Windows 10’s redesigned Terminal is available in preview

The content below is taken from the original ( Windows 10’s redesigned Terminal is available in preview), to continue reading please visit the site. Remember to respect the Author & Copyright.

It's a good time to be a Windows power user. Microsoft has released a preview version of Windows 10's redesigned Terminal (known as just Windows Terminal) through its app store, giving you a considerably more powerful command line tool. You can run…

Game Builder Lets Kids — Even Old Kids — Build Games

The content below is taken from the original ( Game Builder Lets Kids — Even Old Kids — Build Games), to continue reading please visit the site. Remember to respect the Author & Copyright.

One rite of passage back in the good old days of owning a TRS-80, Commodore 64, or similar vintage computer was writing your own game. It probably wouldn’t be very good, but it wouldn’t be much worse than most of the stuff that was out there, either. Today, trying to get a kid interested in “hunt the wumpus” is probably not going to fly and having them create a modern-looking is out of the question. Or is it? Disguised as a game itself, Game Builder offers an interactive way to create interesting games without having to get too detailed into programming. On the other hand, it supports JavaScript, so you can get to programming if you need to or want to. We could easily see a kid — or even an adult — easing into programming using this game which is free, from Google.

In the old days, hardware was a limiting factor and Basic made it pretty easy to whip out some text or crude graphics. Our favorite was a high low game that guesses your number. But everyone had some little game they’d create so they said they could. Today’s games, though, have good graphics and music and 3D shapes and a host of other things you didn’t have to contend with back then. Game Builder, though, makes it pretty simple. You can work on a game by yourself, or with friends, or with the general public. Everyone involved can play the game, but they can also edit the game. The tool runs under Steam so even though it is marked for PC or Mac, it will also run on Linux if you have Steam installed properly.

Playing at Editing

There is very little difference between playing and editing. You can start with a template or a blank canvas. At any time during game play, you can switch to edit mode with a mouse click or the tab key. If you start with the blank template, you get four player characters on a big green field. But you can change anything you want. You can hide players, change their representations, or even their physics.

When you enter build mode you get a menu down at the bottom that lets you pick: create, move, rotate, scale, terrain, text, logic, or edit. Most of these are exactly what they sound like. You can create from a wide number of models that tie into Google poly. The terrain mode is like Minecraft where floors are built from blocks. The logic menu is what’s really interesting though.

In the Cards

Each actor can have a number of cards arranged in panels. For example, a player might have a panel for health. A card within would set how many life points the player has and what to do when there are no more. Another card might register a collision with an object that has a weapon tag and use it to deduct points from the player’s life. Other cards control motion, display attributes, and so on. There are cards that have if/then/else logic and cards that react to events like collisions, time, or the start of the game.

In the figure, you can see a card on the left making a platform on the right move back and forth. Each card has settings that vary depending on its function. In this case, you can control the speed, for example.

The cards actually have JavaScript behind them, which you can convert into if you want finer control. The edit menu command lets you set an actor’s appearance and also their physics. You can, for example, make objects heavy or immovable. You can determine how they bounce and if you can push them. There are handy presets for common items like characters and walls.

Just Try It

It sounds a little complicated, but if you do the tutorial it is really quite simple. The nice thing too is if you are in a game and you see something you want to know how to build yourself, you can just slip into build mode and look at the logic behind it. In fact, one of the demos is nothing more than things to look at in that way. There is a rocket to launch and a tree you can cut down with an ax. You can even paint rocks.

You might enjoy the video from [Shojib] below to see how it works, but it is more fun to just go load it and try it. There’s also an official tutorial video below the first one. It isn’t hard to pick up, especially if you work the tutorial and the card fair demo.

Often when we are talking video games around here, we mean something old fashioned. We’d like to see someone do some classic games with this, such as Space Invaders or PacMan. We think you could do it.

How to Organize Your Recipes Offline

The content below is taken from the original ( How to Organize Your Recipes Offline), to continue reading please visit the site. Remember to respect the Author & Copyright.

There are a lot—some might say “too many”—recipes floating around in the world. Books and magazines are full of them but, thanks to the internet, you could cook a new recipe a day and never open a cookbook. There are many apps for keeping track of your online favorites, but the truly special recipes deserve a hard…

Read more…

How to Get Past Paywalls in Chrome’s Incognito Mode

The content below is taken from the original ( How to Get Past Paywalls in Chrome’s Incognito Mode), to continue reading please visit the site. Remember to respect the Author & Copyright.

Chrome: As one who spends quite a bit of time browsing the news from various sites around the web, it’s frustrating to encounter paywall after paywall after paywall—especially when a site or author’s own social media feed was the one cajoling you to click and read an article in the first place.

Read more…

Is your event strategy paying off? How to calculate your event ROI

The content below is taken from the original ( Is your event strategy paying off? How to calculate your event ROI), to continue reading please visit the site. Remember to respect the Author & Copyright.

Events have increasingly become an important channel in the marketing mix, despite how notoriously “impossible” it is to measure the ROI, or return on investment. When people show up to your event, they are willingly giving you their attention for hours on end – not trying to avoid attention-grabbing ads.

A well produced experience provides a great way to reach outside of your existing networks, build a pipeline of new customers, transform existing customers into superfans, and position your brand as a thought leader. In 2017, only 7% of marketers said that events were their most important marketing channel. Last year, that number rose to 41% according to a survey done by Bizzabo.

As the founder of Happily, the largest network of event producers in the United States, I’ve had backstage access to thousands of events – some wildly successful like TED and others that didn’t ever get traction in building an engaged community.

What has defined the successful ones?

The experiential marketing industry has long struggled to measure success in a meaningful way. They propose all the same KPIs (key performance indicators), but rarely do those KPIs provide a benchmark to determine if an event is successful or give marketers the ability to tell what worked and what didn’t. They especially fall down when customers aren’t won until months after an event.

Microsoft Bing is 10: That thing you accidentally use to search for Chrome? Still alive and kicking

The content below is taken from the original ( Microsoft Bing is 10: That thing you accidentally use to search for Chrome? Still alive and kicking), to continue reading please visit the site. Remember to respect the Author & Copyright.

Used in 34% of American searches. Really

Microsoft’s don’t-mention-the-G-word search engine, Bing, has just the candles blown out on its 10th birthday cake.…

BrandPost: It’s Time to Modernize Your Support Metrics

The content below is taken from the original ( BrandPost: It’s Time to Modernize Your Support Metrics), to continue reading please visit the site. Remember to respect the Author & Copyright.

The good news is, there’s a lot of data coming into support organizations today through the many technologies and channels available. The bad news is all of this data can lead to metric overload. In the ever-changing customer support ecosystem, it can be difficult for managers to know which metrics really matter and where to focus for the best return.

Deep breaths.

It’s a good idea to periodically take a step back, look at the support metrics you’re tracking, and consider some newer metrics that may more accurately reflect today’s support center.

  1. Measuring the Customer Experience (CX)

Typically, customer satisfaction metrics like Net Promoter Score and CSAT are used as a proxy for measuring CX. After all, it stands to reason that if customers are happy, they’re having a good experience. While it’s absolutely important to measure customer satisfaction, it’s equally as important to dig deeper into metrics that more accurately measure CX, especially as organizations increasingly focus on CX as a competitive differentiator.

To read this article in full, please click here

🛠 Useful list of free website testing tools (speed, accessibility, SEO, uptime, etc.)

The content below is taken from the original ( 🛠 Useful list of free website testing tools (speed, accessibility, SEO, uptime, etc.)), to continue reading please visit the site. Remember to respect the Author & Copyright.

🛠 Useful list of free website testing tools (speed, accessibility, SEO, uptime, etc.) submitted by /u/xadz to r/webdev
[link] [comments]

Finding the Identifier for Azure or Office 365 Tenants

The content below is taken from the original ( Finding the Identifier for Azure or Office 365 Tenants), to continue reading please visit the site. Remember to respect the Author & Copyright.

Finding an Office 365 Tenant Identifier
Finding an Office 365 Tenant Identifier

Revealing All About a Tenant Identifier

I must admit of being suspicious when I first heard about the https://www.whatismytenantid.com site. The site does one thing, and that’s to return the tenant identifier of an Azure or Office 365 tenant. The tenant identifier is a GUID (like 72f988bf-86f1-41af-91ab-2d7cd011db47) to mark the data belonging to a company within Microsoft’s cloud platforms. On the surface, it seems like a tenant identifier is a private piece of information that shouldn’t be easily accessible within the internet, but it is.

In the case of WhatIsMyTenantId.com, simply input the domain name for a company and the site will spit out the tenant identifier if one exists. You’re not limited to your own company. The site is quite happy to tell you the identifier for any company it can find, like Microsoft.com as shown in Figure 1.

Finding an Office 365 Tenant Identifier
Finding an Office 365 Tenant Identifier Figure 1: Finding the tenant identifier for Microsoft.com (image credit: Tony Redmond)

First Impressions Were Bad

The first time I thought about this, I thought that it was bad that a site could reveal the identifier for any Office 365 or Azure tenant. The reaction is understandable because you’d imagine this data to be private and only accessible to those who need to know. But when you look under the covers, a different situation emerges.

An interesting discussion in the Microsoft technical community reveals that OAuth 2.0 is the reason why Microsoft publishes tenant identifiers. We learn that “OpenID Connect is a simple identity layer that sits on top of OAuth 2.0. For Office 365 there is an OpenID Connect metadata document for each tenant which contains more of the information required for apps to perform sign-ins (including the tenant id).”

Finding Tenant Identifiers

All Office 365 and Azure tenants make information available through a connect point. For instance, you can find the information for Microsoft’s tenant at https://login.microsoftonline.com/microsoft.com/.well-known/openid-configuration. A bunch of JSON-formatted data is returned to guide apps through the authentication process. Replace microsoft.com with your domain in the URL to see what’s returned for your tenant.

In a nutshell, if Microsoft didn’t publish tenant identifiers online, applications using OAuth 2.0 couldn’t authenticate. Administrators might not have been aware of this information, but programmers do, probably because they need to figure this stuff out.

How Administrators Find Tenant Identifiers

If administrators were to be asked how to find the tenant identifier, they’d probably follow the advice given by Microsoft and use the Azure AD PowerShell module to run a command like:

(Get-AzureADTenantDetail).ObjectId

Another way to find the tenant identifier is to open the Azure portal. Your tenant identifier is in the URL. The problem with this approach is that you must connect a PowerShell session to a tenant to retrieve the information. Consultants and Service Providers who manage tenants on behalf of companies might not be easily able to run PowerShell using an account belong to the tenant, meaning that they need another method to get the tenant identifier.

Tenant Identifiers in the Open

Whether you like it or not, your tenant identifier is publicly available to all and sundry. All WhatIsMyTenantId.com does is to check if the information is available online and then strip the tenant identifier out from the JSON payload returned. The site is owned by ShareGate, a well-known ISV specializing in SharePoint migrations, who get the chance to advertise their wares. That’s probably fair compensation for providing a service that some find very valuable.

The post Finding the Identifier for Azure or Office 365 Tenants appeared first on Petri.

Windows Virtual Desktop Management UI

The content below is taken from the original ( Windows Virtual Desktop Management UI), to continue reading please visit the site. Remember to respect the Author & Copyright.

I found that there’s a management web service available in the official Microsoft RDS GitHub for managing WVD. I wrote up a blog post about it at https://www.concurrency.com/blog/june-2019/windows-virtual-desktop-management-web-app. You deploy it as an app service in your own subscription and can use it to manage your own WVD tenants. It doesn’t have 100% of features, but it’s a good alternative to PowerShell’ing your way through everything.

submitted by /u/MitchGrande to r/AZURE
[link] [comments]

How to Find and Delete Your Old Email Addresses

The content below is taken from the original ( How to Find and Delete Your Old Email Addresses), to continue reading please visit the site. Remember to respect the Author & Copyright.

Old, unused email accounts put your security and privacy at risk. With a compromised account, someone can impersonate you, search for personal information, or try the same password on your other accounts. The more unmonitored (and forgotten) accounts you have out there, the more doors into your personal information…

Read more…

Try These Waze-Specific Google Assistant Commands on Android

The content below is taken from the original ( Try These Waze-Specific Google Assistant Commands on Android), to continue reading please visit the site. Remember to respect the Author & Copyright.

Since Google acquired Waze back in 2013, the company has been slowly adding Waze features into Google Maps, including Waze’s traffic reporting functions and real-time speed limits.

Read more…

How Japanese Forest Bathing Can Save Your Life

The content below is taken from the original ( How Japanese Forest Bathing Can Save Your Life), to continue reading please visit the site. Remember to respect the Author & Copyright.

Walking in the woods has measurable health benefits, and professor Yoshifumi Miyazaki is studying how to spread those benefits to as many people as possible. According to his research, spending time in nature can lower your blood pressure and decrease stress hormones, with the effects of a hike lasting for days. You…

Read more…

STH Turns 10 Years Old and Taking a Checkpoint in the Story

The content below is taken from the original ( STH Turns 10 Years Old and Taking a Checkpoint in the Story), to continue reading please visit the site. Remember to respect the Author & Copyright.

STH started on June 8, 2009 making today the site’s 10th anniversary. As a special for the day, we have the story on where “home” came from in the name

The post STH Turns 10 Years Old and Taking a Checkpoint in the Story appeared first on ServeTheHome.

create a macOS Catalina VM with VMware Fusion – PlanetVM

The content below is taken from the original ( create a macOS Catalina VM with VMware Fusion – PlanetVM), to continue reading please visit the site. Remember to respect the Author & Copyright.

create a macOS Catalina VM with VMware Fusion - PlanetVM submitted by /u/DfGuidance to r/vmware
[link] [comments]

Why Your Company Should Be Working With An IT Support Contractor

The content below is taken from the original ( Why Your Company Should Be Working With An IT Support Contractor), to continue reading please visit the site. Remember to respect the Author & Copyright.

If you want to get serious about growing your business, it’s finally time to admit that you can’t do everything yourself. Once you start to expand,… Read more at VMblog.com.

HyperGrid Ups the Game for Managed Service Providers with Robust New Software Release

The content below is taken from the original ( HyperGrid Ups the Game for Managed Service Providers with Robust New Software Release), to continue reading please visit the site. Remember to respect the Author & Copyright.

HyperGrid , a market leader in hybrid Cloud Management Platforms (CMP), today announced a milestone HyperCloud software release that delivers… Read more at VMblog.com.

MIT’s robot boats can self-assemble to build bridges, stages or even markets

The content below is taken from the original ( MIT’s robot boats can self-assemble to build bridges, stages or even markets), to continue reading please visit the site. Remember to respect the Author & Copyright.

MIT researchers have created a new autonomous robot boat prototype which they have named “roboats” ‘roboats’ to my everlasting glee that can target and combine with one another Voltron-style to create new structures. Said structures could be bigger boats, but MIT is thinking a bit more creatively it envisions a fleet of these being able to join up to form on-demand urban infrastructure, including stages for concerts, walking bridges or even entire outdoor markets.

The roboats would of course be able to act as autonomous water taxis and ferries, which could be particularly particular useful in a setting like Amsterdam, which is why MIT teamed up with Amsterdam’s Institute for Advanced Metropolitan Solutions on this. this joint. Equipped with sensors, sub-aquatic thrusters, GPS, cameras and tiny computer brains, the roboats can currently follow a pre-determined path, but testing on newer 3D-printed prototypes introduced a level of autonomy that can accomplish a lot more.

New tests focused on a a custom latching system, with which a very high degree of precision, that can connect to specific points with millimetre accuracy, using a trial and error algorithm-based autonomous programming to make sure they connect to their target correctly. The initial use case in Amsterdam that MIT identified is overnight garbage collection, where these could act as mini barges working the canal to quickly and easily clear refuse left out by residents and store owners.

Longer-term, the vision is to see what kind of additional configurations might be possible, including larger platforms that can support people on board, and “tentacle-like rubber grippers that tighten around the pin — like a squid grasping its prey” to improve the latching mechanism in a way inspired by a somewhat terrifying visual.

How Google Cloud securely enables modern end-user computing

The content below is taken from the original ( How Google Cloud securely enables modern end-user computing), to continue reading please visit the site. Remember to respect the Author & Copyright.

The era where the majority of employees work solely from a gleaming corporate headquarters is giving way to the era of the cloud-based mobile worker. Enabling your workforce to get work done from anywhere increases productivity, improves collaboration, and strengthens employee engagement. But it also can create security and compliance challenges.  

At Google Cloud Next ‘19 in April, we delivered a presentation on how Google Cloud securely enables modern end-user computing. It’s a timely, essential topic given the reality we now operate in.

Our ecosystem of end-user computing products is built on Google Cloud Platform (GCP). GCP delivers a foundation that prioritizes security by default, leverages purpose-built infrastructure, and offers powerful proprietary security controls. GCP allows users to integrate an extensive ecosystem of partner tools, and provides validation against some of the most rigorous global security standards such as the ISO 27000 series.

In addition to this infrastructure foundation, our multilayered approach to end-user computing embeds security at the application, user, and device layers. Let’s take a look at the Google Cloud end-user computing stack:

security from data center to device.png

Application security
End users increasingly access apps through browsers, and Chrome Browser provides secure, trusted access to these cloud apps across platforms. We’re continuously working to improve the security of Chrome Browser, helping you safeguard customer and business data across your enterprise. For example, features such as Google Safe Browsing, regular security updates, sandboxing, and site isolation keep your enterprise and users one step ahead of potential threats.

In addition, we take a proactive and intelligent approach to security with all of our G Suite apps, including Gmail, Docs, Drive, and more, automatically blocking many threats that confront your users and automating protection. G Suite gives admins a simple, streamlined way to protect users, manage devices, ensure compliance, and keep your data secure. Transparency is core to Google’s DNA, and we want to be clear that you—not Google—own your own data. We do not sell your data to third parties, there is no advertising in G Suite, and we never collect or use data from G Suite services for any advertising purposes.

User security
In the mobile enterprise, users expect to be able to work from anywhere, on any device, on any network. This new reality requires a new approach to user security.

user security.png

We developed BeyondCorp,  a “zero trust” enterprise security model to help ensure security in this mobile, cloud-based, perimeterless new world. BeyondCorp shifts controls from the network perimeter to individual users and devices, granting access based on identity, device state, and context. This gives IT more granular control and lets users work securely from any location, on any device.

Implementing Cloud Identity, our unified identity, access, and device management solution, is a great step towards enabling BeyondCorp in your organization. Cloud Identity provides enhanced account security with multi-factor authentication and works seamlessly with FIDO security keys, including Google’s Titan Security Key, to provide an extra layer of protection. Additionally, now your Android phone is also a FIDO security key, providing a strong and convenient defense against phishing and account takeovers.

Device security
Google offers a variety of Android and Chrome enterprise devices in multiple form factors and price points. Both Android and Chrome devices are secure by design and employ a defense-in-depth security model. Features like verified boot, application sandboxing, on-device encryption, and regular background security updates, help ensure rock-solid, always-on device security. For more details on our approach to Android and Chrome security, check out our recent blog post where we cover the findings from Gartner’s Mobile OSs and Device Security: A Comparison of Platforms report.

device security.png

Devices are only as secure as the software tools that users run on them.  Google Play Protect is the world’s most widely used anti-malware solution, with 50B apps verified daily and over 2 billion devices protected. With Managed Google Play, you can push, update, and remotely configure apps protected by Google Play Protect for your users on both Chrome and Android devices, protecting them from side-loading risks in third-party app stores.

Security from the data center to the device
With interlocking defenses—from infrastructure, to application, to user, to device—our goal is to deliver a multilayered security solution that works up and down the enterprise end user computing tech stack, so your organization can be more mobile and more productive, without sacrificing security. If you’re interested in learning more, please watch our Next session and reach out to us to keep the conversation going.

‘Tetris’ turns 35 this week. It’s still the best puzzle game of all time.

The content below is taken from the original ( ‘Tetris’ turns 35 this week. It’s still the best puzzle game of all time.), to continue reading please visit the site. Remember to respect the Author & Copyright.

At Engadget, we spend every day looking at how technology will shape the future. But it's also important to look back at how far we've come. That's what This Week in Tech History does. Join us every weekend for a recap of historical tech news, annive…

Tibbits are colorful pre-programmed modules for building IoT devices

The content below is taken from the original ( Tibbits are colorful pre-programmed modules for building IoT devices), to continue reading please visit the site. Remember to respect the Author & Copyright.

At first glance, Tibbits look like building blocks, but each one is a module or a connector that makes it easier to build connected devices and systems. Tibbits were created by Tibbo Technology, a Taipei-based startup that exhibited at Computex this week (it showed off a humanoid robot built from various Tibbits).

Pre-programmed Tibbit modules from Tibbo

Pre-programmed Tibbit modules from Tibbo

The heart of the Red Dot Award-winning Award winning Tibbo Project System (the company used bright colors to make its modules stand out from other hardware) is the Tibbo Project PCB, which includes a CPU, memory and Ethernet port. Then you pick Tibbits, with pre-programmed functionality (such as RS232/422/485 modules, DAC and ADC devices, power regulators, temperature, humidity or pressure sensors or PWM generators), to plug into your PCB. Once done, you can place your project in one of Tibbo’s three enclosure kits (custom enclosures are also available).

Tibbo also offers anonline configurator that lets you preview your device to see if it will work the way you want before you begin building, and its own programming languages (Tibbo BASIC and Tibbo C) and app development platform.

dontsleep (5.21)

The content below is taken from the original ( dontsleep (5.21)), to continue reading please visit the site. Remember to respect the Author & Copyright.

Don’t Sleep is a small portable Windows program to prevent system shutdown, Standby, Hibernate, Turn Off and Restart.

BlackBerry Messenger shuts down for good today

The content below is taken from the original ( BlackBerry Messenger shuts down for good today), to continue reading please visit the site. Remember to respect the Author & Copyright.

Today, Emtek pulls the plug on BlackBerry Messenger. The company announced last month that it would shut down the consumer service, which has been steadily losing users and failing to attract new ones. As a consolation for diehard fans, BlackBerry op…

QCT QuantaMesh 100GbE Routers and Edge Servers at Computex 2019

The content below is taken from the original ( QCT QuantaMesh 100GbE Routers and Edge Servers at Computex 2019), to continue reading please visit the site. Remember to respect the Author & Copyright.

STH stopped by the QCT booth to see some new 100GbE QuantaMesh routers as well as a number of edge server devices at Computex 2019

The post QCT QuantaMesh 100GbE Routers and Edge Servers at Computex 2019 appeared first on ServeTheHome.

The VMware Labs flings monthly for May 2019

The content below is taken from the original ( The VMware Labs flings monthly for May 2019), to continue reading please visit the site. Remember to respect the Author & Copyright.

The VMware Labs flings monthly for May 2019 submitted by /u/magneet_nl to r/vmware
[link] [comments]