Posted on in category News

Neat trick for examining home network issues using Teams

The content below is taken from the original ( Neat trick for examining home network issues using Teams), to continue reading please visit the site. Remember to respect the Author & Copyright.

So one of the cool features of Teams is network diagnostics. Trying to gather network information remotely from an end-user sucks. So one trick you can do with Teams is place a call to them for a while, disconnect the call, then look in the network diagnostics which will give you some decent information about the call. You get to see their network adapter, whether or not they used ethernet or wifi, their wifi signal strength, their wifi channel, their wifi band, their wifi RSSI, and their overall network statistics including jitter, packet loss, RTT, et cetera.

Article on where to find this information:

https://docs.microsoft.com/en-us/MicrosoftTeams/difference-between-call-analytics-and-call-quality-dashboard

You can look at past calls as well if they happen to call from Teams/Skype a lot.

Teams Admin Center > Users > [User] > Call History then from there you can look at the statistics for any individual participant including in meetings. The icons in the overview section are filters and the Advanced tab gives you more information.

submitted by /u/SolidKnight to r/sysadmin
[link] [comments]

Posted on in category News

Microsoft Teams now can communicate with Skype, here’s how to enable

The content below is taken from the original ( in /r/ Office365), to continue reading please visit the site. Remember to respect the Author & Copyright.

BitLocker Could Not Be Enabled: 5 Ways to Fix This Error

Posted on in category News

Using Recommenders to keep your cloud running optimally

The content below is taken from the original ( Using Recommenders to keep your cloud running optimally), to continue reading please visit the site. Remember to respect the Author & Copyright.

As a cloud project owner, you want your environment to run smoothly and efficiently. At Google Cloud, one of the ways we help you do that is through a family of tools we call Recommenders, which leverage analytics and machine learning to automatically detect issues and present you with optimizations that you can act on. 

With Recommenders, our goal is to suggest quick, easy ways to optimize your cloud for price, performance, and security. Several Recommenders are already generally available, including VM Recommenders, Firewall Insights and IAM Recommender. In fact, there are many teams at Google Cloud who are working to build Recommenders that help you improve your cloud. But, we want to make sure it’s effortless and simple for you to find and take action on those recommendations. That’s why we’re also releasing the beta of our new Recommendation Hub, which highlights proactive recommendations in one place for you to view and act on. 

Recommendation Hub is vital to bringing all of these optimization efforts together for you to see and take action on. Not only does the Hub capture the most impactful opportunities in your projects, but it also helps guide you across Google Cloud in general. Whether it’s networking, security, compute and storage resources, cost and billing, or Anthos, the Recommendation Hub will give you the tools you need to prioritize, analyze, and act on all of these valuable insights and recommendations.

Recommendation Hub and Recommenders are also part of a bigger initiative at Google Cloud to use machine learning and analytics to help you make better decisions, drive down costs, and automate your operations. There will be more announcements on that soon, but for now, let’s explore some of the Recommenders currently available for you to use.

Optimize resources for cost and performance with VM Recommenders

There will come a day when you might need to scale your virtual machine (VM) instances up or down. For that, we’ve got two types of Recommenders available: one to help you optimize your VMs for cost and performance, and a second to help you identify and delete (or back up) your unused VMs and persistent disks (PD) to avoid paying for resources you don’t use. 

All of this helps you properly balance your performance and cost based on your unique situation. One customer, VuClip, decided to experiment with the Idle VM Recommender and is now making it a key part of how they optimize their cloud environment: 

“We were in the midst of a hackathon recently, and we decided to test out Google Cloud’s Idle VM Recommender. We quickly learned that we had over 200 VMs that were sitting idle, but ultimately costing us money, that we wouldn’t have otherwise known about. The real bonus was that it only took a matter of seconds for Google Cloud to shine light on these idle VMs.†– Hrushikesh Kulkarni, Associate Director of Technology, VuClip

Secure your network with Firewall Insights

Firewall rule management is a constant challenge for security and network engineers. Firewall configuration can grow in complexity as more accesses are added over time, making it really hard to maintain. Firewall Insights, now in beta, is a new tool that helps secure your cloud environment by detecting and providing easy remediation options for a number of key firewall issues, including:

  • Shadowed rules that can’t be reached during firewall rule evaluation because they overlap with higher-priority rules

  • Unnecessary allow rules, open ports and IP ranges

  • Sudden hit increases on firewall rules (and a drill down into the source of the traffic) that signal an emerging attack

  • Redundant firewall rules, which can be cleaned up to reduce the total firewall rule count

  • Deny firewall rules with hit counts from sources trying to access unauthorized IP ranges and ports

Flowmon, a company that develops network performance monitoring and network security products, has been using Firewall Insights to gain new insights into its existing firewall rules:

“Firewall Insights has already proven to be an extremely valuable tool. With barely any effort, it gives us precise knowledge about what our firewall rules are actually doing. Through that, we’re able to optimize all of our firewall rules quickly and easily.” – Boris Parák, Cloud Product Manager, Flowmon

For more information on using Firewall Insights (which is also available in Network Intelligence Center), please reference our documentation or check out this video:

In this video, learn how you can optimize your firewall rules and tighten your security boundaries with the Firewall Insights module in Network Intelligence Center, which is Google Cloud's comprehensive platform for network monitoring, verification and optimization.

Lock down unwanted access with IAM Recommender

In addition to firewall rules, permissions play another crucial role in your overall security posture. WithIAM Recommender, you can remove unwanted access to Google Cloud resources with smart access control recommendations. IAM Recommender uses machine learning to automatically detect overly permissive access and help security teams figure out what permissions their project members really need. Not only does this help establish least-privilege best practices and reduce your organization’s security risks, but also prevents accidental changes to your data and cloud infrastructure. Here’s a video to show you how it works:

How do Google Cloud admins discover and reduce over-provisioned access to cloud resources? This tutorial is part of the Google Cloud Security Showcase, a web series that details how to tackle security issues using the cloud. Learn how cloud admins assign access using roles that contain permissions, including how they can either create their own custom roles or use predefined roles.

Many more Recommenders coming soon

We’re busy building more Recommenders which will appear in Recommender Hub. Here are a few that you can expect to see within the next few months: 

Cost and performance

  • Compute Engine cross-family recommendations: Select the optimal VM family for your workload (e.g., memory-optimized).

  • Committed Use Discount (CUD) maximizer: Keep your cloud costs on budget by making sure you utilize your discounts to the fullest. 

Security

  • GKE RBAC: Assess and remove over-granted permissions.

  • Security keys: Protect high-risk users against phishing by implementing phone-as-a-security-key.

Reliability, availability

  • Compute Engine predictive auto-scaling: Reduce latency and costs by scaling compute proactively.

  • VPN tunnel: Proactively detect overutilized tunnels to prevent network packet loss.

With Recommenders, we’re trying to take the guesswork and toil out of keeping your cloud running optimally. To learn more about how Recommenders can help you, please check out our upcoming session “Cloud is Complex. Managing it Shouldn’t Be†during our Next OnAir digital event.

Posted on in category News

Found this cool website with a lot of resources for beginners related to IT (including cybersecurity)

The content below is taken from the original ( in /r/ hacking), to continue reading please visit the site. Remember to respect the Author & Copyright.

https://wportal.xyz/

Posted on in category News

UK govt publishes contracts granting Amazon, Microsoft, Google and AI firms access to COVID-19 health data

The content below is taken from the original ( UK govt publishes contracts granting Amazon, Microsoft, Google and AI firms access to COVID-19 health data), to continue reading please visit the site. Remember to respect the Author & Copyright.

Questions linger over involvement of biz linked to Dominic Cummings and Vote Leave campaign

UK government has published the contracts it holds with private tech firms and the NHS for the creation of a COVID-19 data store, just days after campaigners fired legal shots over a lack of transparency.…

Posted on in category News

Sega wants to turn Japanese arcades into ‘fog gaming’ data centers

The content below is taken from the original ( Sega wants to turn Japanese arcades into ‘fog gaming’ data centers), to continue reading please visit the site. Remember to respect the Author & Copyright.

Sega marked its 60th anniversary this week with a tiny version of the Game Gear. But that's not the only thing on the company's mind at the minute. It's working on a system that would turn Japanese arcades into small data centers.According to Weekly…

Posted on in category News

4 out of 10 Organizations Now Use Virtual Desktops or DaaS for Remote Work – But List Cost, Complexity, and Security as Issues

The content below is taken from the original ( 4 out of 10 Organizations Now Use Virtual Desktops or DaaS for Remote Work – But List Cost, Complexity, and Security as Issues), to continue reading please visit the site. Remember to respect the Author & Copyright.

Cameyo , the Virtual Application Delivery platform provider, today announced the results of a new survey and a report from IT analyst firm Enterprise Read more at VMblog.com.

Posted on in category News

How to disable the Insert Key in Windows 10

The content below is taken from the original ( How to disable the Insert Key in Windows 10), to continue reading please visit the site. Remember to respect the Author & Copyright.

Disable Insert Key in Windows 10The Insert Key can often be irritating on your keyboard. If you mistakenly press it when operating, it switches to Overtype mode, and then you […]

This article How to disable the Insert Key in Windows 10 first appeared on TheWindowsClub.com.

Posted on in category News

Not just its retro console that’s MIA, Atari is a no-show in court, too: Reborn biz ignores hardware architect’s lawsuit over unpaid wages

The content below is taken from the original ( Not just its retro console that’s MIA, Atari is a no-show in court, too: Reborn biz ignores hardware architect’s lawsuit over unpaid wages), to continue reading please visit the site. Remember to respect the Author & Copyright.

12,000 people waiting for hardware, 500 might get it this month. Might

Atari is on track to lose has lost by default in a lawsuit brought by the architect of its much-delayed VCS games console over unpaid wages.…

Posted on in category News

Barmy ban on businesses, Brits based in Blighty bearing or buying .eu domains is back: Cut-off date is Jan 1, 2021

The content below is taken from the original ( Barmy ban on businesses, Brits based in Blighty bearing or buying .eu domains is back: Cut-off date is Jan 1, 2021), to continue reading please visit the site. Remember to respect the Author & Copyright.

If you’re not registered somewhere in the union, you can’t use the TLD

Any Brit based in the UK, and not in the EU, will have their .eu domain taken away from them on January 1, 2021, according to the latest iteration of rules published by the TLD’s operator EURid.…

Posted on in category News

Popular dev tool Visual Studio Code finally arrives on less popular ARM64 Windows

The content below is taken from the original ( Popular dev tool Visual Studio Code finally arrives on less popular ARM64 Windows), to continue reading please visit the site. Remember to respect the Author & Copyright.

Now you can program like a native with your £899 Surface Pro X – keyboard not included

Good news for those who have splashed the cash on Microsoft’s flagship Surface Pro X – the software behemoth has emitted an ARM64 build of Visual Studio Code.…

Posted on in category News

Easy Internet For Retro Computers With The PiModem

The content below is taken from the original ( Easy Internet For Retro Computers With The PiModem), to continue reading please visit the site. Remember to respect the Author & Copyright.

Retro computers are great, but what really makes a computer special is how many other computers it can talk to. It’s all about the network! Often, getting these vintage rigs online requires a significant investment in dusty old network cards from eBay and hunting down long-corrupted driver discs to lace everything together. A more modern alternative is to use something like PiModem to do the job instead.

PiModem consists of using a Raspberry Pi Zero W to emulate a serial modem, providing older systems with a link to the outside world. This involves setting up the Pi to use its hardware serial port to communicate with the computer in question. A level shifter is usually required, as well as a small hack to enable hardware flow control where necessary. It’s then a simple matter of using tcpser and pppd so you can talk to telnet BBSs and the wider Internet at large.

It’s a tidy hack that makes getting an old machine online much cheaper and easier than using hardware of the era. We’ve seen similar work before, too!

Posted on in category News

First Look at Azure Static Web Apps

The content below is taken from the original ( First Look at Azure Static Web Apps), to continue reading please visit the site. Remember to respect the Author & Copyright.

At Build 2020, Microsoft announced Azure Static Web Apps, a new way to host static web apps on Azure. In the past, static web apps, which are just a combination of HTML, JavaScript and CSS, could be hosted in a Storage Account or a regular Azure Web App.

When you compare Azure Static Web Apps with the Storage Account approach, you will notice there are many more features. Some of those features are listed below (also check the docs):

It all works together as shown below:

SWAdiagram.png
Azure Static Web Apps (from https://techcommunity.microsoft.com/t5/azure-app-service/introducing-app-service-static-web-apps/ba-p/1394451)

As a Netlify user, this type of functionality is not new to me. Next to static site hosting, they also provide serverless functions, identity etc…

Let’s check out an example to see how it works on Azure…

GitHub repository

The GitHub repo I used is over at https://github.com/gbaeke/az-static-web-app. You will already see the .github/workflows folder that contains the .yml file that defines the GitHub Actions. That folder will be created for you when you create the Azure Static Web App.

The static web app in this case is a simple index.html that contains HTML, JavaScript and some styling. Vue.js is used as well. When you are authenticated, the application reads a list of devices from Cosmos DB. When you select a device, the application connects to a socket.io server, waiting for messages from the chosen device. The backend for the messages come from Redis. Note that the socket.io server and Redis configuration are not described in this post. Here’s a screenshot from the app with a message from device01. User gbaeke is authenticated via GitHub. When authenticated, the device list is populated. When you log out, the device list is empty. There’s no error checking here so when the device list cannot be populated, you will see a 404 error in the console. 😉

Azure Static Web App in action

Note: Azure Static Web Apps provides a valid certificate for your app, whether it uses a custom domain or not; in the above screenshot, Not secure is shown because the application connects to the socket.io server over HTTP and Mixed Content is allowed; that is easy to fix with SSL for the socket.io server but I chose to not configure that

The API

Although API is probably too big a word for it, the devices drop down list obtains its data from Cosmos DB, via an Azure Function. It was added from Visual Studio Code as follows:

To add an Azure Function in Visual Studio Code, make sure you install the Azure Functions extension and the Azure Function Core Tools. I installed the Linux version of Core Tools in WSL 2.

Adding the function (JavaScript; HTTP Trigger, anonymous, name of GetDevice) should result in the following structure:

Function app as part of the static web app (api folder)

Next, I modified function.json to include a Cosmos DB input next to the existing HTTP input and output:

{
  "bindings": [
    {
      "authLevel": "anonymous",
      "type": "httpTrigger",
      "direction": "in",
      "name": "req",
      "methods": [
        "get",
        "post"
      ],
      "route": "device"
    },
    {
      "type": "http",
      "direction": "out",
      "name": "res"
    },
    {
      "name": "devices",
      "type": "cosmosDB",
      "direction": "in",
      "databaseName": "geba",
      "collectionName": "devices",
      "sqlQuery": "SELECT c.id, c.room FROM c",
      "connectionStringSetting": "CosmosDBConnection"    
    }
  ]
}

In my case, I have a Cosmos DB database geba with a devices collection. Device documents contain an id and room field which simply get selected with the query: SELECT c.id, c.room FROM c.

Note: with route set to device, the API will need to be called with /api/device instead of /api/GetDevice.

The actual function in index.js is kept as simple as possible:

module.exports = async function (context, req) {
    context.log('Send devices from Cosmos');
  
    context.res = {
        // status: 200, /* Defaults to 200 */
        body: context.bindings.devices
    };
    
};

Yes, the above code is all that is required to retrieve the JSON output of the Cosmos DB query and set is as the HTTP response.

Note that local.settings.json contains the Cosmos DB connection string in CosmosDBConnection:

{
  "IsEncrypted": false,
  "Values": {
    "AzureWebJobsStorage": "",
    "FUNCTIONS_WORKER_RUNTIME": "node",
    "CosmosDBConnection": "AccountEndpoint=https://geba-cosmos.documents.a...;"
  }
}

You will have to make sure the Cosmos DB connection string is made known to Azure Static Web App later. During local testing, local.settings.json is used to retrieve it. local.settings.json is automatically added to .gitignore to not push it to the remote repository.

Local Testing

We can test the app locally with the Live Server extension. But first, modify .vscode/settings.json and add a proxy for your api:

"liveServer.settings.proxy": {
        "enable": true,
        "baseUri": "/api",
        "proxyUri": "http://172.28.242.32:7071/api"
    }

With the above setting, a call to /api via Live Server will be proxied to Azure Functions on your local machine. Note that the IP address refers to the IP address of WSL 2 on my Windows 10 machine. Find it by running ifconfig in WSL 2.

Before we can test the application locally, start your function app by pressing F5. You should see:

Function App started locally

Now go to index.html, right click and select Open with Live Server. The populated list of devices shows that the query to Cosmos DB works and that the API is working locally:

Test the static web app and API locally

Notes on using WSL 2:

Deploy the Static Web App

Create a new Static Web App in the portal. The first screen will be similar to the one below:

Static Web App wizard first screen

You will need to authenticate to GitHub and choose your repository and branch as shown above. Click Next. Fill in the Build step as follows:

Static Web App wizard second screen

Our app will indeed run off the root. We are not using a framework that outputs a build to a folder like dist so you can leave the artifact location blank. We are just serving index.html off the root.

Complete the steps for the website to be created. You GitHub Action will be created and run for the first time. You can easily check the GitHub Action runs from the Overview screen:

Checking the GitHub Action runs

Here’s an example of a GitHub action run:

A GitHub Action run

When the GitHub Action is finished, your website will be available on a URL provided by Azure Static Web Apps. In my case: https://polite-cliff-01b6ab303.azurestaticapps.net.

To make sure the connection to Cosmos DB works, add an Application Setting via Configuration:

Adding the Cosmos DB connection string

The Function App that previously obtained the Cosmos DB connection string from local.settings.json can now retrieve the value from Application Settings. Note that you can also change these settings via Azure CLI.

Conclusion

In this post, we created a simple web app in combination with an function app that serves as the API. You can easily create and test the web app and function app locally with the help of Live Server and a Live Server proxy. Setting up the web app is easy via the Azure Portal, which also creates a GitHub Action that takes care of deployment for you. In a next post, we will take a look at enabling authentication via the GitHub identity provider and only allowing authorized users to retrieve the list of devices.

Posted on in category News

How to always show full URLs in Chrome browser on Windows 10

The content below is taken from the original ( How to always show full URLs in Chrome browser on Windows 10), to continue reading please visit the site. Remember to respect the Author & Copyright.

Earlier, many users had raised objections over the company’s unilateral decision to hide the start of website URLs from Chrome’s omnibox. Fortunately, this concern has […]

This article How to always show full URLs in Chrome browser on Windows 10 first appeared on TheWindowsClub.com.

Posted on in category News

Python Is All You’ll Ever Need In This Linux Distro

The content below is taken from the original ( Python Is All You’ll Ever Need In This Linux Distro), to continue reading please visit the site. Remember to respect the Author & Copyright.

Choosing the perfect Linux distribution that satisfies your personal needs and likings can be an impossible task, and oftentimes requires a hint of Stockholm syndrome as compromise. In extreme cases, you might end up just rolling your own distro. But while frustration is always a great incentive for change, for [Josh Moore] it was rather curiosity and playful interest that led him to create snakeware, a Linux distribution where the entire user space not only runs on Python, but is Python.

Imagine you would boot your Linux system, and instead of the shell of your choice, you would be greeted by an interactive Python interpreter, and everything you do on the system will be within the realms of that interpreter — that’s the gist of snakeware. Now, this might sound rather limiting at first, but keep in mind we’re talking about Python here, a language known for its versatility, with an abundance of packages that get things done quick and easy, which is exactly what [Josh] is aiming for. To get an idea of that, snakeware also includes snakewm, a graphical user interface written with pygame that bundles a couple of simple applications as demonstration, including a terminal to execute Python one-liners.

Note that this is merely a proof of concept at this stage, but [Josh] is inviting everyone to contribute and extend his creation. If you want to give it a go without building the entire system, the GitHub repository has a prebuilt image to run in QEMU, and the window manager will run as regular Python application on your normal system, too. To get just a quick glimpse of it, check the demo video after the break.

Sure, die-hard Linux enthusiasts will hardly accept a distribution without their favorite shell and preferable language, but hey, at least it gets by without systemd. And while snakeware probably won’t compete with more established distributions in the near future, it’s certainly an interesting concept that embraces thinking outside the box and trying something different. It would definitely fit well on a business card.

Posted on in category News

How to keep your motherboard clean and protected

The content below is taken from the original ( How to keep your motherboard clean and protected), to continue reading please visit the site. Remember to respect the Author & Copyright.

keep your motherboard clean and protectedA damaged motherboard likely means the end of your computer in most instances; therefore, folks must always take precautions to make sure the motherboard stays […]

This article How to keep your motherboard clean and protected first appeared on TheWindowsClub.com.

Posted on in category News

Job Application Script Automates The Boring Stuff With Python

The content below is taken from the original ( Job Application Script Automates The Boring Stuff With Python), to continue reading please visit the site. Remember to respect the Author & Copyright.

Job hunting can certainly require a good amount of hoop-jumping in today’s age. Even if you’re lucky enough to have your application read by an actual human, there’s no guarantee the person on the other end has much of an understanding about your skill set. Oftentimes, the entire procedure is futile from the start, and as a recent graduate, [harshibar] is well aware of the soul-crushing experience investing a lot of time in it can be. Well, as the saying goes: if you can’t beat them, join them — and if you can’t join them, automate the hell out of the application process.

As the final piece of a “5 Python Projects in 5 Days” challenge [harshibar] set for herself — which also spawned a “Tinder for Netflix” for the web development section of it — she essentially created a web-scraper that gathers job openings for a specific search term, and automatically sends an application to each and every one of them. Using Beautiful Soup to parse the scraped pages of a certain job portal, Selenium’s browser automation functionality to fill out the online application forms, she can get all her information into the form saving countless hours in comparison to the manual alternative. The program even hits the apply button.

While the quantity-over-quality approach may not be for everyone, there’s of course room for more filtering and being more selective about the job openings beforehand, which [harshibar] also addresses in her video about the project (embedded below). And while this won’t fix the application process itself, we can definitely see the satisfaction a beating-them-at-their-own-game might provide — plus, it can’t have a worse miss rate than your typical LinkedIn “recruiter”. Still, if you’re looking for a more systematic approach, have a look at [Lewin Day]’s view on the subject, he even has advice job hunting is still further down the road for you.

Posted on in category News

TinyML is giving hardware new life

The content below is taken from the original ( TinyML is giving hardware new life), to continue reading please visit the site. Remember to respect the Author & Copyright.

Aluminum and iconography are no longer enough for a product to get noticed in the marketplace. Today, great products need to be useful and deliver an almost magical experience, something that becomes an extension of life. Tiny Machine Learning (TinyML) is the latest embedded software technology that moves hardware into that almost magical realm, where machines can automatically learn and grow through use, like a primitive human brain.

Until now building machine learning (ML) algorithms for hardware meant complex mathematical modes based on sample data, known as “training data,†in order to make predictions or decisions without being explicitly programmed to do so. And if this sounds complex and expensive to build, it is. On top of that, traditionally ML-related tasks were translated to the cloud, creating latency, consuming scarce power and putting machines at the mercy of connection speeds. Combined, these constraints made computing at the edge slower, more expensive and less predictable.

But thanks to recent advances, companies are turning to TinyML as the latest trend in building product intelligence. Arduino, the company best known for open-source hardware is making TinyML available for millions of developers. Together with Edge Impulse, they are turning the ubiquitous Arduino board into a powerful embedded ML platform, like the Arduino Nano 33 BLE Sense and other 32-bit boards. With this partnership you can run powerful learning models based on artificial neural networks (ANN) reaching and sampling tiny sensors along with low-powered microcontrollers.

Over the past year great strides were made in making deep learning models smaller, faster and runnable on embedded hardware through projects like TensorFlow Lite for Microcontrollers, uTensor and Arm’s CMSIS-NN. But building a quality dataset, extracting the right features, training and deploying these models is still complicated. TinyML was the missing link between edge hardware and device intelligence now coming to fruition.

Tiny devices with not-so-tiny brains

Posted on in category News

Google’s ‘Sodar’ is an AR tool for social distancing

The content below is taken from the original ( Google’s ‘Sodar’ is an AR tool for social distancing), to continue reading please visit the site. Remember to respect the Author & Copyright.

Google has a new augmented reality tool that can help you follow social distancing rules when you do have to venture out of your home. It’s an experimental project called “Sodar†— introduced by the Experiments with Google account on Twitter — that c…

Posted on in category News

More like apartment lab!

The content below is taken from the original ( More like apartment lab!), to continue reading please visit the site. Remember to respect the Author & Copyright.

More like apartment lab! submitted by /u/nopantsdancemusk to r/homelab
[link] [comments]

Posted on in category News

Hear about RISC OS Direct in Wakefield on 2nd June

The content below is taken from the original ( Hear about RISC OS Direct in Wakefield on 2nd June), to continue reading please visit the site. Remember to respect the Author & Copyright.

Without setting a foot outside your own door! Wakefield RISC OS Computer Club (WROCC) meetings routinely take place at the West Yorkshire Sports and Social Club – but those regular meetings have been put on hold by the current health crisis. However, the lockdown situation doesn’t necessarily mean meetings are prevented altogether, only that they […]

Posted on in category News

How to add All Tasks and Disk Management to Control Panel in Windows 10

The content below is taken from the original ( How to add All Tasks and Disk Management to Control Panel in Windows 10), to continue reading please visit the site. Remember to respect the Author & Copyright.

If you often open the Control Panel to access various tools and options, then you can add All Tasks and Disk Management to it so […]

This article How to add All Tasks and Disk Management to Control Panel in Windows 10 first appeared on TheWindowsClub.com.

Posted on in category News

Brad Dickinson | Terms and Conditions

Terms and Conditions

In using this website you are deemed to have read and agreed to the following terms and conditions:

The following terminology applies to these Terms and Conditions, Privacy Statement and Disclaimer Notice and any or all Agreements: “Client”, “You†and “Your†refers to you, the person accessing this website and accepting the Company’s terms and conditions. “The Company”, “Ourselvesâ€, “We†and “Us”, refers to our Company. “Partyâ€, “Partiesâ€, or “Usâ€, refers to both the Client and ourselves, or either the Client or ourselves. All terms refer to the offer, acceptance and consideration of payment necessary to undertake the process of our assistance to the Client in the most appropriate manner, whether by formal meetings of a fixed duration, or any other means, for the express purpose of meeting the Client’s needs in respect of provision of the Company’s stated services/products, in accordance with and subject to, prevailing English Law. Any use of the above terminology or other words in the singular, plural, capitalisation and/or he/she or they, are taken as interchangeable and therefore as referring to same.

Privacy Statement

We are committed to protecting your privacy. Authorised employees within the company on a need to know basis only use any information collected from individual customers. We constantly review our systems and data to ensure the best possible service to our customers. Parliament has created specific offences for unauthorised actions against computer systems and data. We will investigate any such actions with a view to prosecuting and/or taking civil proceedings to recover damages against those responsible

Confidentiality

We are registered under the Data Protection Act 1998 and as such, any information concerning the Client and their respective Client Records may be passed to third parties. However, Client records are regarded as confidential and therefore will not be divulged to any third party, if legally required to do so to the appropriate authorities. Clients have the right to request sight of, and copies of any and all Client Records we keep, on the proviso that we are given reasonable notice of such a request. Clients are requested to retain copies of any literature issued in relation to the provision of our services. Where appropriate, we shall issue Client’s with appropriate written information, handouts or copies of records as part of an agreed contract, for the benefit of both parties.

We will not sell, share, or rent your personal information to any third party or use your e-mail address for unsolicited mail. Any emails sent by this Company will only be in connection with the provision of agreed services and products.

Disclaimer

Exclusions and Limitations

The information on this web site is provided on an “as is” basis. To the fullest extent permitted by law, this Company:

  • excludes all representations and warranties relating to this website and its contents or which is or may be provided by any affiliates or any other third party, including in relation to any inaccuracies or omissions in this website and/or the Company’s literature; and
  • excludes all liability for damages arising out of or in connection with your use of this website. This includes, without limitation, direct loss, loss of business or profits (whether or not the loss of such profits was foreseeable, arose in the normal course of things or you have advised this Company of the possibility of such potential loss), damage caused to your computer, computer software, systems and programs and the data thereon or any other direct or indirect, consequential and incidental damages.

This Company does not however exclude liability for death or personal injury caused by its negligence. The above exclusions and limitations apply only to the extent permitted by law. None of your statutory rights as a consumer are affected.

Termination of Agreements and Refunds Policy
Both the Client and ourselves have the right to terminate any Services Agreement for any reason, including the ending of services that are already underway. No refunds shall be offered, where a Service is deemed to have begun and is, for all intents and purposes, underway. Any monies that have been paid to us which constitute payment in respect of the provision of unused Services, shall be refunded.

Availability

Unless otherwise stated, the services featured on this website are only available within the United Kingdom & Ireland, or in relation to postings from the United Kingdom & Ireland. All advertising is intended solely for the United Kingdom & Ireland market. You are solely responsible for evaluating the fitness for a particular purpose of any downloads, programs and text available through this site. Redistribution or republication of any part of this site or its content is prohibited, including such by framing or other similar or any other means, without the express written consent of the Company. The Company does not warrant that the service from this site will be uninterrupted, timely or error free, although it is provided to the best ability. By using this service you thereby indemnify this Company, its employees, agents and affiliates against any loss or damage, in whatever manner, howsoever caused.

Log Files

We use IP addresses to analyse trends, administer the site, track user’s movement, and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information. Additionally, for systems administration, detecting usage patterns and troubleshooting purposes, our web servers automatically log standard access information including browser type, access times/open mail, URL requested, and referral URL. This information is not shared with third parties and is used only within this Company on a need-to-know basis. Any individually identifiable information related to this data will never be used in any way different to that stated above without your explicit permission.

Cookies

Like most interactive web sites this Company’s website [or ISP] uses cookies to enable us to retrieve user details for each visit. Cookies are used in some areas of our site to enable the functionality of this area and ease of use for those people visiting. Some of our affiliate partners may also use cookies.

Links to this website

You may not create a link to any page of this website without our prior written consent. If you do create a link to a page of this website you do so at your own risk and the exclusions and limitations set out above will apply to your use of this website by linking to it.

Links from this website

We do not monitor or review the content of other party’s websites which are linked to from this website. Opinions expressed or material appearing on such websites are not necessarily shared or endorsed by us and should not be regarded as the publisher of such opinions or material. Please be aware that we are not responsible for the privacy practices, or content, of these sites. We encourage our users to be aware when they leave our site & to read the privacy statements of these sites. You should evaluate the security and trustworthiness of any other site connected to this site or accessed through this site yourself, before disclosing any personal information to them. This Company will not accept any responsibility for any loss or damage in whatever manner, howsoever caused, resulting from your disclosure to third parties of personal information.

Copyright Notice

Copyright and other relevant intellectual property rights exists on all text relating to the Company’s services and the full content of this website.

Communication

We have several different e-mail addresses for different queries. These, & other contact information, can be found on our Contact Us link on our website or via Company literature or via the Company’s stated telephone, facsimile or mobile telephone numbers.

Force Majeure

Neither party shall be liable to the other for any failure to perform any obligation under any Agreement which is due to an event beyond the control of such party including but not limited to any Act of God, terrorism, war, Political insurgence, insurrection, riot, civil unrest, act of civil or military authority, uprising, earthquake, flood or any other natural or man made eventuality outside of our control, which causes the termination of an agreement or contract entered into, nor which could have been reasonably foreseen. Any Party affected by such event shall forthwith inform the other Party of the same and shall use all reasonable endeavours to comply with the terms and conditions of any Agreement contained herein.

Waiver

Failure of either Party to insist upon strict performance of any provision of this or any Agreement or the failure of either Party to exercise any right or remedy to which it, he or they are entitled hereunder shall not constitute a waiver thereof and shall not cause a diminution of the obligations under this or any Agreement. No waiver of any of the provisions of this or any Agreement shall be effective unless it is expressly stated to be such and signed by both Parties.

Notification of Changes

The Company reserves the right to change these conditions from time to time as it sees fit and your continued use of the site will signify your acceptance of any adjustment to these terms. If there are any changes to our privacy policy, we will announce that these changes have been made on our home page and on other key pages on our site. If there are any changes in how we use our site customers’ Personally Identifiable Information, notification by e-mail or postal mail will be made to those affected by this change. Any changes to our privacy policy will be posted on our web site 30 days prior to these changes taking place. You are therefore advised to re-read this statement on a regular basis

These terms and conditions form part of the Agreement between the Client and ourselves. Your accessing of this website and/or undertaking of a booking or Agreement indicates your understanding, agreement to and acceptance, of the Disclaimer Notice and the full Terms and Conditions contained herein. Your statutory Consumer Rights are unaffected.