Google Kicked Out of School in Denmark
August 11, 2022
Like its colleagues in Netherlands and Germany, the Denmark data protection authority has taken a stand against Google’s GDPR non-compliance. European secure-email firm Tutanota reports on its blog, “Denmark Bans Gmail and Co from Schools Due to Privacy Concerns.” Schools in the Helsingør Municipality have until August 3 to shift to a different cloud solution. We learn:
“In a statement published mid July, the Danish data protection agency expresses ‘serious criticism and bans … the use of Google Workspace’. Based on a risk assessment for the Helsingør Municipality, the data protection authority concluded that the processing of personal data of pupils does not meet the requirements of the GDPR and must, therefor, stop. The ban is effective immediately. Helsingør has until August 3 to delete pupil’s data and start using an alternative cloud solution. … This decision follows similar decisions by Dutch and German authorities. The issues that governmental institutions see themselves faced with has started with the invalidation of Privacy Shield back in 2020. Privacy Shield has been a data transferring agreement between the USA and the European Union and was supposed to make data transfers between the two legally possible. However, the agreement has been declared invalid by the European Court of Justice (ECJ) in 2020 due to privacy concerns. One major problem that the EU court pointed out is that data of foreigners is not protected in the USA. The protections that are there – even if limited – only apply to US citizens.”
So the NSA can gain unfettered access to the personal data of Europeans but not US citizens. We can see how authorities in the EU might have a problem with that. As the Danish agency notes, such a loophole violates rights considered fundamental in Europe. Not surprisingly, this Tutanota write-up emphasizes the advantages of a Europe-based email service like Tutanota. It is not wrong. It seems Denmark has woken up to the Google reality. Now what about Web-search tracking?
Cynthia Murrell, August 11, 2022
How about a Decade of Vulnerability? Great for Bad Actors
August 10, 2022
IT departments may be tired of dealing with vulnerabilities associated with Log4j, revealed late last year, but it looks like the problem will not die down any time soon. The Register reveals, “Homeland Security Warns: Expect Log4j Risks for ‘a Decade or Longer’.” Because the open-source tool is so popular, it can be difficult to track down and secure all instances of its use within an organization. Reporter Jessica Lyons Hardcastle tell us:
“Organizations can expect risks associated with Log4j vulnerabilities for ‘a decade or longer,’ according to the US Department of Homeland Security. The DHS’ Cyber Safety Review Board‘s inaugural report [PDF] dives into the now-notorious vulnerabilities discovered late last year in the Java world’s open-source logging library. The bugs proved to be a boon for cybercriminals as Log4j is so widely used, including in cloud services and enterprise applications. And because of this, miscreants soon began exploiting the flaws for all kinds of illicit activities including installing coin miners, stealing credentials and data, and deploying ransomware.”
Fortunately, no significant attacks on critical infrastructure systems have been found. Yet. The write-up continues:
“‘ICS operators rarely know what software is running on their XIoT devices, let alone know if there are instances of Log4j that can be exploited,’ Thomas Pace, a former Department of Energy cybersecurity lead and current CEO of NetRise, told The Register. NetRise bills itself as an ‘extended IoT’ (xIoT) security firm. ‘Just because these attacks have not been detected does not mean that they haven’t happened,’ Pace continued. ‘We know for a fact that threat actors are exploiting known vulnerabilities across industries. Critical infrastructure is no different.'”
Security teams have already put in long hours addressing the Log4j vulnerabilities, often forced to neglect other concerns. We are told one unspecified US cabinet department has spent some 33,000 hours guarding its own networks, and the DHS board sees no end in sight. The report classifies Log4j as an “endemic vulnerability” that could persist for 10 years or more. That is a long time for one cyber misstep to potentially trip up so many organizations. See the article for suggestions on securing systems that use Log4j and other open-source software.
Cynthia Murrell, August 10, 2022
Microsoft Teams: The Disconnect between Users and Features
August 5, 2022
I have mentioned that “free” Microsoft Teams does not work on my Mac Mini which I use for Facetime, Zoom, and WebEx meetings. The Massachusetts Attorney General knows about my problems first hand. Let’s just say that there were fewer than 30 investigators who recognized that Microsoft and Apple are not exactly in sync.
I read “Microsoft Says It Added More Than 450 New Teams Capabilities in the Past Year.” In the past year, there have been some issues with Windows updates killing printers and a few trivial security gaffes. Hey, who is trying to make a league table of Microsoft software vulnerabilities? Not me.
The write up states:
officials also updated investors on Teams momentum a bit, saying they’ve added more than 450 capabilities over the past year.
Among the technological gems added, according to the write up, were in the words of the write up, “It is unclear what “Teams capabilities” means, but that can cover things across chat, meetings, integrations with Microsoft Viva, and a lot more.”
Okay, unclear. I did a quick search on Swisscows.com for Microsoft Teams features. Here are a few of the precious stones presented to me:
- Adjust filter brightness
- Background blur
- A horizontal participant gallery
- A customer lockbox
- Day view in calendar
- Anonymous meeting join across clouds
And more than 440 more important additions.
My view is very simple. Why not get Teams to work for those who are using Mac Minis? You know. Basic functional reliability. Microsoft Teams, like Zoom, is essentially a telephone call, right? And why not get that printer thing fixed? And security? I think that particular issue is unfixable. Sorry but that’s just my opinion, not a PowerPoint about Microsoft’s security capabilities. PowerPoints are easy. Delivering what customers and users want is much more difficult.
Do the MSFT priorities pursue the trivial, not the substantive?
Stephen E Arnold, August 5, 2022
Salesforce, Alibaba, and China: Is an Enterprise Superapp the Goal?
August 4, 2022
I read an announcement about a tie up among Salesforce, Alibaba, and whoever is over-seeing the high profile online outfit. “Salesforce Shutters Hong Kong Office, Leans on Alibaba in China” reports:
As a result of its tightened partnership with Alibaba, Salesforce is “optimizing our business structure to better serve the Greater China Region” and “opening new roles while eliminating some others,” the spokesperson said. The company’s career page shows it’s currently hiring a product management director and a senior software engineer in the southern Chinese city Guangzhou, where it placed its tech team.
The cited article points out:
Salesforce’s interest in China lies in serving international businesses localizing in China, but it can’t do it alone due to the country’s intricate regulatory restrictions.
What will Alibaba do?
Alibaba will be taking over the firm’s sales in mainland China and Hong Kong, while Taiwan will fall under the management of its Singapore office…
Several observations:
- Like Oracle, Salesforce is taking steps to make sure it is able to operate in some acceptable way in China
- The technology for these deals is probably sealed in a quantum secure container so that “partners” are unable to learn what’s in the black boxes. (Well, that’s the hope?)
- China faces some challenges, and it is possible that Alibaba’s overseers could make helpful suggestions which make this tie up less or completely unattractive.
What happens if Alibaba integrates Salesforce functionality into its apps and services? Will we have a commercial superapp purpose built for China and companies permitted to operate in the Middle Kingdom?
Net net: Nah, just “lean on” and lean in.
Stephen E Arnold, August 4, 2022
Forget Fragile: The Future of Tech Means Failure … Maple Leaf Own Goal
August 4, 2022
Canada presages the future. Syrup, uranium mines, tar sands, and Rogers — The backbone of Canada. Maybe I should not include Rogers in the list after reading “How a Coding Error Caused Rogers Outage That Left Millions Without Service.” I learned:
a coding error was introduced that triggered a cascade of events, resulting in a massive outage that left millions of Canadians without cellphone, internet or home phone service for at least a day. The shutdown of one of Canada’s dominant telecommunications networks created widespread chaos.
Now Rogers is not along with the own goal problem. I noted “Major Microsoft 365 Blackout Raises Tough Questions for Software Giant.” And lest we forget “Google, Oracle Cloud Servers Wilt in UK Heatwave, Take Down Websites.”
I know I have heard presentations in which really rich people have explained that chaos creates opportunities. These people should know. I was an advisor to an individual who had at one point more than $9 billion. (Alas, he has been removed from the hockey game of real life. Maybe a rest home near a lake? I have lost track of the wizard.)
Yep, chaos, disruption, problems that scream for solutions. An investment wonderland, but what about those who simply empty the trash in wonderland?
The future, it appears, rests with individuals who are responsible for a single keystroke. Put the == in the wrong place and one does not output user satisfaction. According to the Rogers’ story, one gets no emergency phone service, no WiFi (pronounced in some parts of Canada wee fee which I love), dead Interac debit machines, and – of course – no phones. (Teens with Rogers mobile services were apparently unhappy.)
And the promised fix?
This Sunday [July 24, 2022], in an open letter to customers, Rogers CEO Tony Staffieri vowed to invest more in testing, oversight and artificial intelligence to improve the reliability of the company’s networks. He put the price tag of the changes at around $10-billion over three years.
Yeah, smart software and oversight. By whom? GenXers and GenYers? Perhaps the tooth fairy?
Several observations:
- The cloud services like Rogers apparently believe their own marketing babble about fail over, redundancy, and uptime. Belief is, as the article makes clear, is not reality in the zippy world of big time telco clouds and services.
- The idea that the best, the brightest, and the smartest technical professionals work tirelessly to keep the service online earned an F as in Failure. No front row seat in the advanced class for these whiz kids.
- The customers who missed tornado warnings, a report about a dangerous person, or what to pick up from Canadian Tire en route to the the campground in Saskatchewan were in the communications dark.
Net net: Big companies forget the statement”
For want of a shoe, the horse was lost. For want of a horse, the rider was lost. For want of a rider, the battle was lost. For want of a battle, the kingdom was lost, And all for the want of a horseshoe nail.
The nail was a single error in a single line of code. Thus, the future: Chaos or opportunity. You choose. I am glad — thrilled, in fact — that I am old and will miss the future. Have fun!
Stephen E Arnold, August 4, 2022
Time Travel in the Datasphere: Lock In Is Here Again
August 3, 2022
“Lock in” was a phrase I associated with my university’s data processing and computer center in 1962. I was a 17 year old freshman, and I got a tour of the school’s state of the art IBM mainframes located in one of the buildings in the heart of the campus. Remember I went to a middling private college because I fooled some scholarship outfit into ponying up money to pay for tuition and books. That still amazes me 60 years later.
I do remember looking at the IBM machines lined up inside a room within a room. A counter separated the “user” from the machines. Another room held three keypunch machines. There was a desk with a sign in sheet and a sign that said, “Help wanted.” Hey, even then it was clear that money was to be had doing the computer thing.
The tour was uneventful. Big machines blinked and hummed. The person giving the tour did not want to explain anything to a small group of students who qualified to enter the digital sanctuary. No problem. I got it. If a person wanted to use a computer, one had to work in the computer center. It was infinitely better to work behind the counter, wear a white lab coat, and stuff the front pocket with pencils. I was in. I even wore a slide rule strapped to my belt like Roy Rogers with a math fetish. Quick log, Stephen was my moniker.
I learned very quickly that using computers was done the IBM way. Don’t bend, fold, spindle, or mutilate. Don’t push buttons on the keyboard unless you knew what that key press did. Don’t think about learning anything about any of the other computing devices. IBM was the way. Why? The funding for the computer center and much of the engineering department came from an outfit engaged in manufacturing equipment to produce big holes in the ground or eliminate pesky trees from the path of the Trans Amazon Highway. The company was an IBM outfit.
Ergo, lock in. My mind was locked into IBM. Even today if someone mentions an MIT LINC, I am quick to snort. Hey, big iron.
Well, lock in is back, and there are many Millennials, GenXers, and whatever other category marketers use to describe young people who don’t know about lock in. Navigate to “A Third of Businesses Feel Locked In to Major Cloud Providers.” The write up explains that lock in is here again:
new research from Civo shows that 34 percent of users feel locked into the services these major providers deliver, with 65 percent of these saying that data transfer costs are too expensive for them to move off their current cloud.
This is the goal of lock in. Switching costs are too high. A lousy economy provides an endless parade of people who think that those low entry fees for the cloud will persist. Then the lucky customers discover the joy of per unit transactional pricing. Now the deal is more expensive than other ways to access computers and software. But to kick the cloud habit, one has to do more than spend a month in rehab. One must reengineer, invest, plan, and be smart enough to actively manage complex systems.
Yep, lock in.
That 33 percent figure may be bogus. But one thing is absolutely certain. More companies will embrace the cloud and find them with me, back in the university’s computer center, learning that there is one way to do computers. What’s amusing is that lock in is here again. Too bad IBM was not able to become the big dog. But the IBM notion of lock in lives on. And for some today, it is a fresh and new as a Rivian truck. There is one difference. That 1962 computer set up was actually pretty reliable. Today’s cloud systems are a work in progress. Choose cloud providers wisely. Digital divorces, like real world divorces, can be messy, expensive, and damaging.
Stephen E Arnold, August 3, 2022
Accidental News: There Is a Google of the Dark Web.
August 2, 2022
Yesterday one of the research team was playing the YouTube version of TWIT which is Silicon Valley acronym speak for “This Week in Tech.” The program is hosted by a former TV personality and features “experts”. The experts discuss major news events. The August 1, 2022 (captured on July 31, 2022) has the title “The Barn Has Left the Horse — CHIPS Act, Earnings Week, FTC Sues Meta, Twitter Blue Price Hike.” The “experts” fielding questions and allegedly insightful observations by Mr. LaPorte can be viewed at this link. The “experts” on the “great panel” for this program included:
- Jason Snell
- Shoshana Weissmann
- Dan Patterson.
In the midst of recycled information and summaries of assorted viewpoints, there was what I thought was information warranting a bit more attention. You can watch and hear what Dan Patterson says at 2:22:30. A bit of context: Mr. Patterson announced that he is the Editorial Director at Cybersixgill, [supplemental links appear below my name at the foot of this blog post] a firm named after a shark and with, until now, a very low profile. I think the outfit is based in Tel Aviv and it, as I recall, provides what I call specialized software and services to government entities. A few other firms in this particular market space are NSO Group and Voyager Labs, among other. Rightly or wrongly, I think of Herliya as the nerve center for certain types of sophisticated intercept, surveillance, analytic, and stealth systems. Thus, “low profile” is necessary. Once the functionality of an NSO Group-type system becomes known, then the knock on effect is to put Candiru-type firms in the spotlight too. (Other fish swimming unseen in the digital ocean have inspired names like “FinFisher,” “Candiru,” and “Sixgill.”)
So what’s the big news? A CBS technology reported quitting is no big deal. A technology reporter who joins a commercial software and services firm is not a headline maker either.
This is, in my opinion, a pretty remarkable assertion, and I think it should be noted. Mr. Patterson was asked by Mr. LaPorte, “So CyberSixgill is a threat intelligence…” Mr. Patterson added some verbal filler with a thank you and some body movement. Then this…
CyberSixgill is like a Google for the Dark Web.
That’s an interesting comparison because outfits like Kagi and Neva emphasize how different they are from Google. Like Facebook, Google appears to on the path to becoming an icon for generating cash, wild and crazy decisions, and an emblem of distrust.
Mr. Patterson then said:
I don’t want to log roll…. I joined the threat detection company because their technology is really interesting. It really mines the Dark Web and provides a portal into it in ways that are really fascinating.
Several observations:
- Mr. Patterson’s simile caught my attention. (I suppose it is better than saying, “My employer is like an old school AT&T surveillance operation in 1941.”
- Mr. Patterson’s obvious discomfort when talking about CyberSixgill indicates that he has not yet crafted the “editorial message” for CyberSixgill.
- With the heightened scrutiny of firm’s with specialized software causing outfits like Citizens Lab in Toronto to vibrate with excitement and the Brennan Center somewhat gleefully making available Voyager Labs’s information, marketing a company like CyberSixgill may be a challenge. These specialized software companies have to be visible to government procurement officers but not too visible to other sectors.
Net net: For specialized software and services firms in Israel, Zurich, Tyson’s Corner, and elsewhere, NSO Group’s visibility puts specialized software and services company on the horns of a dilemma: Visible but not too visible. These companies cannot make PR and marketing missteps. Using the tag line from a “real” journalist’s lips like “a Google for the Dark Web” is to me news which Mr. LaPorte and the other members of the panel should have noticed. They did not. There you go: “Like a Google for the Dark Web”. That’s something of interest to me and perhaps a few other people.
Stephen E Arnold, August 2, 2022
—
Notes:
1 “Sixgill” is the blunt nose “six gill” shark, hexnchoid (Hexanchus griseus). It is big and also called the cow shark by fish aficionados. The shark itself can be eaten.
2 The company’s product is explained at https://www.cybersixgill.com/products/portal/. One “product” is a cloud service which delivers “exclusive access to closed underground sources with the most comprehensive, automated collection from the deep and dark Web. The investigative portal delivers the threat intel security teams need: Real time context and actionable alerts along with the ability to conduct cover investigations.” Mr. Patterson may want to include in his list of work tasks some rewriting of this passage. “Covert investigations,” “closed underground sources,” and “automated collection” attract some attention.
3 The company’s blog provides some interesting information to those interested in specific investigative procedures; for example, “Use Case Blog: Threat Monitoring & Hunting.” I noted the word “hunting.”
4 The company received a fresh injection of funding from CrowdStrike, Elron Ventures, OurCrowd, and Sonae. According to CyberGestion, the firm’s total funding as of May 2022 is about $55 million US.
5 The Dark Web, according to my research team, is getting smaller. Thus, what does “deep web”? The term is undefined on the cited CyberSixgill page. “Like Google” suggests more than 35 billion Web pages in its public index. Is this what CyberSixgill offers?
Facebook Sunset: A Rush to Judgment? Nope. Bus Left Already
July 27, 2022
I read a variation on the Chicken Little story with an infusion of Humpty Dumpty. Sound interesting? Just navigate to “Sunset of the Social Network.” Pretty interesting because this is a Silicon Valley type cheerleading outfit realizing that their outfits don’t match those from the ESPN Cheerleading Championships for 2022. How does one quickly fix a fashion faux pas? Easy. Just claim that social networks are even less trendy than the white pants and red sweaters with Mountain View and Palo Alto logos stitched on the polyester.
So what’s the future? If you haven’t figured it out, the answer is TikTok and recommendations to drive memes, advance fun activities like jumping off roofs, and making wlw videos for middle schoolers. Yep, the future. Why not toss end a couple of references to the Decline and Fall of the Roman Empire?
The write up says:
Under the social network model, which piggybacked on the rise of smartphones to mold billions of users’ digital experiences, keeping up with your friends’ posts served as the hub for everything you might aim to do online. Now Facebook wants to shape your online life around the algorithmically-sorted preferences of millions of strangers around the globe.
On the surface, this seems to be what Zuckbook is trying to achieve. Irritating the Kardashians was a knock on effect.
The write up points out that digital dinobabies are a bit clumsy when snow falls:
Rivals tried and failed to beat Facebook at the social network game — most notably Google, with multiple forgotten efforts from Orkut to Google+.
I haven’t forgotten Orkut. That misstep illustrated a genetic flaw in Google’s DNA. Not only could Google not solve death, it couldn’t solve Facebook nor, more recently, Amazon’s gobbling a very large chunk of product search. (Presumably an able Verity alum will redress that issue with information gene splicing. Well, that’s the theory.
Here’s the passage I quite liked:
But the era in which social networking served as most users’ primary experience of the internet is moving behind us. That holds for Twitter, Facebook’s chief surviving Western rival, as well. Twitter never found a reliable business model, which opened it up to an acquisition bid by Elon Musk. Whatever the outcome of the legal fight now underway, Twitter’s future is cloudy at best. … The leadership of Meta and Facebook now views the entire machine of Facebook’s social network as a legacy operation.
Yowza. The very thing that helped make Silicon Valley punditry the next big thing has moved on. Apparently the email has not yet reached Medium and Substack yet. It has, in my opinion, reached Buzzfeed’s senior team and is probably in the in box of a number of other information outlets. That’s just a guess on my part, however.
And what’s the future? The answer is revealed:
All this leaves a vacuum in the middle — the space of forums, ad-hoc group formation and small communities that first drove excitement around internet adoption in the pre-Facebook era. Facebook’s sunsetting of its own social network could open a new space for innovation on this turf, where relative newcomers like Discord are already beginning to thrive.
News flash!
That era has already arrived, and it is morphing, innovating, and invigorating interesting new mechanisms of informationization. Want an example? Okay, CSAM on Telegram. I address this disturbing activity in my luncheon talk at the upcoming Federal Law Enforcement Training Center talk. The downturn in Dark Web activity illustrates a trend building over the last six years.
Facebook and the Silicon Valley real news folks now realize something has changed. Too late? For some, yes.
Stephen E Arnold, July 27, 2022
How Secure Is Cyber Security?
July 27, 2022
I have noted that cyber security companies invite me to webinars, briefings, conferences, and telephone calls. The subject of these calls is usually advanced, next-generation, proactive, smart, and intelligent cyber security solutions. The idea is that I will mention these firms in my lectures to law enforcement, crime analysts, and intelligence professionals. I sit through some. One outfit offers weekly seven to 10 minute reports about some new, absolutely horrible cyber threat. Others want me to join a Zoom to watch a series of PowerPoint slides showing how the latest Zero Day will make life miserable for companies without their cloud-based security system.
I then read item after item about a new variant of a RAT, an exploit taking advantage of the Swiss cheese of enterprise software, or some new dump of personal financial data on a Dark Web site selling fulz. It seems to me as if the cyber security sector is better at marketing than delivering cyber security. That’s just my opinion, and I usually don’t make a big deal of the veggie burgers being sold as 100 percent prime sirloin.
I read “Digital Security Giant Entrust Breached by Ransomware Gang.” The article does little to make me feel warm and fuzzy about cyber security systems and their vendors. I learned:
Digital security giant Entrust has confirmed that it suffered a cyber attack where threat actors breached their network and stole data from internal systems.
Who are the customers of this “digital security giant”? The write up reported:
This includes US government agencies, such as the Department of Energy, Department of Homeland Security, the Department of the Treasury, the Department of Health & Human Services, the Department of Veterans Affairs, the Department of Agriculture, and many more.
Great. How effective are those whiz bang cyber security systems?
Yeah. I think I know the answer. Marketing is easier than delivering cyber security that works.
Stephen E Arnold, July 27, 2022
Microsoft: Excellence in Action
July 25, 2022
I wanted to print one page of text. I thought a copy of the cute story about the antics of Elon and Sergey might be nice to keep. My hunch is that some of the content might be disappeared or be tough to see through the cloud of legal eagles responding to the interesting story. Sorry.
Nope.
Why?
Microsoft seems to be unable to update Windows without rendering a simple function. Was I alone in experiencing this demonstration of excellence? Nope. “Microsoft Warns That New Windows Updates May Break Printing.” The article states:
Microsoft said that the temporary fix has now been disabled by this week’s optional preview updates on Windows Server 2019 systems. This change will lead to printing and scanning failures in Windows environments with non-compliant devices.
There you go. Non compliant.
But wait, there’s more.
But wait there’s more!
“New Windows 11 Update Breaks the Start Menu Because Microsoft Hates Us All” explains:
It looks like Microsoft has once again shipped dodgy Windows 11 updates, with reports suggesting that the two latest cumulative updates have been causing serious issues with the Start menu. The updates in question are KB5015882 and KB5015814, and it looks like they’ve introduced a bug which causes to Start menu to disappear when you click to open it.
What do these examples suggest to me?
- A breakdown in basic quality control. Perhaps the company is involved in addressing layoffs, knock on effects from SolarWinds, and giving speeches about employee issues
- Alleged monopolies lack the management tools to deliver products and services which function like the marketing collateral asserts
- Employees follow misguided rules; for example, the Wall Street Journal’s assertion that employees should “ditch office chores that don’t help you get ahead.” See Page A 11, July 25, 2022. (If an employee is not as informed as a project lead or manager, how can the uninformed make a judgment about what is and what is not significant? This line of wacko reasoning allows companies with IBM type thinking to provide quantum safe algorithms BEFORE there are quantum computers which can break known encryption keys. Yep, the US government buys into this type of “logic” as well. Hello, NIST? Are you there.
Plus, Microsoft Teams, which is not exactly the most stable software on my Mac Mini, is going to get more exciting features. “Microsoft Is Launching a Facebook Rip-Off Inside Teams.” This article reports:
Microsoft is now launching Viva Engage today, a new Facebook-like app inside Teams that encourages social networking at work. Viva Engage builds on some of the strengths of Yammer, promoting digital communities, conversations, and self-expression in the workplace. While Yammer often feels like an extension of SharePoint and Office, Viva Engage looks like a Facebook replica. It includes a storylines section, which is effectively your Facebook news feed, featuring conversational posts, videos, images, and more. It looks and feels just like Facebook, and it’s clearly designed to feel similar so employees will use it to share news or even personal interests.
That’s exactly what I don’t want when “working.” The idea for me is to get a project, finish it, and move on to another project. Sound like kindergarten? Well, I listened to Mrs. Fenton. Perhaps some did not heed basic tips about generating useful outputs. Yeah, Teams with features added when the service does not do the job on some Macs. Great work from the Windows Phone and Surface units’ employer.
Net net: Problems? Yes. Fixable? I have yet to see proof that Microsoft can remediate its numerous technical potholes. Remember that Microsoft asserted that Russia organized 1,000 programmers to make Microsoft’s security issues more severe. In my view, Russia has demonstrated its inability to organize tanks, let alone complex coordinated software exploits. Come on, Microsoft.
Printers!
Stephen E Arnold, July 25, 2022