabilities available in Office 365 or recent upgrades (like the changes made to Office 365 Message Encryption).

Information Protection Guide for GDPR

As the countdown to GDPR continues, you can expect to hear more advice from Microsoft covering ways to use Office 365 technology to achieve compliance. A recent example is the release of the Office 365 Information Protection for GDPR guide (or solution), offering “ prescriptive recommendations for discovering, classifying, protecting, and monitoring personal data.”

Like any guide, this document has some limitations. In this case, a large part of the guide focuses on how to protect documents stored in SharePoint Online and OneDrive for Business with classification labels. It ignores the circulation of personal data within email, Teams, or Yammer. Of course, the reason is that classification labels are much more useful in SharePoint and OneDrive today. You can use classification labels with Exchange, but only as personal retention tags, and auto-label policies don’t work for email.

Teams and Yammer are weak spots inside Office 365 when it comes to GDPR. Although you can argue that people won’t post personal information to Teams or Yammer conversations, the simple fact is that users surprise administrators all the time in what they do. Where technology cannot help, user education must step in. If you use Teams or Yammer, make sure that you coach people about the proper use of personal data.

Using Sensitive Data Types

Even though the guide only partially covers Office 365, its content is valuable. The section about using sensitive data types with content searches to scan SharePoint and OneDrive libraries for documents that potentially hold personal data might help some companies understand how much GDPR-relevant data they have. Some of the examples illustrate the power of Keyword Query Language queries when looking for personal data.

The guide has some sensible recommendations for developing a classification schema for personal data and how to apply the classification labels that flow from the schema. Of course, if you want to use the auto-label policies to find and apply classification labels to documents, you need Office 365 E5 or the Advanced Data Governance add-on.

Data Loss Prevention

Other tips include using Data Loss Prevention policies to detect when users try to share documents with sensitive data with people outside the company. Be aware that two forms of DLP policies exist inside Office 365 – one for Exchange based on transport rules and one designed to work across multiple Office 365 workloads that is best for SharePoint and OneDrive. Again, Teams and Yammer don’t support this capability.

Audit Reporting

When it comes to checking up on leaks, the guide reviews the Office 365 audit log and notes that Office 365 only keeps audit records for 90 days. This probably isn’t long enough if someone sues your company for misuse of personal data. Litigation often starts well after the date of a purported offense and it is not good to admit in court that all your audit records for the period in question are unavailable because Office 365 flushes them after 90 days. The guide underlines that other solutions are available. For example, Advanced Security Management (part of Office 365 E5 and available as an add-on) stores audit data for 180 days while third-party products like Radar for Security and Audit will store tenant audit data for as long as you pay your bills.

Sponsored

GDPR Approaches

No guide will ever tell you all you need to do to prepare for something like GDPR. Every company is different, and Office 365 is a huge software suite that comes in many flavors. All a guide can do is pose questions and get you thinking. Microsoft’s Office 365 Information Protection guide is helpful in that respect.

Follow Tony on Twitter @12Knocksinna.

Want to know more about how to manage Office 365? Find what you need to know in “Office 365 for IT Pros”, the most comprehensive eBook covering all aspects of Office 365. Available in PDF and EPUB formats (suitable for iBooks) or for Amazon Kindle.

The post Microsoft Posts Office 365 Information Protection Guide for GDPR appeared first on Petri.

Google Chrome Versus Microsoft Edge in the Enterprise

The content below is taken from the original ( Google Chrome Versus Microsoft Edge in the Enterprise), to continue reading please visit the site. Remember to respect the Author & Copyright.

In today’s Ask the Admin, I’ll look at the pros and cons of each browser for use in the enterprise.

 

 

Emotions usually run high in any discussion about browsers. Most of us spend a good part of our working day in a browser, so it makes sense that it should be fast, reliable, secure, and have the extensions we need. Most users have an automatic preference for Google Chrome and it will be one of the first apps they download when setting up a new PC. Chrome is also the most widely used browser today according to Net MarketShare, with Internet Explorer taking second place, Firefox third, Microsoft Edge fourth, and Safari bringing up the rear.

Google Chrome

Unlike Microsoft Edge, Google Chrome is not installed in Windows by default. But Google does provide a Windows Installer file that allows system administrators to distribute the software using Group Policy, script, or System Center Configuration Manager (SCCM). Google Update is a separate mechanism used to update Google Chrome and any other Google software installed on the PC. Google offers Group Policy administrative templates that can be used to manage the configuration of Chrome and Google Update and let sysadmins enforce more than 200 policies, such as website blacklisting and content filtering. The Chrome Enterprise Bundle, which Google released in May, provides all the necessary downloads in one package.

Chrome 63 introduces site isolation as an experimental feature. Site isolation allows sysadmins to force Chrome to render sites in their own dedicated processes. While this increases memory usage between 10 and 20 percent, it adds better isolation to Chrome’s sandbox. Site isolation is designed to prevent attacks where hackers use cross-site scripting vulnerabilities to run malicious code to steal information running in other sites. While Chrome always tries to place sites in different processes, there are cases where it is not technically possible, such as cross-site iframes.

Sysadmins can configure site isolation to work for all sites or a list of selected sites. Limiting the sites that are isolated helps to improve performance. Google is also working on an additional feature to address situations when the renderer process is fully compromised.

 

 

Chrome did much better than Edge at this year’s Pwn2Own 2017 hacking event, where Chrome wasn’t hacked at all. But security is a cat and mouse game, so next year’s results might be something different. But nevertheless, Chrome has put in an excellent showing at the hacking event over the past two years. Google patched 153 vulnerabilities in Chrome in 2017. Considerably less than Microsoft’s 201 for Edge.

From a usability perspective, Chrome is fast and stable. It also has a much larger selection of extensions than Edge. And for the security conscious, Chrome extensions can be blocked by the permissions they require. But maybe more importantly, Chrome is very compatible. By that, I mean that it renders websites correctly because developers test their sites in Chrome. In comparison, Edge isn’t always able to render sites properly, sometimes causing minor usability issues. Edge doesn’t support sites that use WebM videos within the HTML5 <Video> tag. So, that should be a consideration if you’re going to restrict users to Edge.

Microsoft Edge

With all the negativity about Edge, is there any benefit to using it? Yes. Edge does have its advantages, especially in a corporate environment. The first being that it’s built into Windows 10 and updated via Windows Update, which provides a solid and trusted mechanism for updating Edge. But Edge isn’t available for Windows 7. Because Edge is built-in to Windows, there’s no need to download Group Policy administrative templates to manage the browser. When Edge is updated, so are the Group Policy settings. Google Chrome requires you to update administrative templates separately from browser updates.

Microsoft has also promised to separate Edge’s user interface from the backend rendering engine, although there’s no indication of when this is going to happen. This will allow the UI to be updated separately, via the Windows Store so that the Edge team can provide updates faster and without waiting for the next Windows release.

I think it’s fair to say that Edge hasn’t lived up to security expectations. Microsoft has made a lot of claims only to see Edge fall spectacularly at this year’s Pwn2Own hacking event. But that’s not to say that Edge is inherently insecure, even though there is clearly room for improvement. And on that note, the Windows Fall Creators Update includes Windows Defender Application Guard (WDAG), a new feature that allows system administrators to force Edge to open enterprise-defined untrusted sites in tabs that run in Hyper-V containers. If a site is malicious, it is isolated from the rest of the operating system using hardware-based virtualization.

At the time of writing, WDAG is only available to Windows 10 Enterprise customers. But Microsoft has announced that the spring 2018 update will bring WDAG to Windows 10 Professional customers as well. It’s also worth noting that because WDAG relies on hardware virtualization, it requires a 64-bit CPU with support for Second Level Address Translation (SLAT), and either VT-x (Intel) or AMD-V. But that shouldn’t be a problem for most modern hardware.

In terms of usability, Edge falls short. Although I have always preferred the font rendering in Edge and IE. Pages are just easier on the eye. Microsoft claims that Edge is faster than Chrome and more energy efficient. In my anecdotal experience, you’ll get a lot more battery time with Edge. In benchmark tests, Edge tends to beat Chrome. But performance isn’t the only criteria. Edge scores 476 in an HTML5 standards test compared to Chrome’s 519.

Apart from the limited extension support in Edge, there is one major usability letdown that is unforgivable. In the Fall Creators Update, Microsoft added the ability to pin sites to the taskbar. But in practice, it is next to useless. When you click on a site that’s pinned to the taskbar, if the site is already open in the browser, the page gets refreshed, at least most of the time. Furthermore, unlike Windows apps, there’s no white bar to highlight webpages opened from the taskbar. Microsoft’s implementation of pinned sites is nothing short of a disaster. Plus, if users require more than one input language, the Windows + SPACE keyboard shortcut for changing languages doesn’t always work properly in Edge.

 

Sponsored

Chrome Has The Edge

If you want a trouble-free life, then Google Chrome is the way to go. It’s compatible, fast, secure, and just as importantly, your users are likely to be happy. Microsoft Edge isn’t necessarily a bad browser, and it’s my personal preference, but it does have a couple of serious shortcomings that might result in compatibility issues with sites and complaints from users. And that might be enough to push your organization towards Chrome until Microsoft can fix those issues or offer a serious differentiator that makes Edge a must have.

 

The post Google Chrome Versus Microsoft Edge in the Enterprise appeared first on Petri.

Security hole in AMD CPUs’ hidden secure processor revealed ahead of patches

The content below is taken from the original ( Security hole in AMD CPUs’ hidden secure processor revealed ahead of patches), to continue reading please visit the site. Remember to respect the Author & Copyright.

Googler drops bug bomb in public – but don’t panic

Cfir Cohen, a security researcher from Google’s cloud security team, on Wednesday disclosed a vulnerability in the fTMP of AMD’s Platform Security Processor (PSP), which resides on its 64-bit x86 processors and provides administrative functions similar to the Management Engine in Intel chipsets.…

Best way to learn a language online fast free

The content below is taken from the original ( Best way to learn a language online fast free), to continue reading please visit the site. Remember to respect the Author & Copyright.

Learning a new language has forever been one of the most constructive hobbies and now, often a necessity. You can learn just about any language free of cost with some of the best language apps. Check out these top Language-learning […]

This post Best way to learn a language online fast free is from TheWindowsClub.com.

Robot DJ Commands Crowds at Prague Dance Club

The content below is taken from the original ( Robot DJ Commands Crowds at Prague Dance Club), to continue reading please visit the site. Remember to respect the Author & Copyright.

There ain’t no party like a robot DJ party, cause a robot DJ party don’t stop—until the cyborg runs out of power. Prague’s Karlovy Lazne dance club recently introduced a new spinner to […]

The post Robot DJ Commands Crowds at Prague Dance Club appeared first on Geek.com.

LG shows off the world’s first 88-inch 8K OLED display

The content below is taken from the original ( LG shows off the world’s first 88-inch 8K OLED display), to continue reading please visit the site. Remember to respect the Author & Copyright.

Just as 4K and HDR are finally going mainstream, the ambitious folks at LG Display have also been busy pushing its OLED technology to 8K. Come CES, the Korean manufacturer will be letting attendees get up close with its new 88-inch 8K OLED display (c… display, w…

bginfo (4.24)

The content below is taken from the original ( bginfo (4.24)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Automatic desktop backgrounds that include system information

Learning ARM assembly with visUAL

The content below is taken from the original ( Learning ARM assembly with visUAL), to continue reading please visit the site. Remember to respect the Author & Copyright.

Learning assembly is very important if you want to get a grasp of how a computer truly works under the hood. VisUAL is a very capable ARM emulator for those interested in learning the ARM assembly.

The GUI: A simply program to ADD two numbers

In addition to supporting a large subset of ARM instructions, the CPU is emulated via a series of elaborate and instructive animations that help visualise the flow of data to/from registers, any changes made to flags, and any branches taken. It also packs very useful animations to help grasp some of the more tricky instruction such as shifts and stack manipulations.

As it is was designed specifically to be used as teaching tool at Imperial College London, the GUI is very friendly, all the syntax errors are highlighted, and an example of the correct syntax is also shown.

Branch visualisation, credits: VisUAL homepage

You can also do the usual things you would expect from any emulator, such as single step through execution, set breakpoints, and view data in different bases. It even warns you of any possible infinite loops!

That being said, lugging such an extravagant GUI comes at a price; programs that consume a few hundred thousand cycles hog far too much RAM should be run in the supported headless mode.

 

Filed under: Microcontrollers

Phone Security

The content below is taken from the original ( Phone Security), to continue reading please visit the site. Remember to respect the Author & Copyright.

...wait until they type in payment information, then use it to order yourself a replacement phone.

onenote (16.0.8730.2122)

The content below is taken from the original ( onenote (16.0.8730.2122)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Microsoft OneNote Online Desktop Client

wakemeonlan (1.82)

The content below is taken from the original ( wakemeonlan (1.82)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Turn on computers on your network with Wake-on-LAN packet

The Truth About The Tesla Semi-Truck

[https://youtu.be/oJ8Cf0vWmxE], Thank you for your amazing support this year! Help this channel get better by supporting at Patreon:
http://bit.ly/2pEMEiG

Website: http://bit.ly/2DYYc3m

My 2017 Patreon Expense Report:
http://bit.ly/2pDIFTH

Listen to our new podcast at:
Showmakers YouTube channel at: http://bit.ly/2DYRlr0

Itunes: http://bit.ly/2pC9zes
RSS and Libsyn Audio is available on our site: http://bit.ly/2DYYhnG

Get your Real Engineering shirts at: http://bit.ly/2pC9Kq8

Facebook:
http://bit.ly/2DYYhEc
Instagram:
http://bit.ly/2pEsbuD
http://bit.ly/2DYYhUI
Twitter:

Website:
http://bit.ly/2pDIGqJ

Thank you to my patreon supporters: Adam Flohr, darth patron, Zoltan Gramantik, Henning Basma, Karl Andersson, Mark Govea, Mershal Alshammari, Hank Green, Tony Kuchta, Jason A. Diegmueller, Chris Plays Games, William Leu, Frejden Jarrett, Vincent Mooney, Ian Dundore, John & Becki Johnston. Nevin Spoljaric

Once again thank you to Maeson for his amazing music. Check out his soundcloud here: http://bit.ly/2DWIiGR

Microsoft Remote Connectivity Analyzer: Troubleshoot Office 365 apps & services issues

The content below is taken from the original ( Microsoft Remote Connectivity Analyzer: Troubleshoot Office 365 apps & services issues), to continue reading please visit the site. Remember to respect the Author & Copyright.

Remote Connectivity Analyzer

Formally released as Exchange Server Remote Connectivity Analyzer, Microsoft Remote Connectivity Analyzer is a tool that allows you to analyze, troubleshoot and fix Office 365 apps & other Microsoft services. The tool houses a collection of web-based tools enabling a user […]

This post Microsoft Remote Connectivity Analyzer: Troubleshoot Office 365 apps & services issues is from TheWindowsClub.com.

Control a Quadcopter over Websockets

The content below is taken from the original ( Control a Quadcopter over Websockets), to continue reading please visit the site. Remember to respect the Author & Copyright.

The interface

Everyone’s favourite IOT module, the ESP8266, is often the go-to choice for any project that needs quick and cheap control over the web. [Andi23456] wanted to control his quadcopter using the luxury of his mobile phone and thought permanently tethering an ESP12-E module to the quadcopter was exactly what he required.

The ESP8266, really showcasing its all-round prowess, hosts both a web server for a HTML5 based joystick and a Websockets server so that a client, such as a phone, could interact with it over a fast, low latency connection. Once the ESP8266 receives the input, it uses interrupts to generate the corresponding PPM (Pule Position Modulation) code which the RC receiver on the quadcopter can understand. Very cool!

What really makes this realtime(ish) control viable is Websockets, a protocol that basically allows you to flexibly exchange data over an “upgraded” HTTP connection without having to lug around headers each time you communicate. If you haven’t heard of Websockets you really should look really check out this library or even watch this video to see what you can achieve.

Filed under: drone hacks, Wireless Hacks

Micro-ATX Arduino is the Ultimate Breakout Board

The content below is taken from the original ( Micro-ATX Arduino is the Ultimate Breakout Board), to continue reading please visit the site. Remember to respect the Author & Copyright.

If you’ve been hanging around microcontrollers and electronics for a while, you’re surely familiar with the concept of the breakout board. Instead of straining to connect wires and components to ever-shrinking ICs and MCUs, a breakout board makes it easier to interface with the device by essentially making it bigger. The Arduino itself, arguably, is a breakout board of sorts. It takes the ATmega chip, adds the hardware necessary to get it talking to a computer over USB, and brings all the GPIO pins out with easy to manage header pins.

But what if you wanted an even bigger breakout board for the ATmega? Something that really had some leg room. Well, say no more, as [Nick Poole] has you covered with his insane RedBoard Pro Micro-ATX. Combining an ATmega32u4 microcontroller with standard desktop PC hardware is just as ridiculous as you’d hope, but surprisingly does offer a couple tangible benefits.

RedBoard PCB layout

The RedBoard is a fully compliant micro-ATX board, and will fit in pretty much any PC case you may have laying around in the junk pile. Everything from the stand-off placement to the alignment of the expansion card slots have been designed so it can drop right into the case of your choice.

That’s right, expansion slots. It’s not using PCI, but it does have a variation of the standard Arduino “shield” concept using 28 pin edge connectors. There’s a rear I/O panel with a USB port and ISP header, and you can even add water cooling if you really want (the board supports standard LGA 1151 socket cooling accessories).

While blowing an Arduino up to ATX size isn’t exactly practical, the RedBoard is not without legitimate advantages. Specifically, the vast amount of free space on the PCB allowed [Nick] to add 2Mbits of storage. There was even some consideration to making removable banks of “RAM” with EEPROM chips, but you’ve got to draw the line somewhere. The RedBoard also supports standard ATX power supplies, which will give you plenty of juice for add-on hardware that may be populating the expansion slots.

With as cheap and plentiful as the miniITX and microATX cases are, it’s no surprise people seem intent on cramming hardware into them. We’ve covered a number of attempts to drag other pieces of hardware kicking and screaming into that ubiquitous beige-box form factor.

Filed under: Arduino Hacks, computer hacks, Microcontrollers

Storage Christmas cracker: My band is called 1023MB. We haven’t had a gig yet

The content below is taken from the original ( Storage Christmas cracker: My band is called 1023MB. We haven’t had a gig yet), to continue reading please visit the site. Remember to respect the Author & Copyright.

Last 2017 roundup: Death Star file protection crap, Samsung DRAM miracles and more

Here’s a final collection of storage news before Christmas 2017. Imagine you are having Christmas dinner and you get a bunch of crackers. Pull them and, instead of fortune cookie statements and bad jokes, this list of news items tumbles out.…

Happy 5th Anniversary, XRP Ledger!

The content below is taken from the original ( Happy 5th Anniversary, XRP Ledger!), to continue reading please visit the site. Remember to respect the Author & Copyright.

Ripple has had a lot to celebrate over the last year!

From adding new RippleNet members, to launching our first blockchain conference, to completing the escrow of 55 billion XRP, it’s clear that the team’s hard work to enable the Internet of Value (IoV), coupled with the XRP community’s support, is paying off.

In fact, XRP has experienced phenomenal growth — up nearly 12,000 percent — from December 2016 to December 2017. This makes XRP’s performance better than any other digital asset in the industry in 2017.

But just as the year is coming to a close, there’s one more reason for the Ripple team and the XRP community to celebrate — the five year anniversary of the XRP Ledger.

XRP sets the standard from the start

Since 2012, XRP has been considered the only digital asset with a clear institutional use case that works to solve the multi-trillion dollar liquidity problem that plagues banks, payment providers and corporates.

For example, XRP can provide liquidity to financial institutions who need to send cross-border payments — presenting a greater opportunity for these institutions to widen their footprint in major corridors or gain more access to emerging markets.

Cuallix, a major payment provider, is the first RippleNet member to use xRapid — Ripple’s solution that uses XRP to source liquidity — to reduce the cost of sending cross-border payments and remittances from the U.S. to Mexico.

The XRP Ledger, the digital asset’s underlying distributed ledger technology, is the key reason why XRP steadily led the pack of digital assets by being the fastest, most cost-effective, scalable digital asset for payments, which helps advance its goal —  enabling IoV.

IoV is the belief that money should move in the same fashion as digital information moves today — in real time.

In order to deliver on this vision, Ripple continues to support the development and adoption of  the XRP Ledger to ensure that XRP remains the fastest, most scalable digital asset on the market.

Additionally, the digital asset market is seeing more demand for XRP which speaks to consumers’ understanding that XRP is the best digital asset to remove the friction from global payments.

Ripple pledges to increase XRP usage

The Ripple team is committed to furthering the adoption and usage of XRP for payments. In fact, we continuously work with regulators, governments and central banks to better understand how our technology can help remove the friction from cross-border payments.

And, as more digital assets flood the market, the value of digital assets will be determined by their utility and the problem they solve for their users.

Since XRP, has continually provided a strong use case and is undisputed in its technological achievements, it makes sense that the market would take notice — prompting a surge in XRP’s value.

What’s more, XRP is now available to more than 50 exchanges worldwide to better serve the global demand for the digital asset.

It has been a phenomenal five years, and the Ripple team is appreciative of the community’s support. We can’t wait to see what the future years will bring!

Watch our live Q&A with David Schwarz today. As Brad Garlinghouse said in his livestream, “David Schwartz is the Steph Curry of cryptography.”

The post Happy 5th Anniversary, XRP Ledger! appeared first on Ripple.

MDT (6.3.8450.0)

The content below is taken from the original ( MDT (6.3.8450.0)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Microsoft Deployment Toolkit (MDT) is a free computer program from Microsoft that assists with the deployment of Microsoft Windows and Office

Audi’s latest models add Amazon Music to the dashboard

The content below is taken from the original ( Audi’s latest models add Amazon Music to the dashboard), to continue reading please visit the site. Remember to respect the Author & Copyright.

If you're an Apple CarPlay or Android Auto user, you've no shortage of music streaming services baked into your dashboard. But, if you're relying on your vehicle's default control panel the choices start to dwindle. While, automakers like Ford have s…

megui (1.0.2774)

The content below is taken from the original ( megui (1.0.2774)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Portable video converter front-end for many free command line tools

PowerShell for SharePoint Online Usage Scenarios

The content below is taken from the original ( PowerShell for SharePoint Online Usage Scenarios), to continue reading please visit the site. Remember to respect the Author & Copyright.

PowerShell is not only a powerful tool to administer and manage a SharePoint Online (SPO) tenant but also for common activities as an Office 365 Administrator or an SPO. In this article, I will cover some of the most common PowerShell for SharePoint Online usage scenarios as described in Figure 1.

 

 

Figure 1– Common PowerShell for SPO Usage Scenarios.

Service Configuration and Administration Scenarios

Under these scenarios, we have any action that implies to apply specific SPO settings available through SPO PowerShell cmdlets and/or SPO APIs. Some examples of typical operations that fall under these scenarios are the following ones:

  • While it’s true that OneDrive for Business (ODFB) and SPO provides support for hashtag and percent symbols in files names and folder names, you need to explicitly enable in your tenants by using PowerShell. Note that there is not a way to enable the support for these characters in the SPO Administration UI. To enable the support for these symbols in ODF and SPO, you must use Set-SPOTenant cmdlet as follows:
Set-SPOTenant -SpecialCharactersStateInFileFolderNames Allowed
$O365SPOTenant=Get-SPOTenant
$O365SPOTenant.SpecialCharactersStateInFileFolderNames

  • Configuring sharing capability at the tenant or site collection level is very important when we want to share an Office 365 Group site with external users without adding them as a guest in the Group. To enable external users sharing in an Office 365 Group site, we only need to use Set-SPOSite cmdlet as detailed below:
$sO365GroupSite="https://<Your_Group_Site_Url>"
Set-SPOSite -Identity $sO365GroupSite -SharingCapability ExternalUserSharingOnly

Auditing Operations and Reporting scenarios

On the one hand, Auditing Operations scenario is intended to provide information about what is happening at any logical containers in an SPO tenant (Site Collections, Sites, Lists, Document Libraries, etc) in regards to common operations, such as creating or updating content, making updates in SPO security model and so on. On the other hand, reporting generation scenario is about activities taking place in SPO that are also covered in this PowerShell usage scenario. Some good examples of these scenarios:

  • Get information about the SPO tenant logical and information architecture in terms deployed Site Collections, Sites, Lists and document libraries.
  • Get detailed information about security settings at different levels (Site Collections, Sites, Lists and document libraries, list elements and documents) such as:
    • SharePoint security groups in use
    • Users/Group members of each SharePoint security group

 

 

For instance, if you are asked to provide a report with all the members of each SharePoint Security Group configured on an SPO site, you only need to execute the following PowerShell script that uses SPO Get-SPOSiteGroup and Get-SPOUser cmdlets:

$spoSharePointGroups=Get-SPOSiteGroup -Site $sSiteUrl
foreach($spoSharePointGroup in $spoSharePointGroups){ 
Write-Host "Users in " $spoSharePointGroup.Title ":"
$spoUsers=Get-SPOUser -Site $sSiteUrl -Group $spoSharePointGroup.Title
Write-Host “ -> “ $spoUsers.LoginName
Write-Host “--------------------------------“ -ForegroundColor Green
}

  • Get detailed information about a SPO tenant:
    • Storage used in each site collection in the tenant
    • Changes happening in the tenant

For instance, to query the Office 365 audit log and get information about file activities happening in all the sites in the tenant simply execute the following PowerShell script:

$PSSession = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri http://bit.ly/2BG1vhK -Credential $Cred -Authentication Basic -AllowRedirection
Import-PSSession $PSSession
Search-UnifiedAuditLog -StartDate 12/1/2017 -EndDate 12/7/2017 -RecordType SharePointFileOperation -Operations FileAccessed -SessionId "Docs_SharepointViews"-SessionCommand ReturnNextPreviewPage

SPO Solutions Deployment Scenario

PowerShell is a common vehicle to deploy solutions on top of SPO that also includes any kind of customization to new or existing SPO Sites. Under this scenario, we can find a wide range of possibilities:

  • Apply a common look and feel (for instance a theme) to all the sites defined under a specific site collection.
  • Provision the full information architecture required for an SPO solution being developed: Site Collections, Sites, Site Columns, Content Types, etc.
  • Deploy Apps or WebParts to new or existing SPO Sites.
  • Configure security model for the solution (SharePoint security groups, permissions level, permissions inheritance mechanism, etc).

As an example, you can create a new SPO list in an SPO site using the following PowerShell script that makes use of the client-side object model (CSOM) SPO API:

#Adding the Client OM Assemblies 
$sCSOMRuntimePath=$sCSOMPath + "\Microsoft.SharePoint.Client.Runtime.dll" 
$sCSOMPath=$sCSOMPath + "\Microsoft.SharePoint.Client.dll" 
Add-Type -Path $sCSOMPath 
Add-Type -Path $sCSOMRuntimePath 
#SPO Client Object Model Context
$spoCtx = New-Object Microsoft.SharePoint.Client.ClientContext($sSiteUrl)
$spoCredentials = New-Object Microsoft.SharePoint.Client.SharePointOnlineCredentials($sUserName, $sPassword) 
$spoCtx.Credentials = $spoCredentials 
#Creating the List
$spoWeb=$spoCtx.Web
$spoListCreationInformation=New-Object Microsoft.SharePoint.Client.ListCreationInformation
$spoListCreationInformation.Title=$sListName
$spoListCreationInformation.TemplateType=[int][Microsoft.SharePoint.Client.ListTemplatetype]::GenericList
$spoList=$spoWeb.Lists.Add($spoListCreationInformation)
$spoList.Description=$sListDescription
$spoCtx.ExecuteQuery()
$spoCtx.Dispose()

 

Information Loading and Migration scenarios

Finally, last scenarios cover situations where it’s required either to upload data to SPO sites or to move/migrate information to SPO sites. Make note that this information could come from another SPO Site or event SPO tenant, from a SharePoint OnPremises farm or even from a corporate file server. Some examples of situations that are under these scenarios are the following:

  • Move documents from Local File Systems, Other Cloud Storage Services (DropBox, Box, GDrive), SharePoint On-Premises to SPO, and OneDrive For Business.
  • Load information in SPO coming from different information sources (Local files, SQL Database, non-SQL database, etc).

For instance, the following PowerShell script allows to upload information from a CSV file to an SPO list using SPO CSOM API:

$spoCtx = New-Object Microsoft.SharePoint.Client.ClientContext($sSiteUrl)
$spoCredentials = New-Object Microsoft.SharePoint.Client.SharePointOnlineCredentials($sUserName, $sPassword) 
$spoCtx.Credentials = $spoCredentials 
#Adding Data to an existing list
$spoList = $spoCtx.Web.Lists.GetByTitle($sListName)
$spoCtx.Load($spoList)
foreach ($sItem in $tblItems) {
Write-Host "Adding " $sItem.SPOListItem " to $sListName"
$spoListItemCreationInformation = New-Object Microsoft.SharePoint.Client.ListItemCreationInformation
$spoListItem=$spoList.AddItem($spoListItemCreationInformation)
$spoListItem["Title"]=$sItem.SPOListItem.ToString()
$spoListItem.Update()
$spoCtx.ExecuteQuery() 
} 
$spoCtx.Dispose()

 

Sponsored

 

Conclusions

PowerShell for SPO is a tool not only for platform administration and configuration tasks but also for doing many other common activities as an SPO Administrator (or an Office 365 one) can require: Auditing Operations, Reporting, SPO Solutions Deployment, Data Loading, and Migration.

The post PowerShell for SharePoint Online Usage Scenarios appeared first on Petri.