June 24th, 2019 by Stephen Jones No comments »

Guides is a new solution that works with Microsoft applications based on HoloLens (and, increasingly, mobile and tablet devices) in mixed reality, in four core areas: remote assistance, training, collaborative visualization, and contextual data access, (‘your data in your space’.)

Guides, trains people on how to correctly work with assets in a real-world setting.

Guides can display 3D visuals, training materials, and interactive tasks through HoloLens. It is intended to train workers and measure their performance. It has the ability to capture and store data on their usage history via the Microsoft’s Common Data Service – or in other apps that consume CDS data like Dynamics 365 Field Service or Finance and Operations.

SQL Server 2008 and SQL Server 2008 R2 – end of life July 9, 2019 -ask Synergy Software Systems

June 23rd, 2019 by Stephen Jones No comments »

Microsoft has previously announced that SQL Server 2008 and SQL Server 2008 R2 will reach end of life on July 9, 2019.

This means that in less than a month, Microsoft will no longer release regular security updates for the product.

There are several reasons this is important to you.
• Attacks against software products of all types are common and ongoing. With Microsoft SQL being such a prevalent platform, attacks against it are ubiquitous, and it’s important to keep your database platform up-to-date with the latest Microsoft security patches.
• Many compliance requirements dictate that you must be running currently supported software.
• As Microsoft drops support for a product, many third-party applications may also discontinue support for their products running on those platforms.

So, if you are still running SQL Server 2008/2008 R2, then what are your options?

1.Upgrade to a newer version of SQL.
SQL 2019 is in preview release as of this writing, so the current production version of SQL Server is 2017. Its end of life will be October 12, 2027.
Evaluate your applications and databases to make sure they are compatible e.g. Dynamic Ax 2012 is not supported beyond SQL 2016

Plan a migration for either on-premises or cloud. A move to an Azure SQL Database Managed Instance, will not require you to upgrade in the future. By choosing this option, you will also gain access to new features which have appeared in the latest SQL Server versions. However, it only offers subset of SQL features so you need to be sure it will support your application and use.

2.Migrate to Azure to receive three more years of Extended Security Updates for SQL Server 2008/2008 R2. If you need to stay on the same SQL code base for a bit longer, Microsoft will allow you to rehost your SQL 2008 environment in Azure and still provide you with security updates for an extended period. There is no extra cost for the extended updates beyond the standard Azure VM rates.

3.Purchase extended support. Microsoft allows customers with an active Enterprise Agreement and Software Assurance subscription to purchase and receive three years of Extended Security Updates for SQL Server 2008/2008 R2. The annual outlay for the updates is 75% of the full license cost.

4.The least desirable option is to stay where you are and pray. If circumstances prevent you from moving forward now, then at minimum you should:
• Recognize and account for the risk;
•Plan and budget for a transition as soon as possible;
•Re-evaluate your security and tighten it as much as possible.

Microsoft provides guidance for handling the end of support of SQL Server 2008/2008 R2 at https://www.microsoft.com/2008-eos.

Of course, Synergy is ready to help you to evaluate and to progress to the next level. 0097143365589

If you are running newer versions of SQL Server, then here are their End-of-Life dates.
•SQL Server 2012 – July 12, 2022
•SQL Server 2014 – July 9, 2024
•SQL Server 2016 – July 14, 2026
•SQL Server 2017 – October 12, 2027

Windows Server 2008 and 2008 R2, support is coming to an end.

June 23rd, 2019 by Stephen Jones No comments »

Sometimes lifecycles end because of age or workload and other times they expire due to vendor support.
In the case of Windows Server 2008 and 2008 R2, Microsoft announced that Extended Support will end on January 14, 2020.

Microsoft provides: Mainstream Support, Extended Support, and Beyond End of Support.

Mainstream Support

Mainstream Support is Microsoft’s first phase of support and lasts five years. It includes the following benefits:
• Incident support (no-charge incident support, paid incident support, support charged on an hourly basis, support for warranty claims)
• Security update support
• Ability to request non-security updates

Extended Support

The Extended Support phase follows Mainstream Support, and also lasts five years. The key features of Extended Support are:
• Paid support
• Security updates at no additional cost
• Ability to request non-security updates (available only via Unified Support, a new model of support that offers comprehensive support that covers your entire organization)
• Microsoft will not accept requests for warranty support, design changes, or new features during the Extended Support phase.

Beyond End of Support

The Beyond End of Support phase is the final phase of the product lifecycle and lasts for three years. Here are the key things to remember.
• Request to change product design and features are not available
• Security updates are available only with the purchase of the Extended Security Update Program for up to three years. This typically costs 75% of the on-premises license cost annually.
• Technical support is provided when you purchase Extended Security Updates and have an active support plan in place on the product that has moved beyond the Extended Support date.

Server 2008 and 2008R2 are moving out of the Extended Support phase on January 14, 2020. From that date on,
non-security updates will no longer be available,
security updates will be available only if you pay for the Extended Security Update Program,
and other vendors will diminish their support of this operating system version.
If you are not prepared, then this will leave your environment open to security holes, application instability, and support restrictions.
If you have not already planned for this then now is the time to get it into your budget for first thing next year.

Synergy certifications

June 22nd, 2019 by Stephen Jones No comments »

Happy to announce that our Gold partnership with Microsoft has been confirmed again for the next 12 months.

Recently we have also certified consultants in ABBY the industry leading OCR software.

Earlier in the year we became a gold partner with UIPath the market leading Robotic Process Automation solution, for which Synergy has more than 50% of the certified consultants in the region.

This is part of our commitment to deliver professional service for digital transformation to our clients.

UAE and AI

June 20th, 2019 by Stephen Jones No comments »

A report commissioned by Microsoft and conducted by EY says the UAE has seen the second highest AI investment over the past decade, more than USD $2.15 billion
• One in five companies in the country consider AI as their top digital priority
• 94% of C-suite leadership consider ‘AI strategy’ as an important topic and 35% of non-managerial staff are actively having AI discussions

New research shows the state of AI within businesses across the UAE is expected to improve dramatically over the next three years,as a growing number of executives look to AI to drive their digital agendas. Already, 18% of businesses in the country consider AI their most important digital priority. (AI Maturity Report in the Middle East and Africa (MEA) Click here – a new study commissioned by Microsoft and conducted by EY.)

The UAE’s progress in elevating the AI agenda is a direct result of leaders across the country recognising that the technology is a key differentiator across all sectors. 94% of companies in the UAE report involvement in AI at executive management level – the highest percentage of any surveyed country in MEA.

“When we examine companies with high AI maturity, it’s clear that the technology is driven directly by the CEOs themselves. This high level of involvement typically results in greater investment in AI, broader adopti on and a greater number of successful implementations,” says Sayed Hashish, regional general manager at Microsoft Gulf.

Leadership capability in the UAE is also rated high when compared with other countries in MEA. While 64% of respondents believe they have moderate, little or no AI leadership competency, 24% of executives in the UAE rated themselves as highly competent, with another 46 percent indicating they are either competent or very competent. Most companies still consider themselves to be in the planned phase of AI maturity, meaning AI has not yet been put to active use. On the opposite end of the spectrum, just 8% of businesses perceive themselves as advanced in their application of AI.

It’s not surprising that the UAE is the second highest regional investor in AI over the past ten years, investing $2.15 billion in total. The bulk of this investment went towards social media and Internet of Things (IoT) transactions. This was followed by notable spend across a further eight technologies, including smart mobile, gamification, and machine learning.

Machine learning is ranked as the most useful AI technology, with primary emphasis placed on decision support solutions, then smart robotics and text analysis, where customer interactions are the key focus.

The UAE’s open culture around AI is a highly positive indicator of the health of the technology within the country. 94% of UAE companies have ‘AI Strategy’ as an important topic at C-suite level and a significant 35% of companies say AI discussions are filtering down from top management right the way through to non-managerial levels. As a result, employees in the UAE embrace opportunities to participate in skills training and pilot programmes.

UAE companies are, in general, heavily focused on customer engagement when it comes to AI. The use of chatbots in the marketing space has become common, largely because they enhance the customer experience, ultimately demonstrating obvious value to management. UAE respondents expect AI to deliver greater operational efficiencies, drive down costs and, most importantly, enable them to be more competitive. Companies within the Emirates view prediction (76%) and automation (76%) as the most relevant applications of AI for their businesses.

65% of UAE companies rate themselves as highly to very competent when it comes to drawing on external alliances to strengthen their AI capabilities.

Synergy Software Systems offers Integration as a service, Robotic Process Automation, Machine learning, and Advanced analytics solutions

The first Microsoft cloud datacenter regions in the Middle East are now available!

June 20th, 2019 by Stephen Jones No comments »

On the 19th June 2019, Microsoft launched two new cloud data centres in the United Arab Emirates – in Dubai and Abu Dhabi.
These new cloud regions join Microsoft’s global cloud infrastructure – one of the largest and most innovative in the world.

Microsoft Azure and Microsoft Office 365 are now available from the new cloud regions in the UAE and give local access for Middle East organizations, enterprises and developers to scalable, available and resilient cloud services to bring applications closer to users, while maintaining data residency, security and compliance needs.

These new cloud regions in the UAE are the dawn of a new era, driving digital transformation, economic growth and job creation,” said Sayed Hashish, Regional General Manager, Microsoft Gulf. “We are committed to empowering every person and every organization on the planet to achieve more. Now, more customers in the Middle East can move with confidence to the trusted and intelligent Microsoft Cloud. They will be more competitive as they start their digital transformation journeys – engaging customers, empowering employees, optimising operations, and reinventing products and services.”

Azure, is an ever-expanding set of cloud services, that offers computing, networking, databases, analytics, artificial intelligence and Internet of Things (IoT). Office 365 provides email, collaboration, conferencing, enterprise social networking and business intelligence.

Dynamics 365 and Power Platform, offer the next generation of intelligent business applications and tools, and are anticipated to be available from the cloud regions in the UAE by the end of 2019.

Microsoft provides expertise in data protection, security and privacy as well as the industry’s broadest set of compliance certifications to helpmanage compliance with supported industry standards and regulations such as ISO 27001/27018, SSAE 18 SOC, and GDPR.

Data residency in the UAE will help enable government organizations and enterprises to comply with in-country regulatory frameworks and decrease the obstacles for cloud adoption. This allows, for example, public sector departments to revitalize their service delivery with the ability to improve data gathering, promote teamwork, portal development and analytics.

Regional organizations of all sizes from across all industries have placed their trust in the Microsoft Cloud. These include the Emirates Group, Emaar Properties, Majid Al Futtaim, Jumeirah Hotels and Resorts, Landmark Group, Abu Dhabi Global Markets (ADGM), Miral, Daman Insurance, RAK Ceramics, Imdaad, Gulf Air, Viva, Kuwait Finance House, and Dubai World Trade Center.

Entities from sectors such as government, aviation, financial services, manufacturing and healthcare are among those that are already benefiting from the new cloud regions. These include Dubai Airports, Etihad Airways, Mubadala Development Company, Mashreq Bank, The First Group, Network International, and Shelf Drilling.

Microsoft has been working closely with Abu Dhabi Digital Authority (ADDA) and Dubai Electronic Security Center (DESC) to enable compliant adoption of Cloud Services by the UAE government and semi-government entities. Microsoft is the first cloud service provider in the UAE to achieve DESC’s Cloud Service Provider certification.

Power BI advanced analytics and AI

June 19th, 2019 by Stephen Jones No comments »

There is a huge demand to get more insight from the data using AI and advanced analytics.
See how to use visuals in Power BI to get more insight from your data and how to use embedded AI features in Power BI.

Power BI is about helping our customers embrace a data culture, where every employee can make better decisions based on data. The growth of Power BI has been staggering – customers ingest more than 20PB of data to Power BI every month, lighting up over 30M reports and dashboards, and the Power BI service processes over 12M queries per hour.

Gartner named Microsoft a Leader in the Magic Quadrant for Analytics and BI Platforms for 12 consecutive years.
Power BI has led the way in infusing AI with BI through capabilities like Quick Insights which help unearth trends in data and Q&A which enable business users to get answers by simply asking questions.

Microsoft recently announced the general availability of Azure Cognitive Services and Azure ML dataflows integration, to provide analysts with a toolkit of powerful AI functions:

● Azure Cognitive Services are sophisticated pre-trained machine learning models for intelligent applications. Analysts can use these models to extract insights from images by detecting objects. Text fields like customer feedback can be analyzed for positive and negative sentiment as well as have key phrases extracted. All these AI enrichments can be easily consumed by end users through interactive Power BI reports.

● Azure Machine Learning is a powerful platform where data scientists can develop machine learning models. These models can now easily be shared and used by analysts. Power BI automatically discovers which models an analyst has permissions to and provides an intuitive point and click user interface to invoke them. Analysts can now easily collaborate with data scientists as well as visualize and use insights from the model in their reports.

Learn more about the general availability for cognitive services, Azure ML and the AI workload in Power BI Premium.

Some exciting new capabilities that will be available soon:

● Two new AI visuals—Distribution Changes analyzes what makes a distribution look different, and the Decomposition Tree enables users to drill into any dimension to understand what is driving a key metric.

● Expanding Power BI’s vision and text analytics capabilities and adding entity detection and text and handwriting recognition, enabling one-click transformations for insights on unstructured data.

● For enterprises that need custom lifecycle management or further tuning, models created in Power BI can be exported to Azure ML

● Extending Power BI’s natural language capabilities. The new updates include the ability to train Q&A so it understands and adapts to company-specific language like synonyms, phrasings, or specific domains, and the ability for report authors to see every natural-language question asked so they can adjust how Power BI responds.

Template apps are integrated packages of pre-built Power BI dashboards and reports, configured to connect to specific data sources. With them, Microsoft partners can quickly provide analytics for the apps and services they provide. Partners can also manage the Template Apps development lifecycle, from dev to marketplace to updates. With template apps, users can immediately begin exploring, learning, and acting on key data with off-the-shelf apps. Today, Template Apps become generally available. Users can find and install template apps on AppSource.

Embedded analytics keeps evolving

With Power BI embedded analytics, you can extend the value of Power BI Premium and Power BI Pro. Embed analytics in internal websites, applications, and portals to empower your organization to make data-driven decisions. Here is some of the exciting news we are sharing today:

● Service principals with Power BI are now generally available. With service principal, application developers can authenticate an external application to embed Power BI content or manage and automate Power BI operations with Power BI using an app-only token. Read the full article.

● Use the AI-based ‘Key Influencers’ visualization in your application to allow end users to see which factors affect the metric being analyzed and contrast the relative importance of these factors.

Databases breaches

June 18th, 2019 by Stephen Jones No comments »

Verizon has published a Data Breach Investigations Report annually and the latest report is the 11th edition, and all are extremely well detailed. Not all data breaches are discovered, and those that are discovered aren’t necessarily reported. The 2018 report covers 53,000 incidents, defined as: A security event that compromises the integrity, confidentiality or availability of an information asset. . It also covers 2,216 breaches, which are defined as: An incident that results in the confirmed disclosure — not just potential exposure — of data to an unauthorized party.

These numbers ), do NOT include breaches involving botnets. The additional 43,000 successful accesses via stolen credentials associated with botnets are handled in a special insights section of the report.

Those are scary numbers.

The Verizon report show s 73% perpetuated by outsiders, 28% involving internal actors, 2% involving partners, 2% featuring multiple parties, 50% carried out by organized criminal groups, 12% involved actors identified as nation-state or state-affiliated. These figures are regarding those confirmed data breaches, not all security incidents. While 28% involve internal users, the bulk of data breaches were caused by from people outside the organization, using malware or social attacks, or exploiting vulnerabilities created due to errors.

While the exact internal actors weren’t found for all of the reported data breaches, analysis was done for 277 data breaches and a screen shows: 72 system admin, 62 end user, 62 other, 32 doctor or nurse, 15 developer, 9 manager, 8 executives

Database administrators may focus on denying permissions to developers for production, but developers proved much less likely to be involved in data breaches than system admins …which includes … the DBAs.

You don’t need production system access to cause a data breach. It’s common practice in an enterprise to make copies of production data for use by analysts, developers, product managers, marketing professionals, and others.

Privacy law compliance makes this all the more concerning.

Biometrics – privacy and security concerns

June 18th, 2019 by Stephen Jones No comments »

On Monday last week a US Customs and Border Protection (CBP) subcontractor suffered a data breach that exposed the photos of tens of thousands of travelers coming in and out of the United States, through specific lanes at a single Port of Entry over a one and a half months period, in what was described as a “malicious cyber-attack.”

The database of traveler photos and license plate images was transferred to a CBP subcontractor’s network without the federal agency’s authorization or knowledge, the CBP explained. The subcontractor’s network was then hacked. BP said its own systems had not been compromised. Fortunately no other identifying information was included with the photos, and no passport or other travel document photos were compromised.

Images of airline passengers from the air entry and exit process were also not involved.

CBP’s “biometric entry-exit system,”is the government initiative to biometrically verify the identities of all travelers crossing US borders. which it is racing to implement so as to use facial recognition technology on “100 percent of all international passengers,” including American citizens, in the top 20 US airports by 2021.

The concern is whether that is urgency is ignoring vetting, and regulatory safeguards, and privacy legislation. Only last month, Perceptics, the maker of vehicle license plate readers used by the US government and cities to identify and track citizens, was hacked, and its files were dumped online. It is not clear whether the attacks were connected.

Summer discount on SQL protection tools

June 18th, 2019 by Stephen Jones No comments »

Security, privacy, performance, and up time, all depend on a well maintained database with timely reports and alerts.
for an Enterprise system this is mission critical.
Few DBAs have the time and training to write and maintain a comprehensive set of scripts. Yet they also often lack the tools to do the job.
We offer fantastic suite of tools to help you to mange your SQL databases and with discounted bundled prices.
With privacy laws and compliance adding to the ever rising security threats, a well managed system is now often key to whether a customer will share data it you, and directly impacts whether you can secure and retain business.

Talk yo us about System health checks and administrator training, and how you can reduce administrative cost, and system risks with SQL management tools.
00971 43365589

Microsoft showcases power Apps with AI at the Atlaata Business Application Summit

June 15th, 2019 by Stephen Jones No comments »

Microsoft is in Atlanta is hosting its Business Application Summit where it is announcing three significant updates to its Power Platform to give users new tools and more advanced features.
- AI Building and PowerApps Portal,
- updated AI capabilities for PowerBI,
- enhanced cognitive/AI capabilities in Microsoft Flow.

Microsoft’s narrative is to democratize AI and ML f to eliminate the need for years of coding experience to properly utilize the technology in your application or at your company – ‘Citizen developers’.

Power BI’s new UI is more closely aligned to other Office 365 applications
• Text and image analytics in Power BI powered by Azure Cognitive Services, and the ability to invoke Azure ML models are now generally available.
• Microsoft announced two new AI visuals—Distribution Changes analyzes what makes a distribution look different, and the Decomposition Tree enables users to drill into any dimension to understand what is driving a key metric.
• Microsoft is expanding Power BI’s vision and text analytics capabilities, and aiso also adding entity detection and text and handwriting recognition, to enable one-click transformations for insights on unstructured data.
• For custom lifecycle management or further tuning, models created in Power BI can be exported to Azure ML.

The PowerApps Portal is a new tool that was previously in Dynamics 365 wall but is now available directly with PowerApps to enables customers to create websites that can be accessed by external users with a wide variety of identities, including personal accounts, LinkedIn, and other Azure Active Directory organizations, and enable anonymous access to content.

The Microsoft Flow, app will have AI capabilities and In conjunction with AI Builder, Flow users can extract data from images and text to drive logic in their processes to make more informed decisions.

Making AI more accessible in the power applications means that rather than have to model your application around an AI framework , AI and ML can be built around your application.

Addressing WannaCry risks in your organization

May 30th, 2019 by Stephen Jones No comments »

WannaCry—the most damaging cyberattack of 2017—continues unabated, with at least 3,500 successful attacks per hour, globally, according to research published by security firm Armis on Wednesday.
The research estimates that 145,000 devices worldwide continue to be infected, noting that “a single WannaCry infected device can be used by hackers to breach your entire network.”

The primary reason WannaCry persists is an abundance of unpatched Windows versions across healthcare, manufacturing, and retail sectors— a “large number of older or unmanaged devices which are difficult to patch due to operational complexities,” Ben Seri, research vice president at Armis, wrote in a blog post. The number of active Windows 7 (and older) installations across those sectors exceeds 60%,

This is in large part a vendor issue, because these industries rely on third-party hardware with poor lifetime support. There are operational reasons to hold on to old and unsupported Windows devices. Manufacturing facilities rely on the HMI (Human-Machine-Interface) devices that control the factory’s production lines. HMI devices run on custom built hardware, or use outdated software, that hasn’t been adopted to the latest Windows.

In healthcare organizations, many of the medical devices themselves are based on outdated Windows versions, and cannot be updated without complete remodeling.

In retail environments, the Point-of-Sale devices are the weak-link, based on custom hardware, which is late to receive updates if at all.

This is a particularly pressing issue, with the pending end-of-support for Windows 7 in January 2020. This which will serve to further complicate the security posture of many enterprises, especially as other “wormable” vulnerabilities are discovered, such as BlueKeep, which prompted Microsoft to provide patches for Windows XP and Server 2003 due to the potential risk the vulnerability posed.

The WannaCry attack had the potential of being much more damaging than it could have been, though for affected organizations, the damages were quite severe—the NHS reported losses of £92 million ($116 million).

Security researcher Marcus Hutchins, discovered a kill switch domain name in the program that was unregistered by the authors. When WannaCry executes, if the domain resolves, the program exits. While this bought additional time for defenses, WannaCry was reported as “stopped,” which may have lowered concern about the attack. Days later, a variant lacking a kill switch was discovered.

An analysis by GCHQ’s cybersecurity division identified the authors of WannaCry as the Lazarus Group, a North Korea state-sponsored threat actor, also responsible for the 2014 Sony Pictures hack. The US, Australia, New Zealand, Canada, and Japan have criticized North Korea for their involvement in the attack, according to ZDNet.

WannaCry is built on top of a pair of exploits called EternalBlue and DoublePulsar, which were released by an organization called The Shadow Brokers on April 14, 2017. The exploits were originally developed by the NSA Office of Tailored Access Operations and CIA Information Operations Center. The weaponization—rather than responsible disclosure—of those underlying exploits created an opportunity for the WannaCry attack to be waged.

, Microsoft president and chief legal officer Brad Smith condemned the “stockpiling of vulnerabilities by governments,” noting that “We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage,” and “We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.”

To reduce potential risks from WannaCry patch your devices. That requires IT professionals to know that the devices exist. “Without the proper control and monitoring of devices and networks, organizations are bound to lose track of both,you must maintain a continuous asset inventory of all devices, and monitor your network for unknown, suspicious, or misplaced devices connected to it.”

Enhancements to the production order release process in Dynamics 365 for Finance and Operations

May 30th, 2019 by Stephen Jones No comments »

When you release a BOM or formula line to the warehouse, the system first determines whether material is already available at the production input location on the shop floor where the material will be consumed for the production process.
• If the material is available at the production input location, then it’s picked from that location immediately after the signal is given for the release of material to the warehouse.
• If the material isn’t available at the production input location, then the material release indicates that material must be moved from locations in the warehouse to the production input location. The material is moved via warehouse work for raw material picking. Therefore, warehouse processes for raw material picking must be configured. For more information, see Replenishment and Control warehouse work by using work templates and location directives.

Configure the release of BOM and formula lines so that it occurs as part of the release of a production order or batch order. Alternatively, control the release either by a batch job or as a manual interaction.

The method that is used to release BOM and formula lines is controlled by the Production line release parameter. You can find this parameter at Production control > Setup > Production parameters.

If you release materials by using the On production order release parameter setting, then when you do a manual release, you have two options for controlling the material release:
•Release material per operation number.
•Release material in proportion to the amount of finished goods. You can release raw material for a partial quantity of finished goods . For example, a production order is created and scheduled for 1,000 pieces (pcs.). The shop floor supervisor is planning the production of 100 pcs. for the next shift and wants to release materials only for that shift. In this case, the supervisor can use the Quantity field to release materials for the 100 pcs. that are planned for the next shift.

•To release raw material in a specific unit, select Production control > Production orders > All production orders, select a production order, and then, on the Warehouse tab, select Release to warehouse. Then use the Unit field to select the unit of the finished good to release material in. The units that are available are defined in the unit sequence group ID of the finished good.

Major SQL updates don’t skip – SQL Server 2016 SP2 CU7 and SQL Server 2017 CU 15

May 26th, 2019 by Stephen Jones No comments »

This week, Microsoft released two major updates.

SQL Server 2016 SP2 CU7 has multiple fixes including:

• Filtered index corruption
• Access violations in sys.dm_exec_query_statistics_xml, sys.dm_hadr_availability_replica_states, sys.availability_replicas, sys.dm_db_xtp_hash_index_stats, sys.fn_dump_dblog, sys.dm_db_xtp_checkpoint_files
(I.e. if you monitor your servers, which you should, then you should apply this CU to avoid problems caused by the monitoring tool’s queries)
• AG failover fails
• Incorrect query results on columnstore indexes, and also this

SQL Server 2017 CU 15 has even MORE fixes, read the full list. https://support.microsoft.com/en-us/help/4498951/cumulative-update-15-for-sql-server-2017

Note also, that from SQL Server 2017, the Analysis Services build version number and SQL Server Database Engine build version number do not match

There are some CUs you might be tempted to skip because they don’t affect you. These releases will affect a wide range of features and you should plan to apply these sooner than later.

Dubai F@B – calorie content menus, and QR codes to choose safe hygenic food,

May 24th, 2019 by Stephen Jones No comments »

Dubai: Food establishments in Dubai should declare in their menus the calorie content of all ready-to-eat food items, Dubai Municipality has said in a circular last Saturday.

The new rule is applicable to restaurants, cafeterias and cafes with more than 5 branches from November.

All other restaurants, catering establishments and hotels should implement it in the second phase in January 2020, the civic body said in a press release on Saturday.

There are more than 18,000 food businesses in various categories according to Dubai Municipality.

.On Sunday a new QR Code system was also launched by the Dubai Municipality which will allow you to choose food based on hygiene and safety in Dubai-based food outlets. Under this system, Dubai’s Food Safety Department will issue smartphone-readable codes to food outlets through its “Food Watch” digital platform. It will be mandatory for food outlets to display the QR codes in their premises as and when they are issued one.

In the next phase, people will be able to see what kind of a license is issued to an outlet. So, if somebody is making cakes or taking up catering services, you can ask for the code and find out if they are licensed to do it. Accessibility, location, web address, contact details etc. are the other details of food outlets available through QR code scanning. Dubai Municipality’s hotline number to register complaints 800900 is also shown.

If you need a proven software solutions for your F@B operations, then contact us.