SLAYER - South Of Heaven, MOON, 4 стр.буклет
-------------------------------------------
Digital Makeup & Retouching Faces | Adobe Premiere Pro CC Tutorial - Duration: 8:34.
[Background music from Soundstripe.com]
Hey what's up video editors?! It's Premiere Gal here and in this video I'm going to
teach you how to use the Beauty Studio plugin in Adobe Premiere Pro to add
natural touch-ups to faces or as I like to call it digital makeup the Beauty
Studio plugin is part of Continuum by BorisFX in fact it's only one part
of Continuum's image restoration suite there are tons of other effects from 3d
titles, green-screen keying, film looks and more. now I've already done a couple
tutorials on BorisFX plugins and I've included a link to the playlist in
my description box below. So you should definitely check it out if you want to
learn more about the power of these plugins so anyway back to beauty studio
it is used by tons of professional and commercial video editors to touch up the
skin of actors and actresses in moving images so if you're ever watching a film
or commercial and you're like how is this person so flawless well it's most
likely that they are not and a lot of video retouching can be done through
Continuum's beauty studio in this tutorial I'll be using a video of myself
for demo purposes now the goal here for me is just to teach you how to add some
natural smoothing to your subjects not to make it look too fake just enough to
enhance the subjects natural beauty so I'll be covering two steps in this
tutorial first I'll show you how to rebuild your digital makeup mask and
track it so it stays on the face if your subject is moving and then secondly I'll
show you how to adjust the mask smoothing sharpening and color
correction as well as the glow. And to make it easy for you to follow along in
my description box below you can find a time coded breakdown of everything I
cover in this tutorial and you can also download my sample demo clip to follow
along as well as download the trial version of continuum so here in Premiere
Pro go to effects and search for BCC Beauty Studio and drag and drop it onto
the clip in the timeline you can already see that it applied way too much
smoothing to my face let me zoom in on my face a bit from the program panel and
now I'll turn the effect off and on from the effects controls and you can see the
difference already you can also change the view mode
so you can see a side-by-side difference or a compare mode where it draws a line
down the middle and you can use the wipe effect to move the line to see the
before on the left and after on the right so the problem here you can see on
the right side is that it's also smoothing my hair my eyes my lips and
the background we want it to only smooth my skin so to update this we need to
manually change the mat parameters starting with selecting my natural skin
tone colors first let's just turn off compare and also disable this beauty
studio effect temporarily because we want to be able to select the original
skin tones without the smoothing effect on next turn on pixel chooser then
underneath mocha matte we are going to use the eyedropper tool for color a to
pick a darker area of my skin and then choose color be the lightest area of my
skin this will be my skin tone range now let's turn the effect back on and then
select view mask and boom it looks a little scary at first but basically the
white area here is the area that Beauty studio is affecting and the black area
is protected and it will not affect that area so we want to try and make all the
skin to be all white in the rest black this includes making the eyes more black
and the lips more black because we want those to be in focus not softened so to
do this I need to adjust the hue softness saturation softness luma
softness and the clip white parameters the parameters here will be different
for every face that you're working with because the lighting is different the
person looks different so I played around with these parameters for about
15 minutes or so until I got it to be correct so what I did was reduce the
softness to around 12 I reduced the saturation softness to 6 I reduced the
luma softness to around 18 and this added in some more black to my face so I
had to go into the clip white and clip that more so I can get rid of some of
the black that came in when I reduce the saturation and softness
now don't worry too much about the shirt and the hat getting completely black as
we will mask that with mocha Pro now you can see that my
eyebrow on the left and on the right are completely gone I can bring the one back
in on the left using a mocha Pro mask the other eyebrow is pretty much covered
by the shade of my hat so that's okay so to create a mocha mask around my face to
mask out the rest of the image from being affected click on the mocha logo
then I'm going to use the x-plane tool to draw a mask around my entire face and
my upper chest where my skin is exposed then I'm going to track forwards and
back and once it's done tracking you'll see that the mask moves with the
movement of my chest and face I'm going to draw a mask on the right side of my
braid as well because there's some skin exposed there then rather than having to
retrack this mask I'm just going to link this new mask to the tracking layer from
the first layer next I'm just going to zoom in on my eyebrow and draw a mask
with the x-plane tool around that and now under blend mode I'm going to select
subtract and this will subtract it and make that portion black not affected by
the mask and I'm also going to link it to the first track layer so that way the
tracking is applied to it as well and now we're just going to hit file save
and close out of mocha Pro then the next step is to adjust the smoothing detail
to make it look more natural up at the top I'm going to reduce the master
amount to around 65 to make it more natural and you'll see there are also
detail levels all this is doing is letting you control the size of the
details you want to smooth so for example the smooth smallest details
controls the small pores and the large details would be larger freckles so 4 is
the default and it works well so to move on I'm going to reduce the smallest to
around 70 the small details to 60 and then medium to 60 and the large to 60
this is all to make it a little bit more natural next we're going to sharpen it
to bring in some more natural sharpening that we lost so we can turn that on and
also turn on use masks because we want to sharpen the mask area this lets us
bring in some detail we lost while also maintaining our digital makeup mask so
I'll sharpen it at fifteen you can also play around with it
until it looks okay for the image you're working with next is color correction
and just like sharpen also turn on use mask in here I'll increase the
saturation to about five just to bring in some more color if you increase it
too much let's say to 20 you will see that it looks like I had a bad tanning
accident and we don't want that so let's bring it back down to five we can also
add in some brightness again we want to be subtle not too much because then it
will look fake and bad then glow adds in a natural glow also turn on the mask and
I'm going to set the glow intensity to about ten and you can also change the
color of the glow if you want to give more of a plushy glow you can change it
to like a light rose color now let's go back up and change the compare mode to
side by side and you can see the difference between before and after you
can see how it just very naturally enhanced my skin tone and overall just
making me look like I caught some more sleep but use this retouch tool to
carefully and make sure you're not overdoing it so that's all I have today
if you want more video tutorials that explore Continuum's capabilities such as
how to make teeth brighter or wider using continuum or any other tools
offered in borås effects give this video a thumbs up and leave a comment
below also be sure to click on my profile photo on the left to subscribe
to my channel so you're notified when I make new videos and below that you can
click on the contact' button if you want any custom video work or personal
one-to-one trainings and then on the right you can click on another video to
learn something new thanks again for watching stay creative everyone and I'll
see you all very soon
-------------------------------------------
Котелок. Обзор Лота (Digital Max Cinema) - Duration: 3:28.
For more infomation >> Котелок. Обзор Лота (Digital Max Cinema) - Duration: 3:28. -------------------------------------------
Find Digital Psychology Books in Ebook Central: Academic Complete - Duration: 4:22.
In this video, we'll look at Ebook Central: Academic Complete.
It has thousands of in-depth digital books covering multiple subject areas
including psychology.
Login according to your school's method of accessing online library resources.
You may login to your school's online portal and follow a link to LIRN or the database.
Or you may go to this URL
and login with your school's LIRN credentials.
Once you're logged in to the LIRN portal, you'll see the Subject View
which allows you to click on a subject category and see the relevant databases.
You can also click on the Vendor View tab
to see databases listed alphabetically beneath the name of the vendor.
Let's click on the subject heading Psychology.
Then select Ebook Central.
The database will open in a new tab.
You can search for and access books without signing in to the bookshelf, but there are many benefits to to doing so.
Click on Sign-In at the upper right.
If you have an Ebook Central account,
you can sign-in with the login information you already set up.
If you do not have an account, click Join Ebook Central.
Fill in the information required and click "Join Ebook Central."
Once you are logged in to Ebook Central,
you'll be able to save ebooks and annotations you make to your Bookshelf.
Now let's search for a book. I'm going to search for books on forensic psychology.
I get over 10,000 results.
On the left are options to refine my search.
I'm going to check 2015 through 2017
to narrow my results to books published during those years.
This reduces my results quite a bit.
I'm going to select the first result titled "Forensic Psychology."
Since I'm signed in to my Bookshelf, I can click on Add to Bookshelf.
You may need to choose a folder to add the book to.
You have the option to use an existing folder or make a new one.
I'll add this to my folder called Research.
To access the book once it's on your bookshelf,
click the Bookshelf link in the top right, then select the folder, then select the ebook.
When you're in the book, you can make annotations.
I can arrow through the pages
or select a chapter from the table of contents on the left.
First, let's look at the highlight tool.
Highlight the text of interest.
The highlight tool will appear and you can choose a color.
To create a note, click on the note icon.
Once you make a note, it appears at the top left corner of the page.
To open the note, double-click on it.
To access all of your highlights and notes for a particular book on your Bookshelf,
click on the star icon in the left navigation panel.
You'll see the chapters you annotated.
Click on the chapter to the list of annotations.
Click each annotation to see it in the reader panel.
What's great about doing this is that the book and any annotations I make will remain there
as long as the book is part of your school's Ebook Central collection.
You can download a book to your computer or device,
but you should remember that the book and any annotations will vanish
once your check-out period ends.
Because of that, many of our schools prefer to add books to their Bookshelf
to maintain access and annotations for longer.
To download a book from Ebook Central, click on the Full Download icon.
You will need a Bookshelf account.
You will also need an Adobe ID.
On your computer, you'll need a copy of Adobe Digital Editions.
On your device, you'll need a copy of Bluefire Reader.
These do not download to Kindles.
If you would like to learn more about how to use other databases
available from LIRN, take a look at the other videos
and playlists on our YouTube channel.
-------------------------------------------
Find Digital Business Books in Ebook Central: Academic Complete - Duration: 4:18.
In this video, we'll look at Ebook Central: Academic Complete.
It has thousands of in-depth digital books
covering multiple subject areas including business.
Login according to your school's method of accessing online library resources.
You may login to your school's online portal and follow a link to LIRN or the database.
Or you may go to this URL
and login with your school's LIRN credentials.
Once you're logged in to the LIRN portal, you'll see the Subject View
which allows you to click on a subject category and see the relevant databases.
You can also click on the Vendor View tab
to see databases listed alphabetically beneath the name of the vendor.
Let's click on the subject heading Business.
Then select Ebook Central.
The database will open in a new tab.
You can search for and access books without signing in to the bookshelf, but there are many benefits to to doing so.
Click on Sign-In at the upper right.
If you have an Ebook Central account,
you can sign-in with the login information you already set up.
If you do not have an account, click Join Ebook Central.
Fill in the information required and click "Join Ebook Central."
Once you are logged in to Ebook Central,
you'll be able to save ebooks and annotations you make to your Bookshelf.
Now let's search for a book. I'm going to search for books on social media marketing.
I get over 48,000 results.
On the left are options to refine my search.
I'm going to check 2015 through 2017
to narrow my results to books published during those years.
This reduces my results quite a bit.
I'm going to select the second result titled "The New Rules of Marketing and PR."
Since I'm signed in to my Bookshelf,
I can click on Add to Bookshelf.
You may need to choose a folder to add the book to.
You have the option to use an existing folder or make a new one.
I'll add this to my folder called Research.
To access the book once it's on your bookshelf,
click the Bookshelf link in the top right, then select the folder, then select the ebook.
When you're in the book, you can make annotations.
I can arrow through the pages
or select a chapter from the table of contents on the left.
First, let's look at the highlight tool.
Highlight the text of interest.
The highlight tool will appear and you can choose a color.
To create a note, click on the note icon.
Once you make a note, it appears at the top left corner of the page.
To open the note, double-click on it.
To access all of your highlights and notes for a particular book on your Bookshelf,
click on the star icon in the left navigation panel.
You'll see the chapters you annotated.
Click on the chapter to the list of annotations.
Click each annotation to see it in the reader panel.
What's great about doing this is that the book and any annotations I make will remain there
as long as the book is part of your school's Ebook Central collection.
You can download a book to your computer or device,
but you should remember that the book and any annotations will vanish
once your check-out period ends.
Because of that, many of our schools prefer to add books to their Bookshelf
to maintain access and annotations for longer.
To download a book from Ebook Central, click on the Full Download icon.
You will need a Bookshelf account.
You will also need an Adobe ID.
On your computer, you'll need a copy of Adobe Digital Editions.
On your device, you'll need a copy of Bluefire Reader.
These do not download to Kindles.
If you would like to learn more about how to use other databases
available from LIRN, take a look at the other videos
and playlists on our YouTube channel.
-------------------------------------------
Find Digital Education Books in Ebook Central: Academic Complete - Duration: 3:57.
In this video, we'll look at Ebook Central: Academic Complete.
It has thousands of in-depth digital books covering multiple subject areas
including education.
Login according to your school's method of accessing online library resources.
You may login to your school's online portal and follow a link to LIRN or the database.
Or you may go to this URL
and login with your school's LIRN credentials.
Once you're logged in to the LIRN portal, you'll see the Subject View
which allows you to click on a subject category and see the relevant databases.
You can also click on the Vendor View tab
to see databases listed alphabetically beneath the name of the vendor.
Let's click on the subject heading Education.
Then select Ebook Central.
The database will open in a new tab.
You can search for and access books without signing in to the bookshelf, but there are many benefits to to doing so.
Click on Sign-In at the upper right.
If you have an Ebook Central account,
you can sign-in with the login information you already set up.
If you do not have an account, click "Join Ebook Central."
Fill in the information required and click "Join Ebook Central."
Once you are logged in to Ebook Central,
you'll be able to save ebooks and annotations you make to your Bookshelf.
To access the book once it's on your bookshelf,
click the Bookshelf link in the top right, then select the folder, then select the ebook.
When you're in the book, you can make annotations.
I can arrow through the pages
or select a chapter from the table of contents on the left.
First, let's look at the highlight tool.
Highlight the text of interest.
The highlight tool will appear and you can choose a color.
To create a note, click on the note icon.
Once you make a note, it appears at the top left corner of the page.
To open the note, double-click on it.
To access all of your highlights and notes for a particular book on your Bookshelf,
click on the star icon in the left navigation panel.
You'll see the chapters you annotated.
Click on the chapter to the list of annotations.
Click each annotation to see it in the reader panel.
What's great about doing this is that the book and any annotations I make will remain there
as long as the book is part of your school's Ebook Central collection.
To download a book from Ebook Central, click on the Full Download icon.
You will need a Bookshelf account.
You will also need an Adobe ID.
On your computer, you'll need a copy of Adobe Digital Editions.
On your device, you'll need a copy of Bluefire Reader.
These do not download to Kindles.
If you would like to learn more about how to use other databases
available from LIRN, take a look at the other videos
and playlists on our YouTube channel.
-------------------------------------------
A Digital Power Monitor IC With a GMR Current Sensor - Duration: 2:57.
♪ Sensitivity... ♪
Hello.
Today we're demonstrating a new GMR sensor
for sensing current through circuit-board traces,
used with a Digital Power Monitor IC.
Typical sensor sensitivity is a remarkable
12 millivolts per volt per amp, which is the equivalent of
a 60 milliohm shunt at 5 volts, but without the resistance losses.
We're using an Intersil DPM evaluation kit,
connected to an NVE sensor evaluation board
and a laptop.
We enter the equivalent shunt resistance, of the sensor
into the DPM interface software, and it's measuring current.
As we vary the current, the DPM tracks it pretty closely.
The sensor is linear to about two amps in this configuration.
And that's about where the DPM IC saturates, so the sensor's linear range matches up
pretty well with the DPM.
The sensor is "omnipolar," so it has a positive output
regardless of the current polarity.
You see that we have the DPM board connected
directly to a computer, which you wouldn't want to do
with a shunt resistor, since it would be electrically connected
to the load.
The DPM manufacturer recommends a battery pack for isolating a shunt,
which may not be practical.
But the GMR sensor's inherent isolation makes it safe
and reduces noise.
Shunt resistor self-heating changes the resistance,
which creates errors.
But GMR relies on the induced field, so it doesn't depend on resistance.
Resistive losses also mean that shunt resistors are inefficient.
Here's an illustration.
We lose nearly 1% of the power in the shunt resistor.
So the "lab results" are in.
GMR sensors are ideal for use with DPMs.
There's no insertion loss and therefore
no self-heating and thermal errors.
It has much larger signals than a shunt, and doesn't require an amplifier
or transient suppression.
There's inherent isolation, and therefore Unlimited common mode voltage.
The sensors have inherent signal limiting and transient immunity,
which can minimize parts count.
Here's what we used for this demo:
You can order parts or demo boards online,
and we have a handy current-sensing Web app.
-------------------------------------------
What cultural and digital transformation means to enterprise information security - Duration: 8:13.
Hi, I'm Robert Ford, Senior Director of IT Showcase. We've come to the end of our series on
securing the enterprise. Now I've really enjoyed sharing with you what I've learned from my talk with
Bret Arsenault, Microsoft's Chief Information Security Officer. I've
learned a lot and I hope you have to.
In this last episode, we will hear some final words from
Bret on Microsoft's journey towards cultural and digital transformation. He'll talk about
what this transformation means in relation to information security, and
his hopes for the future of information security. Now let's have a look.
Moving to digital transformation,
it's something every customer, company, person is experiencing.
So how does digital transformation manifest itself
into security and what approach are we taking at Microsoft? Yeah,
I think it's interesting, since I'm in the digital transformation org. You know,
we've identified basically sixteen fundamental processes we used to have to use
around the company. Security is one of the sixteen. And
if security is done right it can be enabler for all the other pieces that we want to go do. I think it's one of the big key
differentiators. I will say,
it's a lot of change in digital transformation, even for us. You think about
going from delivering software on premise to delivering service through the cloud. You think of,
you know, we used to be a perpetual license. You
buy, you can use it forever; to a subscription based license. All of those things and,
when I was in the engineering team, just understanding whose deploying and using what software in the on-
premise world is really hard. Now, we know right away who's using what, how they're using
it, how do I turn that into a customer three sixty(360) view to give the best experience. And
I also know what prioritizations I should put on things. What things we should establish and enhance versus things that
people aren't using. As I think that, even for us as a fairly digital company,
we're in huge transformation; contractual and everything- how we do contracts and
everything else. I would say the learning from us has been though, is when there's resistance; how do you get past it. It's
usually cultural, the bigger issue tends to be cultural. Technically you can do it
it's just culturally, how to do that? And I would say the learning I have there - there's this
gentleman in San Francisco, he has this term called FFUUEE. And I know you think of FFUUEE,
what does that mean? But, I love his
FFUUEE concept because it's the six reasons why anybody doesn't do something. And they tend to be kind of
true whether they're at home, whether they're at work, they tend to be pretty good which is: they either Fear
it or they don't think it's Fair. Ever had that happen at home?
Exactly! No comment.
Come on, that's kind of fun. They don't Understand it or there's
no sense of Urgency. Those are the two U's. And then the Exhausted
or Entitled. And when we were doing our own internal cloud transformation of the
full digital transformation, we kept thinking people didn't understand that so we kept creating material to
explain what we're doing and everything else. That turned out, there wasn't really a sense of urgency and people
were exhausted. There were some understanding but a lot of people, just for a job perspective, you know,
had feared, they didn't think it was fair, about the jobs they were doing in the past. So we step back and,
you know, you're shutting down three data centers, there's a sense of urgency. You need to get
your stuff going. So I think that understanding how people may resist change
and which levers you want to go pull, turned out to be super helpful
for us. I think FFUUEE is the customer take-away there so I don't need to ask that question.
It's a great one; I've never heard it but it's going to stick with us.
FFUUEE: now that's an acronym to remember. It actually stands for
Fear, Fair, Understanding, Urgency, Exhausted,
Entitled. These are such big factors that inhibit change so it's
important to educate and integrate our teams through the process to
ensure successful transformation. Continual
cultural and digital transformation means an ever-changing environment. Bret and his team
are doing a terrific job here, protecting our enterprise and he's been really generous to sharing key pieces in his
team's approach, which he symbolizes again as this three-legged stool.
The stool symbolizes the importance of balancing information protection,
device health, identity management, data telemetry,
and risk management all in the midst of an unprecedented digital transformation
at Microsoft. Every piece
plays an integral role in securing our enterprise. If any leg is compromised the
stool could topple over. As I wrapped up my conversation with Bret, I couldn't help but ask one
final question around the future: How do we stay ahead of the bad guys in the midst of all this
transformation? Have a look at what he had to say. So the last question,
it's really about the future. So we've covered an awful lot here, thank you, but one
final question: What are your security aspirations for the future, Bret?
I have a lot of them. You know, I think,
from my perspective, there's a few of them. It's somewhat based on the stool slide we talked
about at the beginning. But you really, to have a secure enterprise the first thing you have to be
able to do is, you have to be able to anticipate and respond to risk. Most companies are good at responding but,
as I said, how do you anticipate? Because there's so much, like just look at the regulatory
environment. So one(1), is a secure enterprise that anticipates and response to risk.
That's super important to me. Two(2), my aspirations are that we really get to
were all data protection travels with the data so that we don't do all
these layers and layers and layers to make that work, which creates a lot of entropy. Three,
I would love to see a model where employees have
this seamless experience with security. And we used to talk about this is
"click fearlessly". I don't want to do that because some people "click fearlessly" anyway, which does not help my life. But where
when you click on something, you know, regardless if you're on a mobile device, you're at home,
your'e on some interactive device or a virtual reality(VR) system,
you know, that what you're doing is safe and that you don't have to worry about it. You shouldn't have to worry about that,
and that's really the number three- the employee experience. And then
number four(4) for me is this thing about the intelligence in data telemetry. We
have to get to where we have visibility into the threats
and risks that work at cloud scale. So I have a lot of
hope that we can use AI and machine learning and bots
to cull through these massive sets of data but
take action against it. That would really be the closing statement, which is: if I have all that visibility how do I
self diagnose and
auto remediate? So that would be the fifth element to the whole plan from how you
identify the risk, put the user experiences, all the way to auto remediation. Those
would be my five aspirations. We'll see if we get there! Let's hope they come true. That's what I'm hoping for. So in closing then,
you know,
hard to do it, but is there a key take-away you'd like to just leave the audience with that covers this topic today?
Yeah, I would, you know, it's...yes.
People always say "What's the ONE thing I should do?" I'm not saying there's one thing but I also don't want to
explain the hundred things we are doing. I think that there isn't a silver bullet and that's for
sure. There's no one thing that's going to solve these problems. I do think that simple
stool model of, you know, the idea that you have a process
and risk management platform that you then use to prioritize the three areas around device
health, identity management, telemetry and then that will then provide the data protection,
the information protection. That's a simple enough view, like that
would be my one take away. Don't make everybody a security expert but don't believe
that only one thing will solve it. And I think that's a good blend of where we are today.
Perfect! As Bret says, there is no silver bullet.
Defense is the name of the game. I hope you've enjoyed our series on Microsoft's approach to securing
enterprise and learned a few things you can use in your own organization.
Be sure to visit IT Showcase for more news and information on how Microsoft uses
its own technologies to stay secure and digitally transform. Thanks so much for watching.
-------------------------------------------
Balancing security in the midst of a digital transformation - Duration: 3:43.
Hello, I'm Robert Ford, a senior director in IT Showcase, a team in Core
Services Engineering, dedicated to giving you the inside view of how Microsoft does
IT. So I recently had a chance to sit down with our Chief Information Security Officer
Bret Arsenault, for very informative and insightful discussion on how we
secure the Microsoft enterprise. Now Bret shared a simple but effective
visualization for his teams approach to enterprise security and that's a three-legged stool. The
stool symbolizes the importance of balancing Information Protection, Device
Health, Identity Management,
Data Telemetry, and Risk Management all in the midst of an unprecedented Digital
Transformation at Microsoft. If any leg is compromised the stool could topple over.
So, let's dive right in beginning with the Information Protection component. How do
Bret and his team help keep both customer data and Microsoft data protected?
So Information Protection, both customer data and Microsoft data is of the
utmost importance to Microsoft. So that seems to be a big challenge since we
can't always control where the data goes. So how do we keep it protected? Well
there's a couple things that are super important. First you have to know what data
you're trying to protect. I mean all data is not equal. There's data that's public and is meant for everyone to view and
then there's data that's very private: your personal information,
our financial reporting, our intellectual property. So really about how do you classify
and label data so that you can put the right protections around it is the first and probablt most important thing you have
to do. Then, of course you secure the applications that are the ones that give you access the data and that's
your classic line-of-business applications, security procedures, on top
of, of course, secure infrastructure. But really the thing for us is really
trying to automate the ability to do the classification
because that's the hardest part and then automate the actions you take against those classifications. So this
idea that's really for us is super important is Classify, Automate, and then
Remediate against. The last thing I'd say on that is, historically we put all these
protections around data and so when the data moves it's very hard. You really get to a point where the
actual protection of the data travels with it. So whether it moves from my on
premise into a cloud system to a third-party system: if it travels with the
data, you just have much less, your much less prone
to any errors happening in that transition. So there's a lot in there Bret, so for our customers if
there's one key take away for the audience to remember about data protection, what would that
be? Certainly you gotta get the classification labeling right. Just so
you know which assets to put more resources on prioritization and, then second
you've got to really aspire to a model where the protection does travel with the data. In a client
to cloud world, could be on a mobile device, it could be, like I said, in your cloud
service, on your premise, or in a third-party cloud service, the only way to really make the
scale is to get you protection to travel with yout data. So
there you have it! One of the most important things I took from this topic is that information protection
means Classifying, Labeling, and Protecting corporate date while embedding security
in modern engineering practices. We can't always control where the data goes
so protection must travel with the data. We'll continue our discussion with Bret in the next episode
and learn how he and his team secure the multitude of devices Microsoft employees
use to access corporate resources. Thank you for watching and see you next time!
Không có nhận xét nào:
Đăng nhận xét