UK Regulators Investigate Digital Wallets Offered by Big Tech Companies

The Rise of Digital Wallets: Opportunities and Risks for Consumers

In recent years, the use of digital wallets has been on the rise, with major tech companies like Apple, Google, and PayPal offering their own digital payment systems. This shift towards digital payments has brought both opportunities and risks for consumers. In response to this trend, British regulators are now taking a closer look at the impact of digital wallets on competition, consumer protection, and market integrity.

According to a report by Reuters, the Financial Conduct Authority (FCA) and Payments Systems Regulator (PSR) have requested statements from major tech companies and other stakeholders to assess the benefits and risks of digital wallets. The regulators are seeking to understand how digital wallets are affecting competition and consumer choice in the payment market, as well as their potential impact on financial crime and security.

The rise of digital wallets has made them an increasingly important touchpoint between major tech companies and British consumers, with more than half of adults in the United Kingdom now using digital wallets. While digital wallets offer exciting possibilities for convenient and contactless payments, they also bring risks such as security breaches and fraud.

In response to these developments, the regulators are seeking to maximize the opportunities while protecting consumers from potential risks. The FCA and PSR’s review of digital wallets builds on earlier investigations into contactless mobile payments and the role of big tech companies in financial services. In the first quarter of 2025, the regulators plan to provide an update on big tech and digital wallets.

The use of digital wallets has become increasingly widespread, with major tech companies like Apple, Google, and PayPal offering their own payment systems. While these digital wallets offer convenient and contactless payments, they also bring risks such as security breaches and fraud. In response to these developments, British regulators are now taking a closer look at the impact of digital wallets on competition, consumer protection, and market integrity.

The regulators have requested statements from major tech companies and other stakeholders to assess the benefits and risks of digital wallets. The review will examine how digital wallets are affecting competition and consumer choice in the payment market, as well as their potential impact on financial crime and security.

The rise of digital wallets has made them an increasingly important touchpoint between major tech companies and British consumers, with more than half of adults in the United Kingdom now using digital wallets. While digital wallets offer exciting possibilities for convenient and contactless payments, they also bring risks such as security breaches and fraud.

In response to these developments, the regulators are seeking to maximize the opportunities while protecting consumers from potential risks. The FCA and PSR’s review of digital wallets builds on earlier investigations into contactless mobile payments and the role of big tech companies in financial services. In the first quarter of 2025, the regulators plan to provide an update on big tech and digital wallets.

Overall, the rise of digital wallets presents both opportunities and risks for consumers. As the use of these payment systems continues to grow, it is essential that regulators remain vigilant in protecting consumers from potential risks while also maximizing the benefits of this technology.

Autofill Catastrophe

Urgent Assistance Required: Outlook’s Mysterious Email Address Connectivity Issue

As I sit here, typing away in my Medici-cal provider’s email system, I am faced with an extremely vexing situation. Despite my best efforts to rectify the issue, I have been unable to resolve a bizarre connectivity problem that has caused me to send sensitive medical information to the wrong person!

The peculiarity began when I noticed that Outlook had somehow connected an email address to a person, and another email address to the entry. To my dismay, there were no entries in the address book to aid in tracking down and correcting this problem. The situation became even more perplexing when I realized that I was unable to edit any entries in the address book to resolve the issue.

To illustrate the extent of the problem, let me provide an example. When I type in the email address “email address removed for privacy reasons” in the To: field, it automatically populates with the email address “email address removed for privacy reasons” in larger font, followed by the original email address in smaller font below it! This occurs even when I do not select the autofill dropdown option. As a result, I have unintentionally sent sensitive medical information to the wrong person.

I have tried every possible solution to rectify this issue, but to no avail. The lack of entries in the address book has made it impossible for me to identify and correct the problem. I am at a loss as to how to proceed, and my frustration is mounting with each passing moment.

I implore anyone who may be able to provide assistance to do so as soon as possible. The sensitive medical information that has been sent to the wrong person could have devastating consequences if not handled properly. I am counting on your expertise to help me resolve this urgent matter before it escalates into a full-blown crisis.

Thank you for taking the time to read my plea for assistance. I eagerly await your response and the much-needed resolution to this bizarre Outlook connectivity issue.

Streamlining IT Operations with XaaS and vRealize Automation Cloud

Setting up XaaS with vRealize Automation Cloud

VMware vRealize Automation Cloud (vRA Cloud) is a powerful cloud management platform that enables organizations to automate the provisioning and management of their IT resources. One of the key benefits of vRA Cloud is its ability to support a wide range of use cases, including XaaS (Anything as a Service). In this blog post, we will explore how to set up XaaS with vRA Cloud, and discuss some of the benefits and considerations for implementing this solution.

Understanding XaaS

——————

XaaS is a cloud computing model in which any IT resource or service can be provisioned and consumed on demand. This includes infrastructure resources such as compute, storage, and network, as well as software applications and services. XaaS provides organizations with the flexibility to consume only the resources they need, when they need them, and to scale up or down as required.

Setting up XaaS with vRA Cloud

—————————–

To set up XaaS with vRA Cloud, organizations can follow these steps:

1. Deploy vRA Cloud: The first step is to deploy vRA Cloud in your environment. This can be done using the vRA Cloud installer, which is available on the VMware website.

2. Configure vRA Cloud: Once vRA Cloud is deployed, organizations need to configure it to support XaaS. This includes setting up the vRA Cloud management plane, configuring the infrastructure resources, and defining the XaaS offerings.

3. Define XaaS offerings: Organizations need to define the XaaS offerings they want to provide to their users. This can include a range of resources such as compute, storage, network, and software applications.

4. Create catalog items: Once the XaaS offerings are defined, organizations need to create catalog items in vRA Cloud that describe the resources and services being offered. These catalog items should include information such as the resource type, the amount of resources required, and any prerequisites or dependencies.

5. Assign quota: To ensure that users can only consume the resources they are entitled to, organizations need to assign a quota to each user or group. This quota can be based on a variety of factors such as the user’s role, their department, or their job function.

6. Implement billing and chargeback: To track usage and allocate costs, organizations need to implement billing and chargeback in vRA Cloud. This can be done using third-party tools or by integrating with existing billing systems.

7. Monitor and optimize: Finally, organizations need to monitor their XaaS environment and optimize it as needed. This includes monitoring usage patterns, identifying areas for improvement, and making adjustments to the XaaS offerings as required.

Benefits of XaaS with vRA Cloud

—————————–

Implementing XaaS with vRA Cloud offers a range of benefits to organizations, including:

1. Agility: With XaaS, organizations can quickly and easily provision the resources they need, when they need them. This improves agility and enables organizations to respond more rapidly to changing business requirements.

2. Flexibility: XaaS provides organizations with a wide range of resources and services that can be consumed on demand. This flexibility allows organizations to scale up or down as needed, and to consume only the resources they need.

3. Cost savings: By providing a pay-as-you-go model for IT resources and services, XaaS can help organizations reduce their costs by eliminating the need for upfront capital expenditures and ongoing maintenance costs.

4. Improved user experience: With XaaS, users can easily consume the resources they need, when they need them. This improves the overall user experience and enables organizations to deliver a more agile and responsive IT environment.

Considerations for XaaS with vRA Cloud

———————————–

While implementing XaaS with vRA Cloud offers many benefits, there are also some considerations that organizations should be aware of, including:

1. Security: With XaaS, organizations need to ensure that their resources and services are secure and protected from unauthorized access. This includes implementing strong authentication and authorization controls, as well as encrypting data in transit and at rest.

2. Compliance: Organizations need to ensure that their XaaS environment is compliant with relevant regulations and standards, such as HIPAA or PCI-DSS. This includes implementing controls to protect sensitive data, and ensuring that the XaaS environment is auditable and traceable.

3. Integration: XaaS should be integrated with existing systems and processes, including IT service management tools, configuration management databases, and change management processes. This enables organizations to manage their XaaS environment as part of their overall IT operations.

4. Scalability: As the demand for resources and services increases, organizations need to ensure that their XaaS environment can scale to meet those demands. This includes implementing a scalable infrastructure, as well as using automation and orchestration tools to streamline provisioning and management processes.

Conclusion

———-

Setting up XaaS with vRA Cloud provides organizations with a powerful cloud management platform that enables them to automate the provisioning and management of their IT resources and services. By following these steps, organizations can implement XaaS and enjoy the many benefits it offers, including agility, flexibility, cost savings, and improved user experience. However, there are also some considerations that organizations should be aware of, such as security, compliance, integration, and scalability.

Thuringian State Media Agency Uses AI to Identify Hate Speech Online

Die Kampf gegen Hassrede im Internet: Eine Herausforderung für die Thüringer Landesmedienanstalt

In recent years, the proliferation of hate speech online has become a significant challenge for law enforcement agencies and media authorities. In Thuringia, the Thüringer Landesmedienanstalt (TLM) has been actively combating hate speech through the use of artificial intelligence (AI) tools. Despite the successes achieved so far, the TLM faces numerous challenges in its efforts to eradicate hate speech from the internet.

The TLM’s Use of AI

In May 2021, the TLM introduced an AI-powered tool called “Kivi” to facilitate cooperation with other state media authorities and accelerate the exchange with the Federal Criminal Police Office (BKA) and the State Criminal Police Office (LKA). Kivi supports the TLM in identifying and reporting hate speech online, thereby reducing the need for manual research by the media authority. According to a spokesperson for the TLM, “Kivi helps us so that we no longer have to constantly search the internet ourselves. Our goal is to remove strafbrechende contents from the net as quickly as possible.”

The Results of the TLM’s Efforts

Between May 2021 and February 2024, the TLM received 235 reports of hate speech, including Nazi slogans, Volksverhetzung (incitement to hatred), and other strafbrechende (criminal) content. The majority of these reports were related to Facebook, with almost 90% of the reported content being removed by the platform after the TLM submitted deletion requests. In addition, Kivi can also involve the Landeskriminalamt (LKA) in the criminal prosecution of such content.

Challenges Faced by the TLM

Despite the successes achieved so far, the TLM faces significant challenges in its efforts to combat hate speech online. Not all platforms respond to deletion requests, and some platforms, such as VK and Telegram, do not remove reported content at all. This means that the TLM must continue to monitor the internet manually to identify and report hate speech. Moreover, the sheer volume of content to be reviewed is overwhelming, with Kivi currently able to analyze more than 10,000 pages per day for problematic content.

The Importance of Collaboration

To effectively combat hate speech online, collaboration between law enforcement agencies, media authorities, and social media platforms is crucial. The TLM’s use of Kivi has shown that AI-powered tools can be valuable in identifying and reporting strafbrechende content. However, the success of such efforts depends on the willingness of social media platforms to cooperate and remove reported content.

Conclusion

Combating hate speech online is a complex and ongoing challenge for law enforcement agencies and media authorities. The TLM’s use of Kivi has shown that AI-powered tools can be effective in identifying and reporting strafbrechende content. However, the success of such efforts depends on the willingness of social media platforms to cooperate and remove reported content. Collaboration between all parties involved is crucial to eradicate hate speech from the internet.

Understanding and Resolving QUICKBBOOKS Error UEXP

Troubleshooting QUICKBBOOKS Error UEXP: A Comprehensive Guide

If you’re reading this, chances are you’ve encountered the infamous QUICKBBOOKS error UEXP while trying to update your payroll or other QUICKBBOOKS components. Don’t worry; we’ve got you covered! In this article, we’ll delve into the common causes of this error and provide step-by-step troubleshooting steps to help you resolve the issue quickly and efficiently.

Causes of QUICKBBOOKS Error UEXP

——————————-

Before we dive into the troubleshooting process, it’s essential to understand the common causes of the UEXP error. Here are some possible reasons why you might be encountering this issue:

### 1. Internet Connection Issues

One of the most common reasons for the UEXP error is an unstable or slow internet connection. When updating QUICKBBOOKS components, a stable internet connection is crucial to ensure a smooth and successful update process. Check your internet connection and ensure it’s working properly before proceeding with any troubleshooting steps.

### 2. Outdated QUICKBBOOKS Installation

Another possible cause of the UEXP error is an outdated QUICKBBOOKS installation. If you haven’t updated your QUICKBBOOKS software in a while, it may be causing conflicts with other system components, leading to the UEXP error. To resolve this issue, ensure that your QUICKBBOOKS software is up-to-date and functioning correctly.

### 3. Firewall and Security Settings

In some cases, firewall and security settings can interfere with the update process, leading to the UEXP error. Make sure that your firewall and security settings are configured correctly and allow for QUICKBBOOKS updates.

### 4. System Date and Time Settings

Another common cause of the UEXP error is incorrect system date and time settings. Ensure that your system clock is accurate and set to the correct date and time.

Troubleshooting Steps for QUICKBBOOKS Error UEXP

———————————————

Now that you know some possible causes of the UEXP error, let’s dive into the troubleshooting steps to resolve this issue:

### Step 1: Check Internet Connection

As mentioned earlier, an unstable internet connection can cause the UEXP error. Ensure that your internet connection is stable and working properly before proceeding with any further troubleshooting steps.

### Step 2: Update QUICKBBOOKS Installation

If you haven’t updated your QUICKBBOOKS installation in a while, it may be causing the UEXP error. To update your QUICKBBOOKS software, go to the QUICKBBOOKS website and download the latest version of the software. Install the new version over the existing one to resolve any conflicts or issues.

### Step 3: Configure Firewall and Security Settings

If you suspect that your firewall and security settings are interfering with the update process, follow these steps:

1. Open the QUICKBBOOKS software.

2. Go to the “Tools” menu and select “Options.”

3. Click on the “Security” tab and ensure that the “Enable Firewall Exceptions” option is selected.

4. Click on the “Advanced” button and ensure that the “Allow QUICKBBOOKS to access the internet” option is selected.

5. Save your changes and try updating your QUICKBBOOKS components again.

### Step 4: Verify and Repair QUICKBBOOKS Installation

If you’ve tried the above troubleshooting steps and the UEXP error persists, it’s possible that there’s a problem with your QUICKBBOOKS installation. To verify and repair your QUICKBBOOKS installation, follow these steps:

1. Open the QUICKBBOOKS software.

2. Go to the “Tools” menu and select “Options.”

3. Click on the “Advanced” tab and select “Verify Integrity of Data” or “Repair Damaged Files.”

4. Follow the on-screen instructions to complete the verification or repair process.

5. Once the process is complete, try updating your QUICKBBOOKS components again.

### Step 5: Use QUICKBBOOKS Tool Hub

If none of the above troubleshooting steps resolve the UEXP error, you can use the QUICKBBOOKS Tool Hub to help diagnose and fix any issues with your QUICKBBOOKS installation. The Tool Hub provides a range of tools and utilities to help you troubleshoot and resolve any problems you may be experiencing with your QUICKBBOOKS software.

Conclusion

———-

In this article, we’ve covered the common causes of the QUICKBBOOKS error UEXP and provided step-by-step troubleshooting steps to help you resolve the issue quickly and efficiently. Remember that updating your QUICKBBOOKS components is essential to ensure that your software is functioning correctly and securely. If none of the above troubleshooting steps resolve the UEXP error, consider contacting QUICKBBOOKS support for further assistance or consult their community forums for additional troubleshooting steps.

HyperConverged Infrastructure Is Now Just A Click Away

Hyperconverged Infrastructure: Has the Buzz Faded Away?

In recent years, hyperconverged infrastructure (HCI) has been a hot topic in the tech industry, with many companies hailing it as the future of data center architecture. However, as time has passed, the buzz around HCI seems to have faded away. So, what’s the current state of HCI and is it still relevant?

The Rise of HCI

HCI emerged as a response to the limitations of traditional three-tier data center architectures, which often resulted in complex, expensive, and inflexible systems. HCI collapsed these tiers into a single, software-defined layer, offering a more streamlined, efficient, and cost-effective approach to data center management. This simplified architecture also enabled greater agility and faster deployment of new services.

The initial excitement around HCI was fueled by the promise of easier management, improved scalability, and increased resource utilization. Many early adopters saw significant benefits, such as reduced administrative burdens, better performance, and lower costs. As a result, the market for HCI grew rapidly, with numerous vendors entering the space and offering a wide range of products and solutions.

The Current State of HCI

Despite its initial success, the buzz around HCI has largely faded away in recent times. Some have argued that HCI has reached a plateau, with little room for further growth or innovation. However, this is not entirely accurate. While the hype may have died down, HCI continues to be a viable and valuable solution for many organizations.

One of the main reasons for the decrease in buzz is that HCI has become more mainstream. As the technology has matured and become more widely adopted, it has lost some of its novelty and appeal. Additionally, as the market for HCI has grown, so too have the number of vendors and solutions, which can make it harder to stand out and generate excitement.

Another reason for the decrease in buzz is that some organizations have encountered challenges with HCI. While the technology offers many benefits, it can also be complex and difficult to implement, particularly for those without prior experience. Furthermore, some vendors have struggled to deliver on their promises, leading to disappointment and skepticism among potential adopters.

The Future of HCI

Despite the decrease in buzz, HCI remains a relevant and valuable solution for many organizations. In fact, Gartner predicts that HCI will continue to grow at an annual rate of over 30% through 2023, with adoption extending beyond traditional use cases such as virtual desktop infrastructure (VDI) and server consolidation.

So, what does the future hold for HCI? One area of potential growth is in the realm of edge computing, where HCI can provide a more cost-effective and efficient alternative to traditional data center architectures. Additionally, as the IoT continues to expand, HCI can play a crucial role in managing and processing the vast amounts of data generated by these devices.

Another area of potential growth is in the development of hybrid and multi-cloud strategies. As more organizations adopt cloud computing, they will need solutions that can help them manage and integrate their on-premises infrastructure with their cloud environments. HCI can provide a seamless and efficient way to do this, while also enabling greater agility and flexibility.

Conclusion

While the buzz around HCI may have faded away, the technology remains a relevant and valuable solution for many organizations. As the market continues to grow and mature, we can expect to see new innovations and use cases emerge, particularly in the areas of edge computing and hybrid cloud strategies. For those considering HCI, it’s important to do your research, evaluate your needs, and carefully assess the various vendors and solutions available to ensure the best fit for your organization.

A Boulevard of Memories

The Birth of the Internet in Germany: EUnet and the TU Dortmund Campus Nord

On Friday, a significant event will take place at the Campus Nord of the Technical University (TU) in Dortmund, Germany. The university will be renaming a section of roadway to “EUnet-Allee,” commemorating the origins of the internet in Germany. This event is not only a celebration of the past but also a reminder of the pioneering spirit that has driven the development of technology.

The EUnet project, launched in 1982 by the European Unix User Group, was one of the earliest attempts to create a network of computers in Germany. The project was founded by four computer scientists: Daniel Karrenberg, Axel Pawlik, Rudolf Peter, and Rüdiger Volk. They aimed to connect universities and research institutions across the country, enabling the exchange of information and laying the groundwork for what would become the global internet.

The TU Dortmund played a crucial role in this effort, hosting one of the first EUnet nodes and providing a hub for the growing network. The university’s involvement in EUnet was not limited to providing infrastructure, however. The faculty of computer science at the TU Dortmund was actively involved in the development of the internet, with researchers contributing to the creation of protocols and technologies that would shape the future of online communication.

One notable example of this innovation was the EUnet Skulptur, a sculpture created by one of the project’s founders, Daniel Karrenberg. This sculpture, which will be unveiled during the renaming ceremony on Friday, serves as a reminder of the pioneering work done at the TU Dortmund and the EUnet project. It is a testament to the ingenuity and determination of the individuals involved in creating the internet and the impact their efforts have had on society.

The EUnet Allee is not just a physical reminder of the past but also a symbol of the future. It represents the potential for innovation and collaboration that exists within the TU Dortmund and the broader community. The event on Friday will bring together alumni, researchers, and industry professionals to celebrate the achievements of the past and look towards the future.

As we reflect on the origins of the internet in Germany, it is important to remember the challenges and controversies that surrounded its development. Debates around privacy, security, and the role of government in regulating the internet were just as prevalent then as they are today. However, despite these challenges, the internet has grown and evolved into a powerful tool for communication, innovation, and collaboration.

The EUnet Allee is more than just a roadway; it is a symbol of the power of human ingenuity and the potential for technology to shape our future. As we move forward, it is essential that we continue to support and celebrate the pioneering spirit that has driven the development of the internet and other technologies. The EUnet Allee serves as a reminder of where we have come from and an inspiration for where we can go next.

Preserving Application Licensing Settings

Sure, here is a new blog post of at least 500 words based on the given information:

When migrating away from roaming profiles and folder redirection to FSLogix, one issue that may arise is the persistence of registry settings. In particular, the “HKEY_LOCAL_MACHINE\SOFTWARE\VanDyke\SecureCRT\License” registry hive may not persist after switching to FSLogix. This can be a problem if you have software that relies on these settings, as they will not be available when the user logs in to their Horizon non-persistent desktop.

The reason for this issue is that FSLogix uses a different mechanism for storing user data than roaming profiles and folder redirection. With roaming profiles, user data was stored in a central location on the network, and all users had access to the same data. This allowed for easy sharing of settings and data between users. However, this approach has some limitations, such as the inability to easily manage individual user settings and the potential for conflicts between different users’ data.

In contrast, FSLogix uses a per-user storage model, where each user’s data is stored separately from other users’. This allows for more granular control over user settings and easier management of user data. However, this also means that registry settings that were previously stored in the central location will not be automatically persisted across logons.

So how can you ensure that the “HKEY_LOCAL_MACHINE\SOFTWARE\VanDyke\SecureCRT\License” registry hive and other important registry settings persist after switching to FSLogix? There are a few options you can consider:

One option is to use Group Policy Objects (GPOs) to set the default settings for your users. GPOs allow you to centrally manage user settings and apply them to all users or specific groups of users. You can use GPOs to set the registry settings that you want to persist across logons, such as the “HKEY_LOCAL_MACHINE\SOFTWARE\VanDyke\SecureCRT\License” hive. This will ensure that all users have the same settings and that the settings are applied consistently across your environment.

Another option is to use FSLogix’s built-in persistence feature. FSLogix provides a feature called “Persistent Settings” that allows you to persist registry settings and other user data across logons. To use this feature, you will need to create a new GPO and link it to your FSLogix environment. Then, you can use the GPO to set the registry settings that you want to persist.

A third option is to use a third-party tool to manage and persist registry settings. There are several tools available that can help you manage and persist registry settings, such as the VanDyke Software License Manager. These tools can help you ensure that the “HKEY_LOCAL_MACHINE\SOFTWARE\VanDyke\SecureCRT\License” hive and other important registry settings are persisted across logons.

In conclusion, when migrating away from roaming profiles and folder redirection to FSLogix, it is important to ensure that important registry settings persist across logons. There are several options available for achieving this, including using GPOs, FSLogix’s built-in persistence feature, or third-party tools. By selecting the option that best fits your needs and requirements, you can ensure that your users have access to the registry settings they need, even after logging in to their Horizon non-persistent desktop.

Unlocking the Power of AD Authentication with vIDM API

Automating VMware Workspace One Access with Active Directory Authentication

In this blog post, we will explore how to automate VMware Workspace One Access using Active Directory authentication. We will use Thunder Client, a free extension for Visual Studio Code, to test the API calls and demonstrate how to set up an OAuth client application in VIDM using local System domain credentials.

Step 1: Get a VIDM Session Token

To start, we need to get a session token from VIDM. We can do this by sending a GET request to the following API path:

“`

https:///api/session

“`

We will use the username and password of a System domain VIDM account, for simplicity, we can use the configadmin credential. The request should have the following headers:

* Accept: application/json

* Content-Type: application/json

The body of the request should be empty. The response will contain the session token, which we will use to create the OAuth client application.

Step 2: Create the OAuth Client

Now that we have the session token, we can create the OAuth client application. We will send a POST request to the following API path:

“`

https:///api/oidc/clients

“`

The headers for this request should include:

* Accept: application/json

* Content-Type: application/json

The body of the request should be in JSON format and contain the following fields:

* client_id: A unique identifier for the OAuth client (optional)

* client_secret: A secret key used to authenticate the OAuth client (optional)

* name: The display name of the OAuth client

* description: A brief description of the OAuth client

After submitting the request, we will get a ‘201 Created’ response, which contains the information entered and the API path to the new OAuth client.

Step 3: Get the VIDM Access Token

Now that we have created the OAuth client, we can use it to get an access token to make regular API calls. We will send a POST request to the following API path:

“`

https:///api/oidc/token

“`

The headers for this request should include:

* Accept: application/json

* Content-Type: application/x-www-form-urlencoded

The body of the request should be in URL-encoded format and contain the following fields:

* grant_type: The type of grant (in this case, client credentials)

* client_id: The ID of the OAuth client created in step 2

* client_secret: The secret key of the OAuth client created in step 2

* username: The Active Directory username and password to use for authentication

* password: The Active Directory password for the specified username

The response will contain the access token, which we can use to authenticate our API calls.

Step 4: Get AD Users

Now that we have the access token, we can make regular API calls to retrieve data from VIDM. For example, we can get all the users in VIDM by sending a GET request to the following API path:

“`

https:///api/user

“`

The headers for this request should include:

* Accept: application/json

* Content-Type: application/json

The body of the request should be empty. The response will contain an array of users, each with their own set of attributes.

Conclusion

In this blog post, we have demonstrated how to automate VMware Workspace One Access using Active Directory authentication. We have shown how to set up an OAuth client application in VIDM using local System domain credentials and how to use the access token to make regular API calls. This can be useful for Enterprise solutions that require secure service accounts for automation processes.

Hopefully, this blog post has been helpful to some of you who are looking to perform some VIDM API operations to support your Automation solution. Until next time… keep it real, don’t get lazy with AI my friends!

Unlock the Full Potential of Cloud Management

Unlocking the Business and Financial Value of Cloud Management Tools

In today’s fast-paced digital landscape, businesses are increasingly adopting cloud computing to stay agile, responsive, and competitive. However, managing a cloud infrastructure can be complex and time-consuming, leading many organizations to invest in cloud management tools. But what exactly is the business and financial value of these tools?

On September 17, VMware is hosting a free webinar featuring Forrester, a leading research and advisory firm, to explore this very question. The webinar will delve into the benefits and returns on investment (ROI) that organizations can expect from using cloud management tools.

So, what are the key business and financial benefits of investing in cloud management tools? Here are some insights:

1. Improved Efficiency and Productivity

Cloud management tools help automate many of the mundane and time-consuming tasks associated with managing a cloud infrastructure. This frees up IT staff to focus on more strategic and high-value activities, leading to improved efficiency and productivity. Forrester research suggests that organizations can achieve an average cost savings of $1.7 million per year by automating cloud management processes.

2. Enhanced Security and Compliance

Cloud management tools provide a centralized view of the cloud infrastructure, enabling IT teams to monitor and manage security and compliance more effectively. This can help prevent security breaches and reduce the risk of non-compliance, which can be costly and damaging to an organization’s reputation. Forrester estimates that the average cost of a data breach is around $3.86 million.

3. Better Resource Utilization

Cloud management tools help optimize resource utilization, reducing the amount of underutilized resources and wasted costs. According to Forrester, organizations can achieve an average cost savings of $1.3 million per year by optimizing resource utilization in the cloud.

4. Scalability and Agility

Cloud management tools enable organizations to scale their cloud infrastructure up or down as needed, providing the agility to respond quickly to changing business demands. This can help organizations gain a competitive advantage and increase revenue. Forrester research suggests that organizations that invest in cloud computing can experience a 26% increase in revenue growth.

5. Improved Customer Experience

Cloud management tools can help organizations deliver better customer experiences by providing faster access to applications and data, as well as enabling more personalized and responsive services. Forrester estimates that every $1 invested in cloud computing can lead to a $3 return in terms of customer experience improvements.

In conclusion, investing in cloud management tools can provide significant business and financial benefits for organizations. From improved efficiency and productivity to enhanced security and compliance, better resource utilization, scalability, and improved customer experience, the returns on investment can be substantial.

If you’re curious about the business and financial value of an investment in cloud management tools, join VMware’s free webinar featuring Forrester on September 17. You’ll gain valuable insights into the benefits and ROI of these tools, as well as practical advice for implementing them in your organization. Don’t miss out – register now!