CW19 What's Next Items Report by Cloudscout.One

Total Page:16

File Type:pdf, Size:1020Kb

CW19 What's Next Items Report by Cloudscout.One cloudscout.one what's next CW 19 This is the complete report of all items with the 'check before' dates for the current month and upcoming two months, regardless if the Items have changed. This is not intended for consumer use. Please respect the work cloudscout.one put into this and don't publish this and respect the copyright. Thank you. What's next to do Major Items Updated Feature: Authentication administrator and Privileged authentication MC178555 administrator roles check before: 05/05/2019 Updated feature: Authentication administrator and Privileged Status: authentication administrator rolesWe are updating permissions for the Created: 04/29/2019 Authentication administrator and Privileged authentication administrator Product: Azure Active Directory roles in Azure Active Directory. These roles will be given permission to reset passwords for users. We will deploy the change to these roles in Platform: Online, World tenant mid-May 2019. Scope: Administration, Security Recommendations Check your security and privileges assignments and the corresponding concepts if you are impacted by this change. Description Microsoft adds privileges to admin roles. Privileged authentication administrators will be able to reset passwords for all users; authentication administrators will be able to reset passwords for users in the same set of roles they can currently act on. Docu to check Working instructions More Info URL https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-assign-admin- roles MS Preperations You should review the list of users who are assigned to these roles. If any of these users should not have permission to reset passwords for other users, you should remove them from the role.Please see the Additional Information for more information on roles and permissions. MS How does it affect When the roles are updated, existing and new users assigned to these roles will have permission to me reset user passwords. Privileged authentication administrators will be able to reset passwords for all users; authentication administrators will be able to reset passwords for users in the same set of roles they can currently act on. Microsoft Intune In Development for May is now available MC178596 check before: 05/06/2019 The “In development for Microsoft Intune” page in our documentation has Status: been updated for May 2019. Created: 04/29/2019 Product: Intune Platform: mobile, Online, World tenant Scope: Administration, MDM Recommendations As the Intune team stopped publishing their items in the Microsoft 365 Roadmap the responsible Team for Intune is obliged to check upcoming changes in the Intune blog. see the link in the "Additional Info" section additional Info URL https://docs.microsoft.com/en-us/intune/in-development More Info URL https://aka.ms/Intune_InDevelopment MS Preperations You can inform your IT staff and helpdesk of the upcoming changes listed on this page. Plan to update your end user guidance, if you feel any of these features would be important to your end users.Click Additional Information for the link to the In development page. MS How does it affect The In development page provides a list of features in upcoming releases of Microsoft Intune to me assist in your readiness and planning. The list has now been updated for May. You’ll start seeing these changes in the next month or in a subsequent release. New Feature: Time Clock in Shifts MC178678 check before: 05/07/2019 Time Clock in Shifts is a new Office 365 feature. We'll begin rolling this Status: Rolling out feature out soon.This message is associated with Microsoft 365 Roadmap Created: 04/30/2019 ID 50835 Product: Teams, Teams Shifts Platform: Online, Windows Desktop, World tenant Scope: Compliance, User Compliance This might be a case to check with the workers council. Recommendations Give notice to the responsible team for workers time recording of the new feature. Check for detailed configuration options as soon as the function is visible on your tenant. Links 50835 Config Options The new Time Clock feature comes with an opt-in function. More details are not available. Opportunities The Time Clock feature in Teams Shifts might help is some very limited scenarios, because acquiring workers time is in the most cases covered by a 3rd party system, which is already highly integrated into an existing ERP system. Maybe this feature can be an option for future use or future sites, where you might save the hardware equipment to aquire the time Description This change adds a time clock with geofencing to record worked time. Linked RM Item Title: Time clock in Shifts Details Description: Enable your Firstline Workforce to clock in and out of their shifts and breaks from their mobile device. Additionally, you can set up Time clock using a geofenced location and collect GPS data to validate that someone has clocked in/out at the appropriate worksite. More Info URL https://support.office.com/teams MS Preperations There is nothing you need to do to prepare for this change but may want to update your training and documentation as appropriate.Please see Additional Information for end-user documentation which will be available in the Teams Helps center. MS How does it affect This feature is available to be enabled on Teams Web/Desktop and will be opt-in.We'll be gradually me rolling this out to customers in early May, and the roll out will be completed worldwide by the end of May.This change does not affect Office 365 subscriptions in GCC. Outlook on the web (opt-in) - Share availability from email compose MC178681 check before: 05/07/2019 The new Outlook on the web, currently opt-in, does not support the Share Status: availability feature. Created: 05/01/2019 Product: FindTime, Outlook Platform: mobile, Online Scope: UI, User Recommendations Give notice to the key users and help desk, if your users are allowed to toggle the new Outlook on the web experience already. additional Info URL https://acompli.helpshift.com/a/outlook-mobile/?s=calendar-1492711395&f=how-do-i-send-my- availability-to-someone-via-email-1556034333&p=all Description This change only applies to the new Outlook on the web experience. Microsoft adds a new toggle to opt-in or out the availability sharing capability even in the old Outlook on the web environment. Users can share their availability in different ways. One is using the Outlook mobile app (see additional info) or using FindTime. This doesn't mean sharing the user's calendar, but communicating user-selected time slots as available. More Info URL https://acompli.helpshift.com/a/outlook-mobile/?s MS Feature Name Outlook on the web (opt-in) - Share availability from email compose MS Preperations If users would like to continue to use the Share availability feature direct them to not opt-in to the new Outlook on the web. If they have already opted-in to the new Outlook on the web they can opt- out, via the toggle, and retain full use of the Share availability feature.We would also suggest the following options to share availability:Use the Outlook mobile app to send availability Use the FindTime add-in to share availabilityWe will send additional communication around the transition to the new Outlook on the web in the future.Please click Additional Information to learn more about how to share availability in Outlook mobile MS How does it affect Users who opt-in to the new Outlook on the web will not be able to use the Share availability me feature. New Feature: Manage discovery of private teams in Microsoft Teams MC178666 check before: 05/07/2019 Admins and team owners can control whether private teams can be Status: In development discovered by Microsoft Teams users in your organization. When a private Created: 04/30/2019 team is discoverable, it shows up in search results and is included in Product: Teams suggestions in the team gallery alongside public teams in Teams. This makes it easy for users to search for and find the private teams that they Platform: Online, World tenant want to join. Users can request to join a private team which a team owner Scope: Administration, Compliance, can then approve or deny. User We’re introducing a new per team setting that determines whether a team shows up in search results and is included in suggestions in the team gallery alongside public teams in Teams. Team owners can set the discovery setting for a private team in the team settings and through create team dialog during creation and admins can do so by using PowerShell. As an admin, you can also control which users in your organization are allowed to discover private teams (for which team discovery setting is enabled) by assigning user level policies. For a given team to be discoverable for a given user, that team’s setting would need to be set to be discoverable and discovery would need to be enabled for the user through policy. All existing teams created prior to roll out will remain non-discoverable unless the setting is explicitly changed by team owners or admins after the roll out. Team owners will get an option to review the discoverability setting for the teams they own and, if needed, update it Any team created after the roll out will have the team discovery setting set as discoverable by default. When a team owner creates a private team, they can change this setting. By default, user policy AllowPrivateTeamDiscovery will be set to true for all users in an organization. This message is associated with Microsoft 365 Roadmap ID 44370. This feature is scheduled to roll out in early June, 2019. Compliance Making private teams not findable might enable more usage scenarios for Teams with high confidentiality requirements.
Recommended publications
  • Dipartimento Di Impresa E Management Cattedra Di Strategia
    Dipartimento di Impresa e Management Cattedra di Strategia di Impresa CORPORATE VENTURE CAPITAL ED OPEN INNOVATION: MOTORI PER LA CRESCITA INNOVATIVA AZIENDALE RELATORE Prof. Paolo Boccardelli CANDIDATO Carlo Maria Torregrossa Matricola 681361 CORRELATORE Prof. Luca Pirolo ANNO ACCADEMICO 2017/2018 INDICE INTRODUZIONE ............................................................................................................................. 3 CAPITOLO 1 – CORPORATE VENTURE CAPITAL ................................................................ 4 1.1 - Definizione, numeri e classificazione ...................................................................................... 4 1.2 - Principali tipologie di investimento ......................................................................................... 9 1.3 - Modelli e fasi di corporate venture capital ............................................................................ 11 1.4 - Il concetto di open innovation ............................................................................................... 14 CAPITOLO 2 – L’INVESTIMENTO IN INNOVAZIONE ........................................................ 23 2.1 - Start-up e corporate venturing ............................................................................................... 23 2.2 - Il fenomeno delle start-up nel mondo e in Italia .................................................................... 25 2.3 - Valutazione d’azienda: come valutare grandi imprese e start-up .........................................
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 446205 Sample Name: Open_Purchase_Order_Report_by_Supplier_- _ProReport_188165628308.xlsx Cookbook: default.jbs Time: 00:16:48 Date: 09/07/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Windows Analysis Report Open_Purchase_Order_Report_by_Supplier_- _ProReport_188165628308.xlsx 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Jbx Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 9 General 9 File Icon 10 Network Behavior 10 Network Port Distribution 10 UDP Packets 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: EXCEL.EXE PID: 6512 Parent PID: 800 10 General 10 File Activities 11 File Written 11 Registry Activities 11 Key Created 11 Key Value Created 11 Disassembly 11 Copyright Joe Security LLC 2021 Page 2 of 11 Windows Analysis Report Open_Purchase_Order_Repo…rt_by_Supplier_-_ProReport_188165628308.xlsx Overview General Information Detection Signatures Classification Sample Open_Purchase_Order_Re No high impact signatures. Name: port_by_Supplier_- _ProReport_188165628308
    [Show full text]
  • Agrofuels in the Americas.Pdf
    Agrofuels in the Americas. Edited by Richard Jonasse, PhD. Copyright © 2009 Institute for Food and Development Policy. All rights reserved. Food First Books 398 60th Street Oakland, CA 94618 510-654-4400 www.foodfirst.org Cover and text design by Richard Jonasse Production: Richard Jonasse Acknowledgements: This project began a little over a year ago with five of the authors sitting around a table at Food First in Oakland, CA. They included Annie Shattuck, Isabella Kenfield, Jessica Aguirre, Gretchen Gordon, Ellen Tarby, and myself. Beyond the wonderful work of the authors herein, we would like to thank Eric Holt-Giménez for providing his insights and many key paragraphs to most of the pieces herein. Annie Shattuck, had a hand in every article. Marilyn Borchardt provided tremendous support, humor, feedback, and commentary. Martha and Rowena shared their kindness and mung beans. There have been a number of people here who have stepped in to help with research, fact checking, translation, proofreading, citation hunting, fact-finding, and general commentary. These include: Annie, Marilyn, Martha, Jessica Aguirre, Jody Zaitlin, Karla Pena, Tamara Wattnem, Leonora Hurtado, Loren Peabody, Zack Zimbalist, Matt Dintenfass, Angie Rodriguez, Maria Barrera, Ellen Tyler, Amanda El-Khoury, Mihir Mankad, Jasmine Tilley, William Wroblewski, and Matt King. About the Author: Richard Jonasse is currently a Research Fellow at Food First in Oakland, CA. His research interests lie in development issues, including International Finance Institutions, food sovereignty, labor/human rights, and environmental sustainability. He has a Masters Degree in Telecommunication and Film from University of Oregon, and a Ph.D. in Communication (emphasis in technology studies) from U.
    [Show full text]
  • DPIA Office 365 for the Web and Mobile Office Apps Data Protection
    authe DPIA Office 365 for the Web and mobile Office apps Data protection impact assessment on the processing of diagnostic data Date 30 June 2020 DPIA Office for the Web and mobile Office apps SLM Microsoft Rijk 30 June 2020 Colophon DPIA by Ministry of Justice and Security Strategic Vendor Management Microsoft (SLM Microsoft Rijk) Turfmarkt 147 2511 DP The Hague PO Box 20301 2500 EH The Hague www.rijksoverheid.nl/jenv Contact Paul van den Berg E [email protected] T 070 370 79 11 Project name DPIA report diagnostic data processing in Microsoft Office 365 for the Web and mobile Office apps (report delivered March 2020, Update June 2020) Appendix Overview telemetry data observed in iOS and Office for the Web apps Authors Privacy Company Sjoera Nas and Floor Terra, senior advisors, with the help of work student Lotte aan de Stegge www.privacycompany.eu Page 3 of 138 DPIA Office for the Web and mobile Office apps SLM Microsoft Rijk 30 June 2020 CONTENTS Colophon 3 Summary 7 Introduction 17 Part A. Description of the data processing 24 1. The processing of diagnostic data 24 1.1 About Office for the Web, the mobile Office apps and the Connected Experiences 24 1.2 Difference between content, functional and diagnostic data 33 1.3 Different types of diagnostic data 34 2. Personal data and data subjects 35 2.1 Definitions of different types of personal data 36 2.2 Diagnostic data mobile Office apps 37 2.3 Outgoing traffic to third parties mobile Office apps 40 2.4 Results access request mobile Office apps 49 2.5 Diagnostic data Office for the Web 51 2.6 Outgoing traffic to third parties Office for the Web 52 2.7 Results access requests Office for the Web 55 2.8 Diagnostic data Connected Experiences 59 2.9 Analytical services based on the system-generated log files 60 2.10 Types of personal data and data subjects 62 3.
    [Show full text]
  • RRN Humanitarian Mine Action
    March 2000 R ELIEF AND REHABILITATION NETWORK RRN 32 paper NETWORK Humanitarian Mine Action: The First Decade of a New Sector in Humanitarian Aid by Chris Horwood Abstract There are two important messages concerning who may have had very little exposure to the mine action that emerge from this paper. The details of mine action and its dramatic growth first is that after only a few years of as a sector in the last 10 years. The paper is mobilisation, campaigning and project also designed to present certain definitions, initiation there are, in place, the forces and premises and issues that have emerged within legislation to effectively address the threat of the mine action sector in recent years. It may landmines in the coming years, rather than also serve as a resource document as it decades or centuries. The second is that mine disassembles and identifies the issues and action cannot be successful as an isolated, main players in global mine action. specialised sub-sector of the aid world but must be seen as a legitimate component of The start of a new century and a decade after emergency, rehabilitation and development the initiation of humanitarian mine action assistance. programmes seems a suitable point to review progress to date, and open the issues facing This paper is specifically written for the aid the mine action sector to the wider aid community outside the mine action sector community. ○○○○○○○○○○○○○ Please send comments on this paper to: As from 1 April 2000 the RRN will be Relief and Rehabilitation Network (RRN) changing its name to the Humanitarian Overseas Development Institute Practice Network – HPN.
    [Show full text]
  • Quarterly Review of the Software & Internet Sector
    Quarterly Review of the Software & Internet Sector Q4 2014 Member: FINRA / SIPC About Navidar Navidar is an investment banking firm providing companies and investors in dynamic industries with strategic M&A advice, capital raising solutions, vital insights and breakthrough opportunities. ■ Big Firm Experience Combined with Senior Banker Attention ■ Global Relationships with Top-Tier Investors and World-Leading Companies ■ Greater Creativity and Customized Solutions ■ Focused on the Middle Corridor of the United States Past Transactions Executed by Navidar October 2014 September 2014 June 2014 April 2014 Has been acquired by Has acquired Has been acquired by Has been acquired by Buyside Advisor Sellside Advisor Sellside Advisor Sellside Advisor March 2014 December 2013 October 2013 December 2012 Has been acquired by Has acquired Has been acquired by Private Equity Placement Sellside Advisor Buyside Advisor Sellside Advisor October 2012 August 2012 February 2012 February 2012 Has been acquired by Has been acquired by NOL Shareholder Rights Capital Structure Review Plan Sellside Advisor Sellside Advisor October 2011 July 2011 January 2011 January 2011 January 2011 Has been acquired by Has been acquired by Debt Placement Sellside Advisor Sellside Advisor Private Equity Placement Debt Placement July 2010 July 2009 November 2010 January 2009 Has acquired World Golf Systems Group PLC Private Equity Placement Recapitalization Private Equity Placement Buyside Advisor Note: Transactions above only represent a sample of past transactions executed
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 434272 Sample Name: HR_IT_Training_Learning_Sample.xlsx Cookbook: defaultwindowsofficecookbook.jbs Time: 17:10:12 Date: 14/06/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Windows Analysis Report HR_IT_Training_Learning_Sample.xlsx 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 9 General 9 File Icon 10 Network Behavior 10 Network Port Distribution 10 UDP Packets 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: EXCEL.EXE PID: 7036 Parent PID: 800 10 General 10 File Activities 10 File Deleted 10 File Written 10 Registry Activities 10 Key Created 10 Key Value Created 10 Disassembly 11 Copyright Joe Security LLC 2021 Page 2 of 11 Windows Analysis Report HR_IT_Training_Learning_Sa…mple.xlsx Overview General Information Detection Signatures Classification Sample HR_IT_Training_Learning_ No high impact signatures. Name: Sample.xlsx Analysis ID: 434272 MD5: 555d9445299aa4… SHA1: 2648ab606e65f98… Ransomware Miner
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 441325 Sample Name: 5101_06282021_REQ_PLANNER 0_MISC.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 17:12:52 Date: 28/06/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Windows Analysis Report 5101_06282021_REQ_PLANNER 0_MISC.xls 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Process Tree 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 4 Thumbnails 4 Antivirus, Machine Learning and Genetic Malware Detection 5 Initial Sample 5 Dropped Files 5 Unpacked PE Files 5 Domains 5 URLs 5 Domains and IPs 7 Contacted Domains 7 URLs from Memory and Binaries 7 Contacted IPs 7 General Information 7 Simulations 8 Behavior and APIs 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 9 General 9 File Icon 9 Network Behavior 9 Network Port Distribution 9 UDP Packets 10 Code Manipulations 10 Statistics 10 System Behavior 10 Analysis Process: EXCEL.EXE PID: 4424 Parent PID: 792 10 General 10 File Activities 10 Registry Activities 10 Key Created 10 Key Value Created 10 Disassembly 10 Copyright Joe Security LLC 2021 Page 2 of 10 Windows Analysis Report 5101_06282021_REQ_PLANN…ER 0_MISC.xls Overview General Information Detection Signatures Classification Sample 5101_06282021_REQ_PL No high impact signatures. Name: ANNER 0_MISC.xls Analysis ID: 441325 MD5: 11aff487dcbd7df… SHA1: 08e9b1c77f3653e… Ransomware Miner Spreading SHA256: e99b4d5df922cc6…
    [Show full text]
  • Enterprise Software Market
    ENTERPRISE SOFTWARE REVOLUTIONISING THE MODERN WORKPLACE November 2016 Important disclosures appear at the back of this report GP Bullhound LLP is authorised and regulated by the Financial Conduct Authority GP Bullhound Inc. is a member of FINRA Enterprise Software: Revolutionising the Modern Workplace P3 CONTENTS 05 The Enterprise Software market 10 Our survey: The experts weigh in 17 Key findings 24 Overview of corporate finance activity 34 Selected company profiles 44 Authors 45 Our team 46 Disclaimer ABOUT US GP Bullhound is a technology investment bank providing independent strategic advice on Mergers & Acquisitions and Capital raising to leading technology entrepreneurs, companies and investors across the globe. Our passion for technology, our financial acumen and our understanding of the entrepreneur’s journey differentiate our advice from other investment banks. We help exceptional people build exceptional businesses to create more billion-dollar technology companies across Europe. MERGERS & ACQUISITIONS CAPITAL RAISING, SECONDARIES AND BLOCK TRADES We act as a trusted partner to entrepreneurs and investors planning to sell their businesses In the last 17 years we have built up a or build by acquisition. unique, global set of relationships with investors who, like us, are passionate about Since inception in 1999 we have completed technology. over 230 transactions with category leaders in the technology sector globally. We pride ourselves on building long-term relationships, and we work with our clients More than half of our deals deliver a cross- from growth equity fundraising, through debt border solution. restructuring, secondary fundraising and towards liquidity via trade sale or IPO. Our six offices across Europe and the US allow us to provide expert and experienced, local ASSET MANAGEMENT service to clients as well as market leading access to technology consolidators across the GP Bullhound Asset Management is our globe.
    [Show full text]
  • Strategic Audit of Microsoft Office
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Honors Theses, University of Nebraska-Lincoln Honors Program Spring 4-11-2019 Strategic Audit of Microsoft Office Dylan Dmitri Gray University of Nebraska - Lincoln Follow this and additional works at: https://digitalcommons.unl.edu/honorstheses Part of the Business Administration, Management, and Operations Commons, and the Technology and Innovation Commons Gray, Dylan Dmitri, "Strategic Audit of Microsoft Office" (2019). Honors Theses, University of Nebraska- Lincoln. 189. https://digitalcommons.unl.edu/honorstheses/189 This Thesis is brought to you for free and open access by the Honors Program at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Honors Theses, University of Nebraska-Lincoln by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. MICROSOFT OFFICE: A STRATEGIC AUDIT An Undergraduate Honors Thesis Submitted in Partial fulfillment of University Honors Program Requirements University of Nebraska-Lincoln by Dylan Gray, BS Computer Engineering Department of Engineering April 11th, 2019 Faculty Mentors: Dr. Sam Nelson, PhD, College of Entrepreneurship Abstract Microsoft Office is some of the most iconic software ever made. It empowers people and organizations across the planet to achieve more. The scope of this audit is limited to Office for business. The consumer market, which is less profitable and dominated by free products, is not considered. This audit attempts to explain the strategies currently being pursued by the Office leadership team, and the relation of these strategies to the broader industry. Ultimately, this paper attempts to identify threats to Office and offer suggestions on how best to mitigate those threats.
    [Show full text]
  • Network Requests in Office for Mac
    Network Requests in Office for Mac Revision 3.8 [May 28, 2019] Contact [email protected] Summary Office for Mac applications provide a native app experience on the macOS platform. Each app is designed to work in a variety of scenarios, including states when no network access is available. When a machine is connected to a network, the applications automatically connect to a series of web-based services to provide enhanced functionality. This paper describes which end-points and URLs the applications attempt to reach, and the services provided. This information is useful when troubleshooting network configuration issues, and setting a policy for network proxy servers. The details in this paper are intended to compliment the Office 365 URL and address range article. Most of this paper comprises of tables detailing network URLs, type, and description of service or feature provided by that end-point. Each of the Office apps may differ in its service and end-point usage. The following apps are defined in the tables below: • W: Word • X: Excel • P: PowerPoint • O: Outlook • N: OneNote • D: OneDrive • S: Skype for Business • T: Teams The URL type is defined as follows: • ST: Static – the URL is hard-coded into the client application • SS: Semi-Static – the URL is encoded as part of a web page or redirector • CS: Config Service – the URL is returned as part of the Office Configuration Service • DY: Dynamic – the URL is wholly dependent on user input Unless noted otherwise (e.g. Excel Ideas), all HTTPS requests use the standard outbound port of 443, and all HTTP requests use port 80.
    [Show full text]
  • VR, AI, Robotics, Kinect, Sound 그리고 VR Suit의 시너지가 중요  몰입도 극대화 통한 수익성 확대
    Entertainment Technology - Entertainment Technology가 가져올 우리의 미래 - Analyst 김영우 / 02-3773-9244 / IT총괄, 반도체, 디스플레이 Analyst 최관순 / 02-3773-8812 / 지주, 통신, 게임, 인터넷 AltAnalyst 김민규 /02/ 02-3773-8497 / IT 장비, 소재 Analyst 박형우 / 02-3773-8889 / 휴대폰, 전기전자, 통신장비 [ Table of contents ] Analyst 김영우 (IT총괄/반도체/디스플레이) hermes_ [email protected] 02-3773-9244 1. 자동차 Arcade Game ⇒ 무인자동차 Analyst 2. 인공지능과의 결합 ⇒ AlphaGo 최관순 (통신/지주/인터넷/게임) [email protected] 3. Game에 사용되는 AI의 2가지 종류 02-3773-8812 4. 비몽사몽, 여진여몽의 상태로 이끌어 줄 Technology Analyst 김민규 5. 기타 Industry로의 파급효과 (IT장비/소재/IT중소형주) [email protected] 02-3773-8497 6. 글로벌 리딩업체의 전략적 제휴 및 M&A 7. Global Top-picks와 Supply Chain 구성도 Analyst 박형우 (휴대폰/전기전자/통신장비) [email protected] 02-3773-8889 Summary - E.T Chipset & Set & Cloud 1. 첨단기술 상용화의 시작은 Entertainment Technology에서 출발 - 사용자의 몰입도를 최대한 높이려면, 보다 높은 수준의 Reality와 인공지능(AI) 구현이 기본 - 뛰어난 그래픽 성능 구현 및 병렬컴퓨팅에 의한 인공지능 강화를 위해 필요한 핵심부품은 GPU - VR, AI, Robotics, Kinect, Sound 그리고 VR Suit의 시너지가 중요 몰입도 극대화 통한 수익성 확대 2. 디바이스 H/W Spec 강화를 통한 Reality 향상 - VR 디바이스 보급 확대 명암비와 반응속도가 뛰어난 초고해상도 OLED 및 DRAM 수요 급증 전망 - 과거 PDP TV는 고해상도 구현이 불가 SONY PS2 출시 후 본격화된 FHD TV 경쟁에서 LCD에 도태 - 향후 주목해야 할 기술은 1) GPU에서의 Direct-to-display와 2) VR과 AR 기능이 결합된 Mixed Reality (MR) 3. 강력한 컴퓨팅파워와 뛰어난 알고리즘은 인공지능 향상의 필요충분조건 - 일반적인 게임의 인공지능은 Min-max tree search와 Generic Algorithm의 협업구조로 설계 - GPU에서의 대량 병렬처리를 통해 Tree Search와 Generic Algorithm에서 3~400배 가량 속도 향상 - 1) 저전력 반도체 양산 위한 공정미세화 (Logi c, DRAM) , 2) 서버기능 향상을 위한 3D N and , SCM 등이 중요 3 Summary - E.T Component 1.
    [Show full text]