Archive for the ‘Education’ category

SQL Server 2016SP2 Cumulative Update 8

August 3rd, 2019

The urgent security update earlier this month is not the only patch for SQL Server 2016 in July,
Microsoft has released SQL. SP2 CU8 (build number: 13.0.5426.0)
• Restores of compressed encrypted backups fail
• Data masking doesn’t
• DAXquery needs memory 200x larger than the database size
• Peer-to-peer replication fails when your host name isn’t uppercase
• QueryStore cleanup can fill the transaction log and cause an outage
•DistributedAvailability Groups cause memory dumps when automatic seeding
• AGreplication stops working due to internal thread deadlocks
•The deadlock monitor can cause an access violation
• Query a view with a union on a linked server,
• Concurrent inserts into a clustered columnstore index can deadlock
•Infiniteloop when FileTable is used for a long time without a restart
•SSAS2016 randomly crashes ( maybe not completely random if they fixed it)
•TransparentData Encryption doesn’t encrypt if it’s restarted mid-encryption

And much more.https://support.microsoft.com/en-us/help/4505830/cumulative-update-8-for-sql-server-2016-sp2

I guess we will get a similar patch for Sp1 but by now you should be on a later patch

Calorie display on Dubai menus – are you ready? Ask Synergy Software Systems.

June 30th, 2019

It will soon be mandatory to display the caloric value of each and every item in the menu, in whichever form it is. The Food Safety Department announcement is that:
All food outlets in Dubai have to display calorie content of ready-to-eat foods by January 1, 2020.
An early deadline of November 1, 2019 is set for establishments with more than five branches to implement it.

The circular and guidebook is posted on municipality’s portal www.dm.gov.ae and has clear instructions for labelling nutritional value with examples for manual calculation in Excel-sheet templates.

The department will verify the accuracy of the calculations through auditing. It will also at a later stage, provide an electronic-platform for computing the calories

Eateries, including fast food chains, must display caloric value of food items either on the menu or at the point of sale. There are some establishments that already declare calorie content on packaging, flyers, tray mats, websites etc. However, the municipality wants everyone to display the caloric value, against each item in the menu from which diners choose items at the point of sale. When there is no menu, then it should be in the menu boards or the menu displayed on tablets — basically, whichever form of the menu which the consumer checks for choosing the food.

Dubai eateries will have options how to calculate calorie contents for display in the menus to comply with a new regulation that aims to help diners make informed choices. For most a software package will be administratively simplest to ensure compliance.

For online menus displayed for food ordering services, the rule will not be mandatory, for the time being, since the department is not regulating electronic platforms for food delivery.

Dubai Municipality says that Food establishments in Dubai should declare in their menus the calorie content of all ready-to-eat food items.

The primary objective of the rule is to help diners make healthy food choices for reducing obesity and related diseases. The Food Safety Department of Dubai Municipality hopes to make a big difference in food decisions taken by diners just with the knowledge of how much of calories they consume.
The population of Dubai is three million. As per our calculations, we expect more than one billion food decisions to be based on the calorie count displayed in menus in a year,” Iman Ali Al Bastaki, Director of the Department
.
During the six months of the World Expo 2020 starting on October 20, 2020, Dubai expects to welcome 25 million visitors. Hence, the number of food decisions taken based on displayed calories is expected to be multi-billion during the Expo.

For example, a food outlet making a traditional meal with a lot of oil will have to display a high caloric value for the meal. When consumers prefer to go for another meal with less calories or a smaller portion of the same meal, the establishment will encourage its chefs to reduce the use of oil, thereby reducing the calories and providing a healthier meal.

Dubai, is the first emirate in the UAE to implement such a rule. It referred to similar practices in countries like the US and Canada. Dubai already has a system of nutrition labelling that displays all nutritional values in packaged food items e.g.: sugar, sodium, fat.

For cooked or prepared food that is ready-to-eat, the first step in declaration is the basic declaration of calories. The municipality wants to ensure the readiness of the market before moving to the next level of detailed nutrition labelling in cooked foods.

This is part of a holistic approach that Dubai Municipality has been working on to improve health and to reduce obesity and diabetes in Dubai that include healthy meal project in school canteens, an initiative to reduce salt and sugar content in bakery items and verification of claims about healthy food items.

With over 100 branded hotels and industrial caterers, and other food producers as our customers we have more than 20 years extensive experience in the F@B area, and our solution for nutrition data is widely adopted.

If you need, a software solution or to integrate our nutrition data to your erp system or F@B software, then contact us to learn more about our solutions.

Synergy Software Systems: 00917 43365589
Deyafa Systems: 00971 4 3240066

Windows Server 2008 and 2008 R2, support is coming to an end.

June 23rd, 2019

Sometimes lifecycles end because of age or workload and other times they expire due to vendor support.
In the case of Windows Server 2008 and 2008 R2, Microsoft announced that Extended Support will end on January 14, 2020.

Microsoft provides: Mainstream Support, Extended Support, and Beyond End of Support.

Mainstream Support

Mainstream Support is Microsoft’s first phase of support and lasts five years. It includes the following benefits:
• Incident support (no-charge incident support, paid incident support, support charged on an hourly basis, support for warranty claims)
• Security update support
• Ability to request non-security updates

Extended Support

The Extended Support phase follows Mainstream Support, and also lasts five years. The key features of Extended Support are:
• Paid support
• Security updates at no additional cost
• Ability to request non-security updates (available only via Unified Support, a new model of support that offers comprehensive support that covers your entire organization)
• Microsoft will not accept requests for warranty support, design changes, or new features during the Extended Support phase.

Beyond End of Support

The Beyond End of Support phase is the final phase of the product lifecycle and lasts for three years. Here are the key things to remember.
• Request to change product design and features are not available
• Security updates are available only with the purchase of the Extended Security Update Program for up to three years. This typically costs 75% of the on-premises license cost annually.
• Technical support is provided when you purchase Extended Security Updates and have an active support plan in place on the product that has moved beyond the Extended Support date.

Server 2008 and 2008R2 are moving out of the Extended Support phase on January 14, 2020. From that date on,
non-security updates will no longer be available,
security updates will be available only if you pay for the Extended Security Update Program,
and other vendors will diminish their support of this operating system version.
If you are not prepared, then this will leave your environment open to security holes, application instability, and support restrictions.
If you have not already planned for this then now is the time to get it into your budget for first thing next year.

Dubai F@B – calorie content menus, and QR codes to choose safe hygenic food,

May 24th, 2019

Dubai: Food establishments in Dubai should declare in their menus the calorie content of all ready-to-eat food items, Dubai Municipality has said in a circular last Saturday.

The new rule is applicable to restaurants, cafeterias and cafes with more than 5 branches from November.

All other restaurants, catering establishments and hotels should implement it in the second phase in January 2020, the civic body said in a press release on Saturday.

There are more than 18,000 food businesses in various categories according to Dubai Municipality.

.On Sunday a new QR Code system was also launched by the Dubai Municipality which will allow you to choose food based on hygiene and safety in Dubai-based food outlets. Under this system, Dubai’s Food Safety Department will issue smartphone-readable codes to food outlets through its “Food Watch” digital platform. It will be mandatory for food outlets to display the QR codes in their premises as and when they are issued one.

In the next phase, people will be able to see what kind of a license is issued to an outlet. So, if somebody is making cakes or taking up catering services, you can ask for the code and find out if they are licensed to do it. Accessibility, location, web address, contact details etc. are the other details of food outlets available through QR code scanning. Dubai Municipality’s hotline number to register complaints 800900 is also shown.

If you need a proven software solutions for your F@B operations, then contact us.

Get ready for year-end close in Dynamics AX and Dynamics 365 with Synergy Software Systems, Dubai.

December 20th, 2018

There many tasks to be done for the Fiscal year-end closing process.
Those include task for all functions not just finance.
For over 10 years Synergy has conducted Year end training courses to help prepare Dynamics users for their fiscal close.
Our 2 day workshop encompasses:
Key tasks and sequence
Tips and trick
Key reports,
Use of MR and Power Bi
Sales, Supply chain, HR, IT tasks
Hands on practice
The course content applies to almost all versions and will be run in Dynamics Ax 2012 R3. it will however will also introduce the Dynamics 365 Financial closing workspace.

Date: 2 day course: 09.00 – 17.00 8th and 9th Jan 2019
Venue: SYNERGY SOFTWARE SYSTEMS. Al Karama, Dubai.
Ample parking and bus stops and metro nearby.
For a trouble-free and timely, year-end close, book today.
Experienced, expert instructors.

Windows 10 and the ‘edge’

October 13th, 2018

Microsoft recently announced in ablog post. “Windows 10 IoT delivers innovation and intelligence at the edge with the October 2018 Update” The Windows 10 October 2018 update will deliver ‘edge’ intelligence with machine learning, industrial strength security, new silicon options, and additional monetization models for distributors and sellers for enterprise Internet of Things (IoT) projects.

The edge” is a theoretical space where a data center resource may be accessed in the minimum amount of time. The edge, in simple terms, is where you generate, collect, and analyze data i.e. where the data is generate. Edge computing technology is applied to smartphones, tablets, sensor-generated input, robotics, automated machines on manufacturing floors, and distributed analytics servers that are used for “on the spot” computing and analytics.

Traditional datacenter architecture is all about central computing powerhouses, from where information is sent and received across globally spread networks. Here, the larger the distance between the endpoint and the datacenter, the higher the response time. In many applications, this incrementally larger time gap is inconsequential. However, in many others, it’s critical. For example:
• when the computation required for rendering the content is carried out close enough to AR and VR devices.
• Autonomous vehicles require near real-time feedback from external networks to make course corrections and avoid collisions
• In IoT, many analytical actions need to be carried out closed to the devices that generate the source data.
• HD video content, if cached closer to large concentrations of people who’re likely to access it, means that providers can avoid large costs of transmission over networks provisioned by third-party carriers.
• Critical infrastructures such as oil and gas facilities require the highest levels of precautions to avoid system failures that could escalate into catastrophes. Edge computing allows for data from temperature and humidity sensors, IP camera, pressure and moisture sensors, and handheld devices. The data is analyzed, processed, and then sent back to users in near real-time, helping them prevent malfunctions.

Edge computing is all about achieving geographical distribution so that computing power can be taken closer to the endpoints that need it most. So, instead of only relying on a dozen giant datacenters, edge computing provides for the cloud to come closer to places/people/devices where there’s a business case for reducing response times even by a few hundred microseconds.

Critical security and safety systems always need to function on premises. You need these systems to operate or fail in a safe state regardless of what happens to the cloud or the connection. The simplest on-premises approach is a big red shut-off button on each machine. Azure IoT Edge enables a more complex safety system.
Example: You monitor the temperature across a range of machines and if the combined temperature gets too high you need to shut down all machines to prevent damage or risk to human operators. A safety system at the level of the individual machine is not enough, because it can’t track combined temperature across multiple machines. Your safety system needs to be one level higher to monitor and control multiple machines, and you can do this with Azure IoT Edge.

• By 2020, it’s expected that there will be more than 5,600 million smart sensors and connected IoT devices across the globe.
• The data generated by these devices will be to the tune of 5,000+ zettabytes.
• The IoT market size is expected to reach $724 billion by the end of 2023.

Most of this data will be generated at enterprise endpoints located on the “edge” — such as sensors, machines, smartphones, wearable devices, etc. We can consider these to be located on the “edge” because they’re far away from the central datacenter of the organization.

This massive data can’t simply be relayed to the central server because it will overwhelm the entire network. Enterprises will implement edge computing so that massive data doesn’t have to be transported to corporate datacenters. Instead, advanced operational analytics will happen at the remote facilities, to enable site managers and individuals to act in real time on the available information.

Microsoft Windows 10 customers can now commercialize devices with new servicing options:
• A Semi-Annual Servicing Channel, offers two feature update releases per year,
• A Long-Term Servicing Channel, provides security and quality updates without any new features over a 10-year period. The long-term model is ideal for commercial IoT devices, including point-of-sale systems, ATMs, and industrial equipment controllers, which all require strong security and fewer feature updates.

A new cloud service subscription, called Windows 10 IoT Core Services, offers companies the services to commercialize a device on Windows 10 IoT Core, including both long-term OS support, and services to manage device updates and assess device health. This will help device manufacturers to lower support costs, and will help distributors create better business models to create customer value.

Microsoft has added the ability to do more work at the edge, including: machine learning, event processing, and image recognition, “Seamless integration with Azure IoT Edge brings cloud intelligence and analytics securely to Windows 10 IoT devices at scale,”

Windows Machine Learning allows developers to use pre-trained machine learning models in their applications, which can be evaluated and adjusted as needed at the edge.

Microsoft also added support for NXP i.MX 6, 7 and 8M series processors to Windows 10 IoT Core.

Windows 10 IoT also includes turnkey support for both Azure IoT Device Management and Microsoft Intune to provide more scalable device management for enterprise IoT deployments.

Microsoft Azure enables a new wave of edge computing. Here’s how.


https://docs.microsoft.com/en-us/azure/iot-edge/about-iot-edge
https://www.zdnet.com/article/where-the-edge-is-in-edge-computing-why-it-matters-and-how-we-use-it/

The acatech Industrie 4.0 Maturity Index is a six-stage maturity model that analyses the capabilities in the areas of resources, information systems, culture and organisational structure that are required by companies operating in a digitalised industrial environment.

https://www.acatech.de/Publikation/industrie-4-0-maturity-index-managing-the-digital-transformation-of-companies/

Gitex 2018- See Filehold DMS with Synergy Software Systems

September 30th, 2018

Meet us with Globalis to see how advanced cheque scanners and a modern DMS solution work together.

Talk to us about how repetitive automation can help you match hundreds of thousands of invoices, or to reconcile claims, or to reconcile multiple bank accounts.

Let us show you how easy it is to drillback from any key field in any application, back to the source doument and all related documents in Filehold.

Security security security

September 26th, 2017

You never know when some item that queries or alters data in SQL Server will cause issues.

Bruce Schneier recently commented on FaceID and Bluetooth security, the latter of which has a vulnerability issue. I was amazed to see his piece on infrared camera hacking. A POC on using light to jump air gaps is truly frightening. It seems that truly anywhere that we are processing data, we need to be thinking (see https://arstechnica.com/information-technology/2017/09/attackers-can-use-surveillance-cameras-to-grab-data-from-air-gapped-networks/)

Airborne attacks, unfortunately, provide a number of opportunities for the attacker. First, spreading through the air renders the attack much more contagious, and allows it to spread with minimum effort. Second, it allows the attack to bypass current security measures and remain undetected, as traditional methods do not protect from airborne threats. Airborne attacks can also allow hackers to penetrate secure internal networks which are “air gapped,” meaning they are disconnected from any other network for protection. This can endanger industrial systems, government agencies, and critical infrastructure. With BlueBorne, attackers can gain full control right from the start. Moreover, Bluetooth offers a wider attacker surface than WiFi, almost entirely unexplored by the research community and hence contains far more vulnerabilities

Finally, unlike traditional malware or attacks, the user does not have to click on a link or download a questionable file. No action by the user is necessary to enable the attack.

Fully patched Windows and iOS systems are protected

– the Equifax breach for example must worry everyone who has ever had credit in the USA. (Hackers broke into Equifax’s computer systems in March, which is two months earlier than the company had previously disclosed, according to a Wall Street Journal report.)

The Securities and Exchange Commission said Wednesday that a cyber breach of a filing system it uses may have provided the basis for some illegal trading in 2016. In a statement posted on the SEC’s website, Chairman Jay Clayton said a review of the agency’s cybersecurity risk profile determined that the previously detected “incident” was caused by “a software vulnerability” in its EDGAR filing system (which processes over 1.7 million electronic filings in any given year.) The agency also discovered instances in which its personnel used private, unsecured email accounts to transmit confidential information.

So let me suggest take a good look at your systems and be honest – do you feel safe?

Microsoft has released Microsoft 365, a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely. Watch Satya introduce it.

What about your websites?
Although acts of vandalism such as defacing corporate websites are still commonplace, hackers prefer to gain access to the sensitive data residing on the database server and then to sell the data.

The costs of not giving due attention to your web security are extensive and apart form direct financial burden and inconvenience also risks:
• Loss of customer confidence, trust and reputation with the consequent harm to brand equity
• Negative impact on revenues and profits arising e.g. from falsified transactions, or from
employee downtime
• Website downtime – is in effect the closure of one of the most important sales and marketing channels
especially for an e-business
• Legal battles and related implications from Web application attacks and poor security
measures including fines and damages to be paid to victims.

Web Security Weaknesses
Hackers will attempt to gain access to your database server through any way they can e.g. out of date protocols on a router. Two main targets are :
• Web and database servers.
• Web applications.

Information about such exploits are readily available on the Internet, and many have been reported on this blog previously.

Web Security Scanning
So no surprise that Web security should contain two important components: web and database server security, and web application security.

Addressing web application security is as critical as addressing server security.

Firewalls and similar intrusion detection mechanisms provide little defense against full-scale web
attacks.
Since your website needs to be public, security mechanisms allow public web traffic to
communicate with your web and databases servers (i.e. over port 80).

It is of paramount importance to scan the security of these web assets on the network for possible vulnerabilities. For example, modern database systems (e.g. Microsoft SQL Server, Oracle and MySQL) may be
accessed through specific ports and so anyone can attempt direct connections to the databases to try and bypass the security mechanisms used by the operating system. These ports remain open to allow communication with legitimate traffic and therefore constitute a major vulnerability.

Other weaknesses relate to the database application itself and the use of weak or default passwords by
administrators. Vendors patch their products regularly, and equally regularly find new ways of
attack.

75% of cyber attacks target weaknesses within web applications rather than directly at the
servers. Hackers launch web application attacks on port 80 . Web applications are more open to uncovered vulnerabilities since these are generally custom-built and therefore pass through a lesser degree of
testing than off-the-shelf software.

Some hackers, for example, maliciously inject code within vulnerable web applications to trick users
and redirect them towards phishing sites. This technique is called Cross-Site Scripting (XSS) and may
be used even though the web and database servers contain no vulnerability themselves.

Hence, any web security audit must answer the questions “which elements of our network
infrastructure are open to hack attacks?”,
“which parts of a website are open to hack attacks?”, and “what data can we throw at an application to cause it to perform something it shouldn’t do?”

Ask us about Acunetix and Web Security
Acunetix ensures web site security by automatically checking for SQL Injection, Cross Site Scripting,
and other vulnerabilities. It checks password strength on authentication pages and automatically
audits shopping carts, forms, dynamic content and other web applications. As the scan is being
completed, the software produces detailed reports that pinpoint where vulnerabilities exist

3 new Microsoft tools to help you to move to the cloud.

April 18th, 2017

Here’s a breakdown of the three new Microsoft tools to help you move to the cloud faster and what they can offer businesses.

1. Free cloud migration assessment

This assessment will help customers to more easily find and to better understand their current server setups, to help them to determine the cost and the value of moving to the cloud. Once the servers are discovered, the tool can analyze their configurations, and give the user a report of the potential cost drop of moving to Azure.

Data center administrators can export the results of the assessment into a customized report. The report could provide some valuable data and statistics for a CIO conversation with the CFO.

2. Azure Hybrid Use Benefit

This tool should save users money on their cloud deployments. Customers can activate the Azure Hybrid Use Benefit in the Azure Management Portal,It is available on Windows Server virtual machines in Azure, to all customers. “Use your on-premises Windows Server licenses that include Software Assurance to save big on Windows Server VMs in Azure. By using your existing licenses, you pay the base compute rate and save up to 40 percent.” the tool’s web page said,

3. Azure Site Recovery

Azure Site Recovery is meant to ease the process of migrating virtual machines to Azure. Applications running on AWS, VMware, Hyper-V, or physical servers can be moved. Additionally, a new feature in Azure Site Recovery will “allow you to tag virtual machines within the Azure portal itself, This capability will make it easier than ever to migrate your Windows Server virtual machines.”

Other features include automated protection and replication of virtual machines, remote monitoring, custom recovery plans, recovery plan testing, and more

Dubai-cross safely campaign

June 19th, 2016

Dubai Police are launching a new campaign – Cross Safely – which will run for three months to educate pedestrians, particularly labourers.

In case you are wondering, the fine for unlawfully crossing a road is Dhs200 and 65000 people were fined last year and more sobering 46 were killed by crossing at non designated spots. That’s almost one a week.

To help remember the rules on how to cross the road safely, check out this old video played at schools: