Microsoft has announced it is supporting Linux GUI apps in its upcoming WSL 2.
Windows Subsystem for Linux (WSL) “is an environment in which users can run their Linux applications from the comfort of their Windows PC.” WSL supports running Linux apps via the console, but WSL 2 will support full GUI apps without requiring a third-party X server.
“At //build we announced that support for Linux GUI applications is coming to WSL,” writes Microsoft’s Steve Pronovost, Partner Development Lead. “While today WSL is a console only experience, soon you’ll be able to use your favorite Linux IDE or other GUI application alongside your other Windows applications on your Windows desktop.
“How are the pixels going to flow between Linux applications and the Windows desktop hosting them and how are the various window going to be integrated into unified and seamless experience? That’s going to be a story for another time 😊.”
As an added bonus, Linux applications will benefit from GPU acceleration. This is good news for Windows and Linux users alike and represents a monumental shift from Redmond in their attitude toward what was once considered a rival operating system.
The next generation of SD Express memory cards are about to smoke the current generation, providing roughly quadruple the speed.
Current SD cards, based on the SD 7.0 or 7.1 specification, have a maximum transfer speed of 985 megabytes per second. Under the announced SD 8.0 specification, that will jump to nearly 4 gigabytes per second, thanks to its use of the PCI Express® (PCIe®) 4.0 specification.
The announcement, made by the SD Association, could result in a whole new generation of mobile storage devices offering speeds that compete with SSDs.
“SD Express’ use of even faster PCIe and NVMe architectures to deliver faster transfer speeds creates more opportunities for devices to use SD memory cards,” said Mats Larsson, Senior Market Analyst at Futuresource. “This combination of trusted and well- known technologies makes it easier for future product designs to leverage the benefits of removable storage in new ways.”
“By dramatically increasing the speeds for SD Express we’re giving device manufacturers and system developers more storage choices,” said Hiroyuki Sakamoto, SDA president. “SD 8.0 may open even more opportunities for extra high performance solutions using removable memory cards.”
The SD Association’s announcement is exciting news for individuals and organizations that rely on removable media. Even those that don’t may find new uses for SD cards at those speeds.
Salesforce has become the latest company to extend its work from home (WFH) policy, allowing employees to do so through the rest of the year.
Virtually every major tech company has allowed, or even mandated, its employees to WFH during the coronavirus pandemic. In some cases, the result has been enlightening for many companies, showing how productive employees can be working from home. As a result, some companies have decided to allow employees to WFH forever, with Twitter being the most high-profile example.
While not allowing employees to work from home forever, Salesforce has decided to allow employees to WFH for the rest of the year.
“For us, the timing of when we bring employees back into our offices will be unique to each office—we’ll make those decisions on a city-by-city basis, in a way that’s consistent with local government guidelines and in line with the advice of our medical experts,” writes Amy Weaver, President & Chief Legal Officer.
“Regardless of whether their local office has reopened, Salesforce employees will have the option of continuing to work from home until the end of the year.”
While stopping short of Twitter, Salesforce’s decision is likely welcome news to its employees.
Following reports the Trump administration was in talks with chip makers to build US factories, TSMC has announced plans to do just that.
TSMC is the primary provider of chips for Apple’s iPhones and iPads, as well as a variety of other smartphone makers. The news is a big win for the Trump administration, as well as the tech industry in general.
As the coronavirus pandemic has disrupted manufacturing and supply chains, the tech industry has been grappling with the fallout of not being able to keep up with demand. The situation has shone a light on the downsides of relying solely on overseas factories for mission-critical components.
The Trump administration opened discussions with both Intel and TSMC, in an effort to persuade both companies to open factories in the US. Sources said the administration was also talking with Samsung to see what could be done to help the company expand its existing semiconductor facilities in the US.
TSMC plans on beginning construction in 2021 in Arizona, with production scheduled to begin in 2024.
Microsoft announced it has entered into a definitive agreement to purchase Metaswitch Networks, a developer of network software.
Metaswitch Networks’ products are used by over 1,000 customers worldwide, and the company has recently pioneered “the development of ultra-high-performance cloud native communications software. This software is underpinning modern cloud-based communication networks, in the core and at the edge.”
In the blog post announcing the acquisition, Yousef Khalidi, Corporate Vice President of Azure Networking, made it clear this focus on cloud-based communication was at the heart of the acquisition.
“The convergence of cloud and communication networks presents a unique opportunity for Microsoft to serve operators globally via continued investment in Azure, adding additional depth to our hyperscale cloud infrastructure with the specialized software required to run virtualized communication functions, applications and networks.”
By combining Metaswitch Networks’ software with Azure, Microsoft will be in a position to better meet the needs of new and existing companies.
“We have a long history of working with operators as they increasingly embrace software-based solutions and continue to support the advancement of cloud-based networking while helping create new partnership opportunities for existing network equipment providers,” continues Khalidi. “Our intention over time is to create modern alternatives to network infrastructure, enabling operators to deliver existing and value-added services – with greater cost efficiency and lower capital investment than they’ve faced in the past.”
After years of exporting semiconductor manufacturing overseas, the Trump administration, Intel and TSMC are in talks to open chip factories in the US.
For years companies have relied on Asian semiconductor factories for the most critical components powering computers, phones, tablets and more. In addition to the cheaper cost associated with oversees manufacturing, there has also been the benefit of scale. With entire industries located in concentrated areas of Asia, companies are able to tap into a vast pool of talent, expertise and supplies.
Recent events, however, have shown the inherent dangers of relying solely on foreign manufacturing. As the coronavirus pandemic first hit China, factories that American businesses relied on were shuttered, causing problems for a wide range of companies. For example, the supply chain issues resulted in Apple facing product shortages, delayed launch dates for new products and even impacted the company’s ability to provide support and give replacement devices to customers.
The impact has not been lost on the government, or chip makers. According to The Wall Street Journal, (WSJ) officials have been talking with Intel and TSMC about building factories in the US.
“We think it’s a good opportunity,” said Greg Slater, Intel’s vice president of policy and technical affairs. “The timing is better and the demand for this is greater than it has been in the past, even from the commercial side.”
Likewise, TSMC is reportedly talking to US officials as well as Apple, one of its biggest customers, about building a factory in the US. The WSJ’s sources say officials are also interested in helping Samsung expand its existing chipmaking facilities in the US.
If the talks result in concrete action, it should go a long way toward insulating the American tech industry and help protect it from future global disasters.
A researcher has discovered seven critical security vulnerabilities with Thunderbolt that impact Windows, Linux and, to a lesser extent, macOS.
In late April it was reported that one of Microsoft’s reasons for not including Thunderbolt on its Surface devices was concerns over security. Specifically, Microsoft had concerns that, because Thunderbolt acts as a direct memory access port, a hacker could use a memory stick or other peripheral to gain direct access to the device’s memory.
It seems Microsoft’s concerns may not have been so far-fetched after all. Björn Ruytenberg, researcher at Eindhoven University of Technology, has published a report detailing seven Thunderbolt vulnerabilities that could allow a hacker to theoretically steal all data on a computer, regardless of what security measures are in place, such as password protection or encryption. In a video demonstrating the vulnerabilities, Ruytenberg gains access in roughly five minutes.
Of the vulnerabilities, all seven impact both Windows and Linux, while only two impact macOS. Even then, macOS is only partially affected, as Apple’s computers use two security measures not used by Windows or Linux. The vulnerability compromises the first measure, but not the second. If running Windows or Linux in Boot Camp, however, a Mac becomes “trivially affected.”
In a follow-up blog, Ruytenberg says Intel was notified in mid-February, but has no intention of taking any further action, citing action they have already taken. In a blog post on the company’s site, Intel’s Jerry Bryant explained the mitigation efforts already in place:
“In 2019, major operating systems implemented Kernel Direct Memory Access (DMA) protection to mitigate against attacks such as these. This includes Windows (Windows 10 1803 RS4 and later), Linux (kernel 5.x and later), and MacOS (MacOS 10.12.4 and later). The researchers did not demonstrate successful DMA attacks against systems with these mitigations enabled. Please check with your system manufacturer to determine if your system has these mitigations incorporated. For all systems, we recommend following standard security practices, including the use of only trusted peripherals and preventing unauthorized physical access to computers.”
While a vulnerability of this kind is disconcerting, it’s important to keep it in perspective. The vulnerability requires physical access to a machine. As we wrote in the article describing Microsoft’s decision not to include Thunderbolt, “a long-standing rule of computer security is that once physical access has been achieved, all bets are off.“ That rule still holds true.
In the meantime, if Intel’s response is accurate, it seems modern computers with the latest OS updates are largely safe. In the meantime, common sense measures, such as controlling computer access and not plugging in unknown Thunderbolt devices, should go a long way toward protecting all users.
Microsoft has announced it is repairing defective Surface Laptop 3 devices whose screens appear to spontaneously crack.
Some Surface customers have been reporting for months that their device screens have been cracking, in some cases without the users doing anything. In at least one case, the crack appeared after spending the night sitting on the desk charging.
It appears that Microsoft is finally addressing the issue, offering to repair the affected devices free of charge, according to a post on the company’s support site:
Hi everyone,
We have investigated claims of screen cracking on Surface Laptop 3 and have determined that, in a very small percentage of cases, a hard foreign particle may cause a hairline fracture in the glass that may seem to appear unexpectedly or without visible cause.
If you believe your Surface Laptop 3 is experiencing this issue, you are encouraged to contact our customer support team to initiate a repair free of charge during the warranty period of the device. If you have previously paid Microsoft for a Surface Laptop 3 repair that you believe experienced this issue, please contact customer support to learn about reimbursement.
Greg
Microsoft Surface Team
support.microsoft.com/surface
This is a big miss for the company, and represents a quality issue that should never have made it through production. Fortunately, impacted users won’t have to pay for the fix.
Clearview AI has promised it will end all contracts with private companies in the face of public backlash and lawsuits.
Clearview made news as a facial recognition firm that had scraped billions of images from the web and social media, and then made them available for facial recognition searches. The company has repeatedly tried to portray itself as a responsible steward of the technology it has developed and is making available, initially claiming its service was only for law enforcement and government agencies.
In short order, however, it has become apparent Clearview cannot be trusted. Reports surfaced that the company was selling its services internationally, including to oppressive regimes. One of the more disturbing revelations was that the company was monitoring the searches performed by law enforcement and using that information to try to discourage police from talking with journalists.
Throughout it all, however, the company has continued to maintain that it only made its software available to law enforcement and select security personnel — only that wasn’t true. Reports showed the company had made its software available to a many private companies and individuals, including some who used it for their own personal benefit.
According to BuzzFeed, in an effort to deal with the lawsuit it is facing in Illinois, the company is now promising it will cancel its contracts with private organizations.
“Clearview is cancelling the accounts of every customer who was not either associated with law enforcement or some other federal, state, or local government department, office, or agency,” the company said in a filing BuzzFeed has seen. “Clearview is also cancelling all accounts belonging to any entity based in Illinois.”
There’s only one problem with this promise: It comes from a company that has already proven itself to be dishonest, unscrupulous and completely untrustworthy. Here’s to hoping the judge sees right through this latest ploy.
Zoom has acquired Keybase, the popular secure messaging and file-sharing provider in its ongoing attempt to improve its security.
In the midst of the global pandemic, Zoom has gone from 10 million daily users to over 200 million, becoming the go-to platform for communication of all kinds. Remote workers, government agencies, online students, families, friends and more have all turned to the platform to stay connected.
Unfortunately for the company, it has made a number of security missteps, losing some public confidence along the way. This caused Zoom to announce a moratorium on new features for 90 days, while it focused on beefing up security. This acquisition, the company’s first in its nine-year history, is major step in that direction.
“There are end-to-end encrypted communications platforms. There are communications platforms with easily deployable security. There are enterprise-scale communications platforms. We believe that no current platform offers all of these. This is what Zoom plans to build, giving our users security, ease of use, and scale, all at once,” said Eric S. Yuan, CEO of Zoom. “The first step is getting the right team together. Keybase brings deep encryption and security expertise to Zoom, and we’re thrilled to welcome Max and his team. Bringing on a cohesive group of security engineers like this significantly advances our 90-day plan to enhance our security efforts.”
“Keybase is thrilled to join Team Zoom!” said Max Krohn, Keybase.io co-founder and developer. “Our team is passionate about security and privacy, and it is an honor to be able to bring our encryption expertise to a platform used by hundreds of millions of participants a day.”
It will be exciting to see just how Zoom integrates Keybase’s features to deliver on its security goals.
Mozilla has announced it is working on Private Relay, an email alias generating service designed to protect user privacy.
As more websites and services require email addresses to sign up, customers are often inundated with mailing lists and spam. Even worse, many companies play fast and loose with security, jeopardizing people’s privacy by not protecting their personal information, such as their email address. Some individuals maintain multiple addresses, specifically for the purpose of using one or more for purchases, signups and mailing lists.
Mozilla, a longtime leader in internet privacy, wants to make the whole process a little easier with their Private Relay, a Firefox add-on that will allow users to create an email alias with a single click. The add-on will work with online forms, using the alias in the email field, and then forwarding any email to the person’s real email address. If the alias begins to receive unwanted emails, it can be disabled or deleted.
This is a welcome feature that will make web browsing and email a little more private and secure.
Apple has reported its second quarter earnings, shattering analysts’ expectations, aided by its services business.
It’s no secret that Apple, like many companies, has had a difficult quarter. Since much of the company’s production is in China, it was hit particularly hard as its supply chain experienced major delays as a result of the coronavirus pandemic. As a result, analysts did not expect the company to see any growth this quarter, and actually predicted a 5% year-over-year decline in revenue.
Instead, Apple reported $58.3 billion in revenue, which was a 1% increase year-over-year. Similarly, the company reported earnings per share of $2.55, up 4% year-over-year, as opposed to the 10.8% decrease analysts were expecting.
“Despite COVID-19’s unprecedented global impact, we’re proud to report that Apple grew for the quarter, driven by an all-time record in Services and a quarterly record for Wearables,” said Tim Cook, Apple’s CEO. “In this difficult environment, our users are depending on Apple products in renewed ways to stay connected, informed, creative, and productive. We feel motivated and inspired to not only keep meeting these needs in innovative ways, but to continue giving back to support the global response, from the tens of millions of face masks and custom-built face shields we’ve sent to medical professionals around the world, to the millions we’ve donated to organizations like Global Citizen and America’s Food Fund.”
Despite the positive results, Apple did not provide guidance on the upcoming quarter, as has been the case with a number of tech companies. It’s likely the full impacts of the pandemic have yet to be fully realized, and Apple seems hesitant to provide any further guidance until the situation is better understood.
Still, this quarter’s results were a big win for the company and will no doubt help assuage analysts’ concerns long-term.
A new report has found that hackers have been loading advanced Android malware onto the Google Play Store for years.
Kaspersky Lab was first alerted to the issue in July 2019, prompting them to investigate. What they found was a variety of malware that, rather than trying to display ads or steal the victim’s money, worked to create a backdoor on infected devices that could be exploited with custom malware payloads.
The malware apps used a variety of sophisticated techniques to bypass Google’s approval process, including what essentially amounts to a bait-and-switch. The apps would often install with little to no permissions required, only to gain the necessary permissions later. In other cases, the apps would install a benign version, and then create the backdoor at a later date. Once a phone was infected with a malicious version, hackers then had an access point that provided a wealth of information.
“Functionality of all samples are similar – the main purpose of spyware was to gather sensitive information,” writes Alexey Firsh and Lev Pikman. “While the basic functionality was not very broad, and included geolocation, call logs, contact access and SMS access, the application could also gather a list of installed applications, as well as device information, such as model and OS version. Furthermore, the threat actor was able to download and execute various malicious payloads, thus, adapting the payload that would be suitable to the specific device environment, such as Android version and installed apps. This way the actor is able to avoid overloading the application with unnecessary features and at the same time gather information needed.”
This is a particularly disturbing discovery and, hopefully, Google will be quick about resolving their vetting process issues to ensure this kind of malware does not continue appearing on the Google Play Store.
Microsoft has released its quarterly earnings for the third quarter of fiscal 2020, and Azure stands out as one of the company’s big hits.
Analysts were deeply interested in Microsoft’s earnings for this quarter, in view of the ongoing coronavirus pandemic. How the company faired would be a good indicator of the overall impact the pandemic is having. In its earnings, Microsoft beat analysts exceptions, reporting revenue of $35 billion, representing a 15% increase over the year-ago-quarter.
A particular standout was the company’s Azure cloud business, which saw revenue growth of 51%.
“We’ve seen two years’ worth of digital transformation in two months. From remote teamwork and learning, to sales and customer service, to critical cloud infrastructure and security – we are working alongside customers every day to help them adapt and stay open for business in a world of remote everything,” said Satya Nadella, chief executive officer of Microsoft. “Our durable business model, diversified portfolio, and differentiated technology stack position us well for what’s ahead.”
“In this dynamic environment, our sales teams and partners executed a solid third quarter, with Commercial Cloud revenue generating $13.3 billion, up 39% year over year,” said Amy Hood, executive vice president and chief financial officer of Microsoft. “We remain committed to balancing operational discipline with continued investments in key strategic areas to drive future growth.”
The quarterly report was good news, and Microsoft made a point of highlighting that the pandemic had minimal impact on its revenue. However, there was a note of caution, as the company acknowledged “the effects of COVID-19 may not be fully reflected in the financial results until future periods.”
Lenovo has announced it will soon make Fedora Workstation available on its ThinkPad line of laptops.
Lenovo joins Dell as one of the few PC makers to include an OEM Linux install. Unlike Dell, which is bundling the Ubuntu distribution, Lenovo has chosen to bundle Fedora. Fedora has a long history in the Linux community, and is sponsored by Red Hat.
According to Fedora Magazine, “the Lenovo team has been working with folks at Red Hat who work on Fedora desktop technologies to make sure that the upcoming Fedora 32 Workstation is ready to go on their laptops. The best part about this is that we’re not bending our rules for them. Lenovo is following our existing trademark guidelines and respects our open source principles. That’s right—these laptops ship with software exclusively from the official Fedora repos!”
This is great news for individuals, businesses and organizations of all types looking for a fully supported Windows alternative.
Sophos has issued a hotfix for its XG Firewall to patch a zero-day exploit that was being actively exploited by hackers.
According to Sophos, the firm was first made aware of the issue on April 22 by a customer who noticed “a suspicious field value visible in the management interface.” After investigating, Sophos determined the value was not a bug, but indicative of an attack against both physical and virtual XG Firewall units.
“The attack used a previously unknown pre-auth SQL injection vulnerability to gain access to exposed XG devices,” reads the security bulletin. “It was designed to exfiltrate XG Firewall-resident data. Customers with impacted firewalls should remediate to avoid the possibility that any data was compromised. The data exfiltrated for any impacted firewall includes all local usernames and hashed passwords of any local user accounts. For example, this includes local device admins, user portal accounts, and accounts used for remote access. Passwords associated with external authentication systems such as Active Directory (AD) or LDAP were not compromised.”
Because Sophos issued a hotfix for the vulnerability, a message should display on the XG management interface informing customers if their units were impacted. Uncompromised customers do not need to take any additional action, while compromised customers are encouraged to reset device administrator accounts, reboot the devices and reset passwords for local user accounts. If users had reused their XG passwords anywhere else, those should also be reset.
Mozilla has announced it is raising the bug bounties it pays for Firefox to $10,000.
Bug bounties are a popular way of encouraging developers and “white hats,” the term for ethical hackers that find and report vulnerabilities, to work with companies and test their products and services. Most major companies pay significant bounties for bugs that are reported to them. In many cases, white hats are able to make a full-time income off the bounties they collect.
According to Mozilla’s blog post, the company has made use of bug bounties since 2004, paying out some $965,750 between 2017 and 2019. While the average payout was $2,775, the most common amount was $4,000.
The company is making a number of changes to make the bounty program more accessible, while also splitting bounties among duplicate reports that are filed within 72 hours of the first report. This is being done in an effort to reward individuals who may have come in second or third by mere hours. In addition, the company is raising its payouts.
“Besides rewarding duplicate submissions, we’re clarifying our payout criteria and raising the payouts for higher impact bugs,” writes Mozilla’s Tom Ritter. “Now, sandbox escapes and related bugs will be eligible for a baseline $8,000, with a high quality report up to $10,000. Additionally, proxy bypass bugs are eligible for a baseline of $3,000, with a high quality report up to $5,000.“
Mozilla’s announcement will likely be a big motivation for white hats to continue finding and reporting bugs in Firefox.
Researchers have discovered a flaw in the iOS version of Mail that may have left countless iPads and iPhones vulnerable to data theft.
According to Reuters, the flaw was found by San Francisco-based ZecOps, a company specializing in mobile security forensics. The investigation was prompted by a sophisticated attack against one of ZecOps clients in late 2019.
ZecOps CEO, Zuk Avraham, “said he found evidence that a malicious program was taking advantage of the vulnerability in Apple’s iOS mobile operating system as far back as January 2018.” What makes the vulnerability particularly unsettling is that it requires little to no action on the part of the victim.
The hack works through a seemingly blank email that forces a crash and reset, Reuters reports, opening “the door for hackers to steal other data on the device, such as photos and contact details.” Not even recent versions of iOS protect a user, leaving the victim vulnerable to having their data remotely stolen from their device.
Apple did confirm to Reuters that a vulnerability does exist in Mail, and an upcoming software update would include a fix. While the fix is certainly good news, it’s worrisome that such a severe bug went undiscovered for so long while, at the same time, apparently being exploited by bad actors.
AWS has announced Amazon AppFlow, an integration service aimed at helping AWS integrate with various SaaS applications.
Amazon AppFlow was born out of a need to connect with data siloed away in various SaaS applications and services. Previously, in order to integrate that data in AWS, companies would need to write custom code to bring the data together and make it accessible.
Amazon AppFlow addresses these problems by providing a way for individuals of all different technical levels to create bidirectional workflows and data integrations, without the need to write any code. The console allows triggers to be set up to perform actions, all of which can be accomplished in just a few minutes. The end result is a secure method of integrating data.
“Our customers tell us that they love having the ability to store, process, and analyze their data in AWS. They also use a variety of third party SaaS applications, and they tell us that it can be difficult to manage the flow of data between AWS and these applications,” said Kurt Kufeld, Vice President, AWS. “Amazon AppFlow provides an intuitive and easy way for customers to combine data from AWS and SaaS applications without moving it across the public Internet. With Amazon AppFlow, our customers bring together and manage petabytes, even exabytes, of data spread across all of their applications – all without having to develop custom connectors or manage underlying API and network connectivity.”
Amazon AppFlow is likely to be a big hit among companies looking to integrate their SaaS data into AWS.
In its ongoing efforts to beef up security, Zoom is preparing to allow hosts to report participants who misbehave.
Zoom has become a critical component to individuals and organizations alike during the coronavirus pandemic. The company has, however, come under criticism for lax security and privacy, prompting many companies and organizations to ban the app. As a result, Zoom committed to a 90-day moratorium on new features while its engineering teams focused on security and privacy improvements.
One of the biggest issues the company has been trying to address is Zoom-bombing, where an uninvited participant gains access to a meeting and commandeers it. Zoom-bombers have subjected legitimate participants to lewd drawings, racial slurs and more.
According to notes on Zoom’s site, the company is releasing an update on April 26 that will allow hosts to report those participants who misbehave.
Setting to allow host to report participants to Zoom
Account owners and admins can now enable a setting to allow the host to report participants to Zoom. This feature will generate a report which will be sent to the Zoom Trust and Safety team to evaluate any misuse of the platform and block a user if necessary. This setting is available at the account, group, and user level and can be locked at the group or account level. This setting requires the Zoom client version which will be released on April 26, 2020.
This is another welcome improvement to Zoom and should help improve the experience for all involved.
SAP Co-CEO Jennifer Morgan is departing the company, leaving Christian Klein as sole CEO.
Morgan has been with the company since 2004, and jointly held the role of CEO with Klein since October 2019. The company says that Morgan “mutually agreed with the Supervisory Board of SAP SE” to resign and depart, effective April 30. At the same time, the announcement makes clear that the current economic crisis was a driving factor, with the decision to get behind a single CEO being “taken earlier than planned to ensure strong, unambiguous steering in times of an unprecedented crisis.” A single CEO will give the company a clear, unified leadership structure.
“I’d like to thank Jennifer for her partnership over many years,” said CEO Christian Klein. “Throughout SAP’s transformation, Jennifer has always been laser-focused on customers, partners, shareholders and employees. It’s thanks to her that we have established a strong position in experience management solutions. I know she will always be a champion of SAP.”
“It has been a great privilege to drive SAP’s growth and innovation in so many areas and most recently as Co-CEO,” said Jennifer Morgan. “With unprecedented change within the world, it has become clear that now is the right time for the company to transition to a single CEO leading the business. I would like to thank Hasso Plattner for the opportunity to co-lead this great company, and I wish Christian, the Executive Board, and SAP’s talented team much success as they drive the company forward.”
It will be interesting to watch SAP to see if the change has a noticeable impact on the company’s operations.