Amazon Prime Day 2024

Heise Media is offering a variety of deals and discounts on tech products and services. Here are some highlights:

1. Amazon – Get 18% off on select Amazon products, including household appliances, electronics, and more.

2. pCloud – Get a lifetime subscription to pCloud’s secure cloud storage for just EUR 399 (originally EUR 599).

3. Newshosting – Get 70% off on a premium Usenet provider with unlimited data volume and speed, as well as free access to their VPN service.

4. NordPass – Get a premium password manager for just EUR 2.99 per month (originally EUR 19.95 per month) with a 2-year subscription.

5. Hostinger – Get 79% off on a 4-year web hosting plan with 100 GB NVMe storage, SSL, and unlimited bandwidth for just EUR 3.56 per month (originally EUR 79 per month).

6. TechStage Newsletter – Sign up for the TechStage newsletter to receive weekly summaries of the best tech deals, as well as exclusive offers and discounts.

Please note that by signing up for the TechStage newsletter, you are consenting to receive emails from Heise Medien informing you about their products, services, and offers. You can withdraw your consent at any time by emailing datenservice@heise.de or by using the unsubscribe link provided in each email.

Use Conditional Formatting to Highlight Important Dates with Days since Date in Microsoft Community Hub

Conditionally Formatting Cells Based on Date Differences in Google Sheets

As a spreadsheet user, you may have encountered the need to highlight cells based on certain conditions. One common use case is to highlight cells based on the number of days that have passed since a specific date. In this blog post, we will explore how to conditionally format cells in Google Sheets based on the difference between two dates.

Background

———-

Em_CD, a user on November 22, 2023, asked for help with conditionally formatting cells based on the number of days that have passed since the “Date of Last Contact”. The goal is to highlight cells in different colors based on the following criteria:

* Green for 0-3 days

* Yellow for 4-9 days

* Red for 10 days or more

The challenge is that most online tutorials use the =TODAY() function, which does not quite suit their needs. In this blog post, we will explore a solution to this problem using Google Sheets’ built-in functions and formatting options.

Solution

———-

To achieve the desired result, we can use the =EDATE() function to calculate the difference between the “Date of Last Contact” and today’s date. Here’s the formula for each color condition:

* Green (0-3 days): =EDATE(A2, 0) < TODAY()

* Yellow (4-9 days): =EDATE(A2, 1) < TODAY()

* Red (10+ days): =EDATE(A2, 2) < TODAY()

Here’s how the formula works:

* EDATE(): Calculates the number of days between two dates. In this case, we use A2 as the “Date of Last Contact” and today’s date as the starting point for the calculation.

* TODAY(): Returns today’s date.

* <: The less than operator is used to compare the result of the EDATE() function with today's date. If the difference is within the desired range, the cell will be highlighted accordingly.

Once you have created these formulas, you can apply them to the entire column or select specific cells that you want to format. To do this, follow these steps:

1. Select the cells you want to format.

2. Go to the “Home” tab in the top menu.

3. Click on the “Conditional Formatting” button in the “Styles” section.

4. Select “New Rule” from the drop-down menu.

5. In the “Format cells if” dropdown, select “Custom formula is”.

6. Enter the formula you created earlier (EDATE(A2, 0) < TODAY() for green, EDATE(A2, 1) < TODAY() for yellow, and EDATE(A2, 2) < TODAY() for red).

7. Click “Done” to apply the formatting.

Tips and Variations

———————

Here are some tips and variations to help you refine your conditional formatting rules:

* Use named ranges or references to make your formulas more readable and maintainable. For example, instead of using A2 as the “Date of Last Contact”, you can use a named range like “LastContact”.

* You can also use multiple conditions in your formulas to highlight cells based on more complex criteria. For example, you could use a combination of date ranges and other conditions to highlight cells that meet specific requirements.

* If you want to highlight cells based on the number of days since a specific date, rather than today’s date, simply change the starting point of the EDATE() function. For example, if you want to highlight cells based on the number of days since January 1, 2023, use =EDATE(A2, -295) < TODAY().

* You can also use different formatting options, such as colors, fonts, and backgrounds, to create more visually distinct highlighting.

Conclusion

———-

In this blog post, we explored how to conditionally format cells in Google Sheets based on the difference between two dates. We demonstrated a solution using the =EDATE() function and the less than operator to highlight cells in different colors based on the number of days that have passed since the “Date of Last Contact”. By following these steps and tips, you can create more sophisticated conditional formatting rules to suit your specific needs.

Unlocking Elastic Scale Across All Applications with XM Soft

VMware: A Key to William Hill’s Success in the Digital Age

In today’s fast-paced digital landscape, organizations must be agile and adaptable to stay ahead of the competition. For William Hill, a leading bookmaker with over 85 years of experience, this means investing in cutting-edge technology that can help the company differentiate itself from its competitors and provide a secure, easy-to-manage infrastructure for its growing portfolio of applications.

To achieve these goals, William Hill has turned to VMware hyperconverged infrastructure (HCI) powered by VMware vSAN and VMware vSphere, with VMware NSX-T Data Center. This Software-Defined Data Center solution provides a highly scalable and agile platform that allows the company to quickly develop and deploy new applications and put them into production without worrying about the underlying infrastructure.

The decision to choose VMware was driven by several factors, according to William Hill’s CTO, John O’Connor. “We needed an IT infrastructure that could support our growing portfolio of applications and provide a secure, easy-to-manage environment for our teams,” he said. “VMware’s hyperconverged infrastructure and Software-Defined Data Center solutions offered the perfect combination of scalability, agility, and security that we needed to differentiate ourselves from our competitors.”

With VMware HCI, William Hill has been able to create a highly scalable and agile platform that can quickly adapt to changing business needs. The solution is built on a hyperconverged infrastructure that combines compute, storage, and networking into a single, easy-to-manage appliance. This allows William Hill’s teams to deploy new applications and services in minutes rather than days or weeks, providing a significant competitive advantage in the digital age.

In addition to HCI, William Hill has also implemented VMware NSX-T Data Center to create a Software-Defined Data Center that provides a highly secure and agile environment for its applications. This solution allows the company to abstract the underlying infrastructure from the application layer, providing a more secure and reliable environment for its teams to work in.

The results have been impressive, according to O’Connor. “With VMware, we have been able to create a highly scalable and agile platform that has allowed us to differentiate ourselves from our competitors and provide a secure, easy-to-manage environment for our teams,” he said. “The solution has also helped us to quickly develop and deploy new applications and services, providing a significant competitive advantage in the digital age.”

Looking ahead, William Hill is now implementing VMware Cloud on AWS to provide a secure agile platform on which it can migrate workloads quickly and work around key sporting events like Cheltenham Festival and the Grand National. This will allow the company to further improve its agility and scalability, while also providing a more cost-effective solution for its IT infrastructure needs.

In conclusion, William Hill’s decision to choose VMware hyperconverged infrastructure (HCI) powered by VMware vSAN and VMware vSphere, with VMware NSX-T Data Center has been a key factor in the company’s success in the digital age. The solution has provided a highly scalable and agile platform that has allowed the company to differentiate itself from its competitors and provide a secure, easy-to-manage environment for its teams. With VMware Cloud on AWS, William Hill is set to continue its growth and success in the years ahead.

iOS 18 and macOS 15

Apple’s Latest Update Brings a New “Recovered” Album to the Photos App

If you’ve ever had the feeling that your photos and videos have disappeared into thin air, only to later reappear in your iPhone’s photo library, you’re not alone. Apple has just released a new update for iOS 18, macOS 15, and iPadOS 18 that addresses this exact issue. The tech giant has introduced a new “Recovered” album within the Photos app to help users find and manage their lost media content.

The “Recovered” album is located in the Utilities section of the Photos app and contains any photos or videos that the system cannot identify or associate with a specific album. This includes not only lost recordings but also partially damaged images and films. The album allows users to individually or batch permanently delete or restore the content to their regular photo library.

According to Macrumors, the “Recovered” album is the result of a bug that caused previously deleted content to reappear in the Photos app. Apple fixed this issue with iOS 17.5.1, but the new feature provides users with more security and peace of mind regarding their stored content.

The exact reason for the introduction of the “Recovered” album has not been officially stated by Apple, but it is suspected to be related to a bug that caused deleted photos and videos to reappear on some users’ devices. The issue was reportedly caused by a damaged database and affected only local storage on the iPhone, rather than the cloud.

With this new feature, users can now easily find and manage their lost content, giving them more control over their digital assets. Whether you’ve accidentally deleted photos or videos or have experienced issues with the database or storage, the “Recovered” album provides a central location for finding and resolving these issues.

So, the next time you can’t find a photo or video on your iPhone, don’t panic – just check the “Recovered” album within the Photos app. It might just contain the lost content you’re looking for.

Accelerating Your Storage Infrastructure with VMware NVMeoF Virtual Volumes (vVols) on Pure Storage

Virtualization has become an essential technology for businesses of all sizes and industries, as it allows for more efficient use of hardware resources and increased flexibility in IT infrastructure management. However, as more and more workloads are virtualized, the need for high-performance, low-latency I/O becomes increasingly critical to ensure that business-critical applications can meet demanding service level agreements (SLAs) and continue to deliver optimal performance.

This is particularly true for Oracle workloads, which have stringent I/O requirements that must be met in order to maintain the highest possible performance and continued application availability. In a virtualized environment, it can be challenging to ensure that these requirements are met, especially as business demands continue to evolve and grow.

To address this challenge, many organizations are turning to Broadcom’s Virtual IO (VIO) technology. VIO is designed specifically for mission-critical Oracle workloads, providing a high-performance, low-latency I/O solution that can be used in both virtualized and non-virtualized environments.

With VIO, businesses can ensure that their critical Oracle applications are able to meet the demanding SLAs they have committed to, while also delivering the highest possible performance and availability. This is especially important for businesses that rely on Oracle workloads to power their operations and customer-facing applications, as any downtime or performance issues can have significant negative impacts on revenue and customer satisfaction.

One of the key benefits of VIO is its ability to provide low-latency I/O for Oracle workloads, which is essential for maintaining high performance and avoiding application slowdowns or outages. By optimizing I/O operations and reducing latency, VIO can help businesses ensure that their critical applications are able to meet the demanding SLAs they have committed to.

Another important benefit of VIO is its scalability and flexibility. As business demands continue to evolve and grow, VIO can easily be scaled up or down to meet changing needs, without requiring significant changes to the underlying IT infrastructure. This makes it an ideal solution for businesses that need to be able to adapt quickly to changing market conditions and customer expectations.

In addition to its performance and scalability benefits, VIO also provides a number of other features that make it an attractive solution for mission-critical Oracle workloads. For example, VIO includes advanced quality of service (QoS) capabilities that allow IT teams to prioritize traffic and ensure that critical applications receive the resources they need to perform optimally.

VIO also provides advanced security features, such as encryption and access controls, which can help businesses protect their sensitive data and maintain compliance with regulatory requirements. And, because VIO is designed specifically for mission-critical Oracle workloads, it is optimized for use with Oracle databases and applications, providing a seamless and integrated solution that can be easily implemented and managed.

In conclusion, as businesses continue to virtualize their IT infrastructure, the need for high-performance, low-latency I/O solutions becomes increasingly critical. For mission-critical Oracle workloads, Broadcom’s Virtual IO (VIO) technology is an ideal solution that can help businesses ensure the highest possible performance and availability, while also providing advanced security features and scalability. With VIO, businesses can confidently virtualize their critical Oracle applications and maintain the demanding SLAs they have committed to, all while delivering the best possible user experience and driving business success.

Default Access Viewing for Linked People in Microsoft Community Hub

Hi there! As a SharePoint power user and administrator, I’ve noticed an interesting issue when it comes to default sharing links in Office 365 Group-based sites and Communication sites. It appears that when the default Sharing Link type is set to “People with Existing Access,” links generated by default are View links instead of Edit links, despite the policy specifying Edit links.

I’ve confirmed this behavior in multiple tenants, and it’s worth noting that other link types, such as Read or Contribute, do work as expected. This got me thinking – what’s going on here? Is there something I’m missing?

After digging into the issue, I discovered that the root cause is related to how SharePoint handles permissions and access. When a site is created in an Office 365 Group or Communication site, the default sharing link type is set to “People with Existing Access.” This means that any links generated by default will only grant view-level access to users who already have access to the site.

The reason for this behavior is that SharePoint is designed to provide a secure and controlled environment for collaboration. By default, users can only edit content if they have explicit permission to do so. In the case of Office 365 Group-based sites and Communication sites, the default sharing link type is set to “People with Existing Access” to ensure that only authorized users can access the site and its contents.

While this behavior makes sense from a security standpoint, it can be inconvenient for users who need to edit content but don’t have explicit permission to do so. In these cases, users will need to request explicit permission from the site owner or an administrator in order to gain edit access.

So, what’s the solution? Unfortunately, there isn’t one yet – at least not one that I’m aware of. However, there are a few workarounds that you can consider:

1. Use a different sharing link type: If you need to generate Edit links by default, you can set the default sharing link type to “Anyone with the Link” or “Specific People.” This will allow users to access the site and its contents without needing explicit permission, but be aware that this may reduce the security of your site.

2. Request explicit permission: If you need to edit content in a site with the default sharing link type set to “People with Existing Access,” you’ll need to request explicit permission from the site owner or an administrator. This can be done by sending a request through the SharePoint interface or by contacting the site owner or administrator directly.

3. Use a third-party solution: There are several third-party solutions available that can help you generate Edit links by default. These solutions typically work by modifying the SharePoint API to allow for customized sharing link types and permissions. However, be aware that these solutions may require additional setup and configuration, and may not be supported by Microsoft.

In conclusion, while the inability to generate Edit links by default in Office 365 Group-based sites and Communication sites can be inconvenient, it’s important to remember that this behavior is designed to provide a secure and controlled environment for collaboration. If you need to edit content in these types of sites, consider using a different sharing link type or requesting explicit permission from the site owner or an administrator.

Unlocking NSX-T VPN IKE-Negotiation Logs

Troubleshooting IPsec Tunnels with NSX-T Edge CLI

When building a cloud with VMware vCloud Director or using NSX-T, you may encounter issues with IPsec tunnels. These tunnels are crucial for secure communication between your environment and other networks, but their negotiation process can be complex and prone to misconfiguration. Unfortunately, the NSX-T UI often provides generic error codes, making it challenging to diagnose the problem. However, the NSX Edge CLI offers more detailed logging options to help you troubleshoot these issues. In this blog post, we will explore how to use the Edge CLI to investigate and resolve IPsec tunnel issues.

Connecting to the Edge

———————-

To start, you need to connect to the Edge via SSH. The easiest way to find the Edge hosting the Service Router of the session you want to troubleshoot is by searching for the session in the NSX-T GUI. Once you have identified the corresponding Tier-1 Gateway, click on the HA mode to view the currently active Edges. Connect as the NSXCLI-User (admin is the default).

Checking the IPsec VPN Service

——————————

Before diving into logging, you should first ensure that the ipsecvpn service is running without any errors. You can check this by using the following command:

“`

show ipsecvpn

“`

This command will display information about all IPsec VPN services on the Edge. If there are any issues, you will see an error message indicating the problem.

Enabling Logging for Specific Sessions

———————————–

To troubleshoot specific sessions, you need to enable logging for those sessions. You can do this by using the following command:

“`

set session-logging enable follow

“`

Replace “ with the ID of the session you want to log. The `follow` key tells the Edge to display the log output directly in the console until you press CTRL+C.

Viewing IKE Negotiation Logs

—————————-

To view the IKE negotiation logs, you can use the following command:

“`

show ike-negotiation follow

“`

Replace “ with the ID of the session you want to log. This command will display the IKE negotiation logs for the specified session in real-time.

Filtering Log Entries

———————

To filter log entries based on specific criteria, you can use the `find` command with the pipe operator (`|`). For example, to view only IKE SA established logs, you can use the following command:

“`

show ike-negotiation follow | find “IKE SA Established”

“`

You can filter by multiple criteria by using multiple `find` commands.

Stopping Logging

——————

To stop logging for a specific session, you can use the following command:

“`

set session-logging disable

“`

Replace “ with the ID of the session you want to stop logging for.

Scraping Metrics with NSX Application Platform

———————————————

If you have installed the NSX Application Platform, you can use its REST API to scrape metrics such as CPU utilization, memory usage, and network traffic. This can help you identify potential issues before they become critical.

Outdated Versions

——————

Please note that this walkthrough is based on an outdated version of NSX-T. For the latest updates, please see the updated version of this post.

Conclusion

———-

Troubleshooting IPsec tunnels with NSX-T Edge CLI can be a complex process, but it provides valuable insights into the negotiation process. By enabling logging for specific sessions and filtering log entries based on criteria, you can identify and resolve issues more efficiently. Additionally, scraping metrics with the NSX Application Platform can help you proactively address potential problems before they impact your environment.

VMware {code} Hackathon

VMware {code} Hackathon: Igniting the Spirit of Innovation and Success

Are you ready to disrupt, innovate, and grow? If your answer is a resounding “yes,” then we have exciting news for you! VMware is announcing the VMware {code} Hackathon competition, where you can join like-minded individuals who share your passion for success. This event is all about harnessing your creativity, ingenuity, and competitive spirit to push the boundaries of what’s possible in the world of technology.

The VMware {code} Hackathon will take place on August 26, and it promises to be an exhilarating experience that will ignite your passion for innovation and success. This competition is open to all go-getters who are eager to showcase their skills, collaborate with others, and have a blast while doing so. Whether you’re a seasoned developer, a tech enthusiast, or someone who’s just looking for a challenge, this hackathon is the perfect opportunity to unleash your full potential.

So, what can you expect from the VMware {code} Hackathon? Here are some highlights:

1. Collaboration: The VMware {code} Hackathon is all about working together with like-minded individuals who share your passion for technology. You’ll have the opportunity to collaborate with other talented developers, designers, and innovators to create something truly amazing.

2. Innovation: The VMware {code} Hackathon is all about pushing the boundaries of what’s possible in the world of technology. Whether you’re working on a new app, a hardware project, or a software solution, this is your chance to showcase your creativity and ingenuity.

3. Fun: Let’s be real – hackathons are all about having fun while creating something amazing! The VMware {code} Hackathon promises to be an exhilarating experience that will leave you energized, inspired, and ready to take on the world.

So, what are you waiting for? It’s time to gear up, get ready, and join the VMware {code} Hackathon competition! This is your chance to showcase your skills, collaborate with others, and have a blast while doing so. Don’t miss out on this incredible opportunity to ignite your competitive spirit, unleash your full potential, and be part of something truly amazing.

To get all the details about the VMware {code} Hackathon, head over to the Broadcom Social Media Advocacy site. There, you’ll find everything you need to know about this exciting event, from the rules and guidelines to the registration process and more. So, what are you waiting for? Sign up now and get ready to ignite your competitive spirit, unleash your full potential, and be part of something truly amazing!

Unlocking the Full Potential of NVMeoF Virtual Volumes with Pure Storage

In today’s fast-paced digital landscape, businesses are constantly seeking ways to optimize their operations and improve performance. For mission critical Oracle applications, ensuring the highest possible performance along with continued application availability is a top priority. This is especially true for Business Critical Oracle Workloads, which have stringent IO requirements that must be met in order to meet demanding business SLAs on VMware.

At Broadcom, we understand the importance of delivering high-performance and highly available solutions for mission critical Oracle applications. Our team of experts has extensive experience in optimizing Oracle workloads on VMware, and we are dedicated to helping our customers achieve their performance goals.

One of the key challenges facing businesses with mission critical Oracle applications is ensuring that they can scale to meet growing demands. As businesses expand and customer needs evolve, it is essential that the underlying infrastructure can keep pace. This is where Broadcom comes in, with a range of solutions designed to help businesses optimize their Oracle workloads and ensure continued application availability.

One such solution is our Virtual Networking software, which enables organizations to build highly scalable and resilient virtual networks that can support even the most demanding Oracle workloads. By leveraging Software-Defined Networking (SDN) technology, businesses can create a flexible and programmable network infrastructure that can adapt to changing demands and ensure optimal performance.

Another solution is our Storage Area Network (SAN) solutions, which are designed to provide the high-performance and highly available storage needed for mission critical Oracle workloads. Our SAN solutions use advanced technologies such as flash storage and cloud-based storage to deliver the fastest possible performance and ensure that applications remain available at all times.

In addition to these solutions, Broadcom also offers a range of services designed to help businesses optimize their Oracle workloads on VMware. These services include consulting and implementation services, as well as ongoing support and maintenance to ensure that your infrastructure continues to perform optimally over time.

At Broadcom, we understand that every business is unique and has its own set of challenges and goals. That’s why we work closely with our customers to understand their specific needs and develop customized solutions that meet their performance requirements. Whether you need help optimizing your virtual networking infrastructure, implementing high-performance storage solutions, or ensuring continued application availability, our team of experts is here to support you every step of the way.

In conclusion, Broadcom is committed to helping businesses achieve their performance goals with mission critical Oracle applications on VMware. With a range of solutions and services designed to optimize performance and ensure continued application availability, we are your one-stop-shop for all your Oracle workload needs. Contact us today to learn more about how we can help you take your business to the next level.

Unleash Your Inner Coding Genius

VMware {code} Hackathon: Igniting the Spark of Innovation

Calling all tech enthusiasts, innovators, and disruptors! VMware is thrilled to announce the {code} Hackathon competition, a platform for like-minded individuals to come together, share ideas, and create something extraordinary. This exciting event will take place on August 26, and we invite you to join us in this journey of innovation and growth.

VMware {code} Hackathon: A Platform for Innovation

The VMware {code} Hackathon is a unique opportunity for individuals to showcase their coding skills, creativity, and problem-solving abilities. This competition will bring together some of the brightest minds in the tech industry, providing a platform for them to collaborate, share ideas, and push the boundaries of what’s possible.

The theme of this year’s hackathon is “Disrupt, Innovate, Grow,” and we encourage participants to think outside the box and come up with innovative solutions to real-world problems. Whether you’re a seasoned developer or just starting out, this event is an excellent opportunity to learn from others, gain exposure, and make valuable connections in the tech community.

VMware {code} Hackathon: What to Expect

The VMware {code} Hackathon will be held on August 26, and it promises to be an exciting and engaging event. Here’s what you can expect:

1. Keynote Speakers: The event will feature keynote speakers who are experts in their respective fields. They will share their insights, experiences, and success stories, providing valuable inspiration and motivation for participants.

2. Hacking Sessions: Participants will have the opportunity to work on their ideas and projects during hacking sessions. These sessions will be facilitated by experienced mentors who will provide guidance and support.

3. Pitching Sessions: At the end of the event, participants will have the chance to showcase their projects and pitch their ideas to a panel of judges. The judges will evaluate the presentations based on criteria such as innovation, feasibility, and impact.

4. Networking Opportunities: The VMware {code} Hackathon is an excellent opportunity to connect with like-minded individuals, potential employers, and industry leaders. Participants can expand their professional network, make new friends, and learn from others.

VMware {code} Hackathon: What’s in it for You?

Participating in the VMware {code} Hackathon offers numerous benefits, including:

1. Exposure: The event will provide exposure to potential employers, investors, and partners, giving participants an opportunity to showcase their skills and talents.

2. Networking Opportunities: Participants can connect with industry leaders, mentors, and other participants, expanding their professional network and potentially opening up new opportunities.

3. Prizes: The winners will receive exciting prizes, including cash awards, VMware swag, and the opportunity to work with VMware on future projects.

4. Learning Opportunities: Participants will have access to mentorship, workshops, and training sessions, providing valuable insights and skills that can help them grow in their careers.

5. Fun: The event promises to be an exciting and engaging experience, with opportunities for participants to collaborate, learn from others, and showcase their talents.

VMware {code} Hackathon: Register Now!

Ready to ignite your competitive spirit and showcase your skills? Registration for the VMware {code} Hackathon is now open! To secure your spot, simply visit the VMware {code} Hackathon website and sign up. Don’t miss this opportunity to be part of something extraordinary – register now and join us on August 26 for an unforgettable experience!

In conclusion, the VMware {code} Hackathon is an excellent opportunity for individuals to showcase their coding skills, creativity, and problem-solving abilities. With keynote speakers, hacking sessions, pitching sessions, and networking opportunities, this event promises to be an exciting and engaging experience. So, register now and join us on August 26 for a day of innovation, collaboration, and growth!