Thứ Ba, 2 tháng 1, 2018

Auto news on Youtube Jan 3 2018

[Background music from Soundstripe.com]

Hey what's up video editors?! It's Premiere Gal here and in this video I'm going to

teach you how to use the Beauty Studio plugin in Adobe Premiere Pro to add

natural touch-ups to faces or as I like to call it digital makeup the Beauty

Studio plugin is part of Continuum by BorisFX in fact it's only one part

of Continuum's image restoration suite there are tons of other effects from 3d

titles, green-screen keying, film looks and more. now I've already done a couple

tutorials on BorisFX plugins and I've included a link to the playlist in

my description box below. So you should definitely check it out if you want to

learn more about the power of these plugins so anyway back to beauty studio

it is used by tons of professional and commercial video editors to touch up the

skin of actors and actresses in moving images so if you're ever watching a film

or commercial and you're like how is this person so flawless well it's most

likely that they are not and a lot of video retouching can be done through

Continuum's beauty studio in this tutorial I'll be using a video of myself

for demo purposes now the goal here for me is just to teach you how to add some

natural smoothing to your subjects not to make it look too fake just enough to

enhance the subjects natural beauty so I'll be covering two steps in this

tutorial first I'll show you how to rebuild your digital makeup mask and

track it so it stays on the face if your subject is moving and then secondly I'll

show you how to adjust the mask smoothing sharpening and color

correction as well as the glow. And to make it easy for you to follow along in

my description box below you can find a time coded breakdown of everything I

cover in this tutorial and you can also download my sample demo clip to follow

along as well as download the trial version of continuum so here in Premiere

Pro go to effects and search for BCC Beauty Studio and drag and drop it onto

the clip in the timeline you can already see that it applied way too much

smoothing to my face let me zoom in on my face a bit from the program panel and

now I'll turn the effect off and on from the effects controls and you can see the

difference already you can also change the view mode

so you can see a side-by-side difference or a compare mode where it draws a line

down the middle and you can use the wipe effect to move the line to see the

before on the left and after on the right so the problem here you can see on

the right side is that it's also smoothing my hair my eyes my lips and

the background we want it to only smooth my skin so to update this we need to

manually change the mat parameters starting with selecting my natural skin

tone colors first let's just turn off compare and also disable this beauty

studio effect temporarily because we want to be able to select the original

skin tones without the smoothing effect on next turn on pixel chooser then

underneath mocha matte we are going to use the eyedropper tool for color a to

pick a darker area of my skin and then choose color be the lightest area of my

skin this will be my skin tone range now let's turn the effect back on and then

select view mask and boom it looks a little scary at first but basically the

white area here is the area that Beauty studio is affecting and the black area

is protected and it will not affect that area so we want to try and make all the

skin to be all white in the rest black this includes making the eyes more black

and the lips more black because we want those to be in focus not softened so to

do this I need to adjust the hue softness saturation softness luma

softness and the clip white parameters the parameters here will be different

for every face that you're working with because the lighting is different the

person looks different so I played around with these parameters for about

15 minutes or so until I got it to be correct so what I did was reduce the

softness to around 12 I reduced the saturation softness to 6 I reduced the

luma softness to around 18 and this added in some more black to my face so I

had to go into the clip white and clip that more so I can get rid of some of

the black that came in when I reduce the saturation and softness

now don't worry too much about the shirt and the hat getting completely black as

we will mask that with mocha Pro now you can see that my

eyebrow on the left and on the right are completely gone I can bring the one back

in on the left using a mocha Pro mask the other eyebrow is pretty much covered

by the shade of my hat so that's okay so to create a mocha mask around my face to

mask out the rest of the image from being affected click on the mocha logo

then I'm going to use the x-plane tool to draw a mask around my entire face and

my upper chest where my skin is exposed then I'm going to track forwards and

back and once it's done tracking you'll see that the mask moves with the

movement of my chest and face I'm going to draw a mask on the right side of my

braid as well because there's some skin exposed there then rather than having to

retrack this mask I'm just going to link this new mask to the tracking layer from

the first layer next I'm just going to zoom in on my eyebrow and draw a mask

with the x-plane tool around that and now under blend mode I'm going to select

subtract and this will subtract it and make that portion black not affected by

the mask and I'm also going to link it to the first track layer so that way the

tracking is applied to it as well and now we're just going to hit file save

and close out of mocha Pro then the next step is to adjust the smoothing detail

to make it look more natural up at the top I'm going to reduce the master

amount to around 65 to make it more natural and you'll see there are also

detail levels all this is doing is letting you control the size of the

details you want to smooth so for example the smooth smallest details

controls the small pores and the large details would be larger freckles so 4 is

the default and it works well so to move on I'm going to reduce the smallest to

around 70 the small details to 60 and then medium to 60 and the large to 60

this is all to make it a little bit more natural next we're going to sharpen it

to bring in some more natural sharpening that we lost so we can turn that on and

also turn on use masks because we want to sharpen the mask area this lets us

bring in some detail we lost while also maintaining our digital makeup mask so

I'll sharpen it at fifteen you can also play around with it

until it looks okay for the image you're working with next is color correction

and just like sharpen also turn on use mask in here I'll increase the

saturation to about five just to bring in some more color if you increase it

too much let's say to 20 you will see that it looks like I had a bad tanning

accident and we don't want that so let's bring it back down to five we can also

add in some brightness again we want to be subtle not too much because then it

will look fake and bad then glow adds in a natural glow also turn on the mask and

I'm going to set the glow intensity to about ten and you can also change the

color of the glow if you want to give more of a plushy glow you can change it

to like a light rose color now let's go back up and change the compare mode to

side by side and you can see the difference between before and after you

can see how it just very naturally enhanced my skin tone and overall just

making me look like I caught some more sleep but use this retouch tool to

carefully and make sure you're not overdoing it so that's all I have today

if you want more video tutorials that explore Continuum's capabilities such as

how to make teeth brighter or wider using continuum or any other tools

offered in borås effects give this video a thumbs up and leave a comment

below also be sure to click on my profile photo on the left to subscribe

to my channel so you're notified when I make new videos and below that you can

click on the contact' button if you want any custom video work or personal

one-to-one trainings and then on the right you can click on another video to

learn something new thanks again for watching stay creative everyone and I'll

see you all very soon

For more infomation >> Digital Makeup & Retouching Faces | Adobe Premiere Pro CC Tutorial - Duration: 8:34.

-------------------------------------------

Bank of England Could Issue "Bitcoin style Digital Currency" in 2018 | btc | Ethereum | crypto - Duration: 3:42.

Bank of England Could Issue "Bitcoin-style Digital Currency" in 2018

The Bank of England might have "its own Bitcoin-style digital currency" this year already, according to the country's legacy media. The more than three hundred year old bank set up a

research unit back in 2015 to investigate linking a state-backed crypto to sterling, and there appears to be a breakthrough. Bank of England Might Go Crypto in 2018

Venezuela has its Petro. Russia is looking at a Cryptoruble. Could there be a Britcoin? A Ukoin? The Telegraph would have

readers believe, yes, writes its Chief Reporter Robert Mendick. Bank of England Governor, Mark Carney, reportedly "told a Treasury Select Committee before

Christmas that he had held talks with other central banks about launching digital currency," according to Mr. Mendick. Governor Carney, 52, is the first

non-Briton to hold that position at the Bank of England. Former Governor of the Bank of Canada, he also spent over a decade at Goldman Sachs. Just days ago,

Mr. Carney confirmed bitcoin is an "active area of interest" and seemed most interested in its underlying mechanism for delivery, the decentralized

distributed ledger. Unconcerned about its retail potential, he told British lawmakers, "You don't end up with those financial stability risks,

you get financial stability benefits. And you save huge amounts of computational energy intensity." He went on to describe the Bank of England's study of bitcoin as

"pretty active in it but we're also disciplined. If we're going to apply something to the core of the system, it's going to need to meet five sigma quality rating."

Working with It Perhaps foreshadowing The Telegraph scoop, he ended his remarks, "What I say on this topic today will be outdated six months

from now because things are moving so rapidly." Indeed, the English paper began its coverage of the topic with the opening,

"The Bank of England could green light its own Bitcoin-style digital currency as early as 2018, The Telegraph can disclose." With meetings

continuing at the beginning of the next year, he confirmed "I have participated in discussions with the major central banks

on this issue" of a central bank-backed digital currency. And over the summer the Bank of England used blockchain technology as a test to see if it could

be used as settlements between central banks. It was successful. "The underlying technology is actually of a fair bit of interest. We are working with it at the

Bank of England," he reportedly explained to the Treasury Select Committee. In the Spring of last year, the Bank of England commissioned Dr. George Danezis of

the University College London to devise a cryptocurrency with state-assumed backing. RS Coin was born, and it did seem to add efficiencies associated with

automation as it relates to banking purposes: central banks could easily control the money supply at any given time, and could obviously determine the

amount of money in circulation. Though Mr. Carney probably believes the potential Bank of England digital token would be used only between central banks,

The Telegraph reports a "research unit set up by the Bank is investigating the possible introduction of a cryptocurrency linked to sterling." It's hard to

imagine traditional retail banks allowing this to happen, as it would surely be their death. A world of frictionless, snap-of-the-fingers

transacting for houses, cars, etc. is not something legacy banking could survive.

For more infomation >> Bank of England Could Issue "Bitcoin style Digital Currency" in 2018 | btc | Ethereum | crypto - Duration: 3:42.

-------------------------------------------

Котелок. Обзор Лота (Digital Max Cinema) - Duration: 3:28.

For more infomation >> Котелок. Обзор Лота (Digital Max Cinema) - Duration: 3:28.

-------------------------------------------

Schema Markup-SEO Complete Tutorials guide in Hindi--Digital Learning44 - Duration: 30:34.

types of schema markup

how to add schema mark up in blog

how to add schema markup by using plugin

add schema markup manually

what is microdata

what is itemscope and itemprop

For more infomation >> Schema Markup-SEO Complete Tutorials guide in Hindi--Digital Learning44 - Duration: 30:34.

-------------------------------------------

Find Digital Psychology Books in Ebook Central: Academic Complete - Duration: 4:22.

In this video, we'll look at Ebook Central: Academic Complete.

It has thousands of in-depth digital books covering multiple subject areas

including psychology.

Login according to your school's method of accessing online library resources.

You may login to your school's online portal and follow a link to LIRN or the database.

Or you may go to this URL

and login with your school's LIRN credentials.

Once you're logged in to the LIRN portal, you'll see the Subject View

which allows you to click on a subject category and see the relevant databases.

You can also click on the Vendor View tab

to see databases listed alphabetically beneath the name of the vendor.

Let's click on the subject heading Psychology.

Then select Ebook Central.

The database will open in a new tab.

You can search for and access books without signing in to the bookshelf, but there are many benefits to to doing so.

Click on Sign-In at the upper right.

If you have an Ebook Central account,

you can sign-in with the login information you already set up.

If you do not have an account, click Join Ebook Central.

Fill in the information required and click "Join Ebook Central."

Once you are logged in to Ebook Central,

you'll be able to save ebooks and annotations you make to your Bookshelf.

Now let's search for a book. I'm going to search for books on forensic psychology.

I get over 10,000 results.

On the left are options to refine my search.

I'm going to check 2015 through 2017

to narrow my results to books published during those years.

This reduces my results quite a bit.

I'm going to select the first result titled "Forensic Psychology."

Since I'm signed in to my Bookshelf, I can click on Add to Bookshelf.

You may need to choose a folder to add the book to.

You have the option to use an existing folder or make a new one.

I'll add this to my folder called Research.

To access the book once it's on your bookshelf,

click the Bookshelf link in the top right, then select the folder, then select the ebook.

When you're in the book, you can make annotations.

I can arrow through the pages

or select a chapter from the table of contents on the left.

First, let's look at the highlight tool.

Highlight the text of interest.

The highlight tool will appear and you can choose a color.

To create a note, click on the note icon.

Once you make a note, it appears at the top left corner of the page.

To open the note, double-click on it.

To access all of your highlights and notes for a particular book on your Bookshelf,

click on the star icon in the left navigation panel.

You'll see the chapters you annotated.

Click on the chapter to the list of annotations.

Click each annotation to see it in the reader panel.

What's great about doing this is that the book and any annotations I make will remain there

as long as the book is part of your school's Ebook Central collection.

You can download a book to your computer or device,

but you should remember that the book and any annotations will vanish

once your check-out period ends.

Because of that, many of our schools prefer to add books to their Bookshelf

to maintain access and annotations for longer.

To download a book from Ebook Central, click on the Full Download icon.

You will need a Bookshelf account.

You will also need an Adobe ID.

On your computer, you'll need a copy of Adobe Digital Editions.

On your device, you'll need a copy of Bluefire Reader.

These do not download to Kindles.

If you would like to learn more about how to use other databases

available from LIRN, take a look at the other videos

and playlists on our YouTube channel.

For more infomation >> Find Digital Psychology Books in Ebook Central: Academic Complete - Duration: 4:22.

-------------------------------------------

Find Digital Business Books in Ebook Central: Academic Complete - Duration: 4:18.

In this video, we'll look at Ebook Central: Academic Complete.

It has thousands of in-depth digital books

covering multiple subject areas including business.

Login according to your school's method of accessing online library resources.

You may login to your school's online portal and follow a link to LIRN or the database.

Or you may go to this URL

and login with your school's LIRN credentials.

Once you're logged in to the LIRN portal, you'll see the Subject View

which allows you to click on a subject category and see the relevant databases.

You can also click on the Vendor View tab

to see databases listed alphabetically beneath the name of the vendor.

Let's click on the subject heading Business.

Then select Ebook Central.

The database will open in a new tab.

You can search for and access books without signing in to the bookshelf, but there are many benefits to to doing so.

Click on Sign-In at the upper right.

If you have an Ebook Central account,

you can sign-in with the login information you already set up.

If you do not have an account, click Join Ebook Central.

Fill in the information required and click "Join Ebook Central."

Once you are logged in to Ebook Central,

you'll be able to save ebooks and annotations you make to your Bookshelf.

Now let's search for a book. I'm going to search for books on social media marketing.

I get over 48,000 results.

On the left are options to refine my search.

I'm going to check 2015 through 2017

to narrow my results to books published during those years.

This reduces my results quite a bit.

I'm going to select the second result titled "The New Rules of Marketing and PR."

Since I'm signed in to my Bookshelf,

I can click on Add to Bookshelf.

You may need to choose a folder to add the book to.

You have the option to use an existing folder or make a new one.

I'll add this to my folder called Research.

To access the book once it's on your bookshelf,

click the Bookshelf link in the top right, then select the folder, then select the ebook.

When you're in the book, you can make annotations.

I can arrow through the pages

or select a chapter from the table of contents on the left.

First, let's look at the highlight tool.

Highlight the text of interest.

The highlight tool will appear and you can choose a color.

To create a note, click on the note icon.

Once you make a note, it appears at the top left corner of the page.

To open the note, double-click on it.

To access all of your highlights and notes for a particular book on your Bookshelf,

click on the star icon in the left navigation panel.

You'll see the chapters you annotated.

Click on the chapter to the list of annotations.

Click each annotation to see it in the reader panel.

What's great about doing this is that the book and any annotations I make will remain there

as long as the book is part of your school's Ebook Central collection.

You can download a book to your computer or device,

but you should remember that the book and any annotations will vanish

once your check-out period ends.

Because of that, many of our schools prefer to add books to their Bookshelf

to maintain access and annotations for longer.

To download a book from Ebook Central, click on the Full Download icon.

You will need a Bookshelf account.

You will also need an Adobe ID.

On your computer, you'll need a copy of Adobe Digital Editions.

On your device, you'll need a copy of Bluefire Reader.

These do not download to Kindles.

If you would like to learn more about how to use other databases

available from LIRN, take a look at the other videos

and playlists on our YouTube channel.

For more infomation >> Find Digital Business Books in Ebook Central: Academic Complete - Duration: 4:18.

-------------------------------------------

What cultural and digital transformation means to enterprise information security - Duration: 8:13.

Hi, I'm Robert Ford, Senior Director of IT Showcase. We've come to the end of our series on

securing the enterprise. Now I've really enjoyed sharing with you what I've learned from my talk with

Bret Arsenault, Microsoft's Chief Information Security Officer. I've

learned a lot and I hope you have to.

In this last episode, we will hear some final words from

Bret on Microsoft's journey towards cultural and digital transformation. He'll talk about

what this transformation means in relation to information security, and

his hopes for the future of information security. Now let's have a look.

Moving to digital transformation,

it's something every customer, company, person is experiencing.

So how does digital transformation manifest itself

into security and what approach are we taking at Microsoft? Yeah,

I think it's interesting, since I'm in the digital transformation org. You know,

we've identified basically sixteen fundamental processes we used to have to use

around the company. Security is one of the sixteen. And

if security is done right it can be enabler for all the other pieces that we want to go do. I think it's one of the big key

differentiators. I will say,

it's a lot of change in digital transformation, even for us. You think about

going from delivering software on premise to delivering service through the cloud. You think of,

you know, we used to be a perpetual license. You

buy, you can use it forever; to a subscription based license. All of those things and,

when I was in the engineering team, just understanding whose deploying and using what software in the on-

premise world is really hard. Now, we know right away who's using what, how they're using

it, how do I turn that into a customer three sixty(360) view to give the best experience. And

I also know what prioritizations I should put on things. What things we should establish and enhance versus things that

people aren't using. As I think that, even for us as a fairly digital company,

we're in huge transformation; contractual and everything- how we do contracts and

everything else. I would say the learning from us has been though, is when there's resistance; how do you get past it. It's

usually cultural, the bigger issue tends to be cultural. Technically you can do it

it's just culturally, how to do that? And I would say the learning I have there - there's this

gentleman in San Francisco, he has this term called FFUUEE. And I know you think of FFUUEE,

what does that mean? But, I love his

FFUUEE concept because it's the six reasons why anybody doesn't do something. And they tend to be kind of

true whether they're at home, whether they're at work, they tend to be pretty good which is: they either Fear

it or they don't think it's Fair. Ever had that happen at home?

Exactly! No comment.

Come on, that's kind of fun. They don't Understand it or there's

no sense of Urgency. Those are the two U's. And then the Exhausted

or Entitled. And when we were doing our own internal cloud transformation of the

full digital transformation, we kept thinking people didn't understand that so we kept creating material to

explain what we're doing and everything else. That turned out, there wasn't really a sense of urgency and people

were exhausted. There were some understanding but a lot of people, just for a job perspective, you know,

had feared, they didn't think it was fair, about the jobs they were doing in the past. So we step back and,

you know, you're shutting down three data centers, there's a sense of urgency. You need to get

your stuff going. So I think that understanding how people may resist change

and which levers you want to go pull, turned out to be super helpful

for us. I think FFUUEE is the customer take-away there so I don't need to ask that question.

It's a great one; I've never heard it but it's going to stick with us.

FFUUEE: now that's an acronym to remember. It actually stands for

Fear, Fair, Understanding, Urgency, Exhausted,

Entitled. These are such big factors that inhibit change so it's

important to educate and integrate our teams through the process to

ensure successful transformation. Continual

cultural and digital transformation means an ever-changing environment. Bret and his team

are doing a terrific job here, protecting our enterprise and he's been really generous to sharing key pieces in his

team's approach, which he symbolizes again as this three-legged stool.

The stool symbolizes the importance of balancing information protection,

device health, identity management, data telemetry,

and risk management all in the midst of an unprecedented digital transformation

at Microsoft. Every piece

plays an integral role in securing our enterprise. If any leg is compromised the

stool could topple over. As I wrapped up my conversation with Bret, I couldn't help but ask one

final question around the future: How do we stay ahead of the bad guys in the midst of all this

transformation? Have a look at what he had to say. So the last question,

it's really about the future. So we've covered an awful lot here, thank you, but one

final question: What are your security aspirations for the future, Bret?

I have a lot of them. You know, I think,

from my perspective, there's a few of them. It's somewhat based on the stool slide we talked

about at the beginning. But you really, to have a secure enterprise the first thing you have to be

able to do is, you have to be able to anticipate and respond to risk. Most companies are good at responding but,

as I said, how do you anticipate? Because there's so much, like just look at the regulatory

environment. So one(1), is a secure enterprise that anticipates and response to risk.

That's super important to me. Two(2), my aspirations are that we really get to

were all data protection travels with the data so that we don't do all

these layers and layers and layers to make that work, which creates a lot of entropy. Three,

I would love to see a model where employees have

this seamless experience with security. And we used to talk about this is

"click fearlessly". I don't want to do that because some people "click fearlessly" anyway, which does not help my life. But where

when you click on something, you know, regardless if you're on a mobile device, you're at home,

your'e on some interactive device or a virtual reality(VR) system,

you know, that what you're doing is safe and that you don't have to worry about it. You shouldn't have to worry about that,

and that's really the number three- the employee experience. And then

number four(4) for me is this thing about the intelligence in data telemetry. We

have to get to where we have visibility into the threats

and risks that work at cloud scale. So I have a lot of

hope that we can use AI and machine learning and bots

to cull through these massive sets of data but

take action against it. That would really be the closing statement, which is: if I have all that visibility how do I

self diagnose and

auto remediate? So that would be the fifth element to the whole plan from how you

identify the risk, put the user experiences, all the way to auto remediation. Those

would be my five aspirations. We'll see if we get there! Let's hope they come true. That's what I'm hoping for. So in closing then,

you know,

hard to do it, but is there a key take-away you'd like to just leave the audience with that covers this topic today?

Yeah, I would, you know, it's...yes.

People always say "What's the ONE thing I should do?" I'm not saying there's one thing but I also don't want to

explain the hundred things we are doing. I think that there isn't a silver bullet and that's for

sure. There's no one thing that's going to solve these problems. I do think that simple

stool model of, you know, the idea that you have a process

and risk management platform that you then use to prioritize the three areas around device

health, identity management, telemetry and then that will then provide the data protection,

the information protection. That's a simple enough view, like that

would be my one take away. Don't make everybody a security expert but don't believe

that only one thing will solve it. And I think that's a good blend of where we are today.

Perfect! As Bret says, there is no silver bullet.

Defense is the name of the game. I hope you've enjoyed our series on Microsoft's approach to securing

enterprise and learned a few things you can use in your own organization.

Be sure to visit IT Showcase for more news and information on how Microsoft uses

its own technologies to stay secure and digitally transform. Thanks so much for watching.

For more infomation >> What cultural and digital transformation means to enterprise information security - Duration: 8:13.

-------------------------------------------

Balancing security in the midst of a digital transformation - Duration: 3:43.

Hello, I'm Robert Ford, a senior director in IT Showcase, a team in Core

Services Engineering, dedicated to giving you the inside view of how Microsoft does

IT. So I recently had a chance to sit down with our Chief Information Security Officer

Bret Arsenault, for very informative and insightful discussion on how we

secure the Microsoft enterprise. Now Bret shared a simple but effective

visualization for his teams approach to enterprise security and that's a three-legged stool. The

stool symbolizes the importance of balancing Information Protection, Device

Health, Identity Management,

Data Telemetry, and Risk Management all in the midst of an unprecedented Digital

Transformation at Microsoft. If any leg is compromised the stool could topple over.

So, let's dive right in beginning with the Information Protection component. How do

Bret and his team help keep both customer data and Microsoft data protected?

So Information Protection, both customer data and Microsoft data is of the

utmost importance to Microsoft. So that seems to be a big challenge since we

can't always control where the data goes. So how do we keep it protected? Well

there's a couple things that are super important. First you have to know what data

you're trying to protect. I mean all data is not equal. There's data that's public and is meant for everyone to view and

then there's data that's very private: your personal information,

our financial reporting, our intellectual property. So really about how do you classify

and label data so that you can put the right protections around it is the first and probablt most important thing you have

to do. Then, of course you secure the applications that are the ones that give you access the data and that's

your classic line-of-business applications, security procedures, on top

of, of course, secure infrastructure. But really the thing for us is really

trying to automate the ability to do the classification

because that's the hardest part and then automate the actions you take against those classifications. So this

idea that's really for us is super important is Classify, Automate, and then

Remediate against. The last thing I'd say on that is, historically we put all these

protections around data and so when the data moves it's very hard. You really get to a point where the

actual protection of the data travels with it. So whether it moves from my on

premise into a cloud system to a third-party system: if it travels with the

data, you just have much less, your much less prone

to any errors happening in that transition. So there's a lot in there Bret, so for our customers if

there's one key take away for the audience to remember about data protection, what would that

be? Certainly you gotta get the classification labeling right. Just so

you know which assets to put more resources on prioritization and, then second

you've got to really aspire to a model where the protection does travel with the data. In a client

to cloud world, could be on a mobile device, it could be, like I said, in your cloud

service, on your premise, or in a third-party cloud service, the only way to really make the

scale is to get you protection to travel with yout data. So

there you have it! One of the most important things I took from this topic is that information protection

means Classifying, Labeling, and Protecting corporate date while embedding security

in modern engineering practices. We can't always control where the data goes

so protection must travel with the data. We'll continue our discussion with Bret in the next episode

and learn how he and his team secure the multitude of devices Microsoft employees

use to access corporate resources. Thank you for watching and see you next time!

Không có nhận xét nào:

Đăng nhận xét