Archive for April, 2022

Review: Kensington UH1400P USB-C Mobile Hub And 100W USB-C Power Adapter

Posted in Products with tags on April 21, 2022 by itnerd

Over the last few months I’ve been evolving my home office desk setup. Which meant looking at the tech and other items that I have which allows me to be more productive. While I admit that this is still a work in progress, the pieces are starting to fall into place on that front. One of those pieces is the Kensington UH1400P USB-C Mobile Hub which is currently my docking solution of choice at the moment. Let’s have a look at the mobile hub.

From the back you get a HDMI 2.0 port capable of 4K resolution at 60 Hz, a USB-A 3.2 Gen1 port, and a USB-C port which supports USB-C PD 3.0 power delivery.

On the front you get two more USB-A 3.2 Gen1 ports as well as an SD card reader and a microSD card reader. The card readers do UHS-I speeds which is 104 Mbps.

On the side you get an Ethernet jack capable of gigabit speeds.

The mobile hub is tiny. If you’re using this on the go it will easily fit into a backpack or a briefcase. In my case, I’m using it on my desk because it takes up very little real estate. It’s also made of metal (which is handy because while it is in use it is warm to the touch) and feels very premium. Kensington promises that this mobile is plug and play. And that was the case when I plugged it into my Mac as it worked without any drivers or hopping through hoops to get it going.

Now my use case is to have it connected to my Acer monitor, my uninterruptible power supply, and have it charging my MacBook Pro. To help with that last part, I also got this:

This is the Kensington 100W USB-C Power Adapter which uses GaN technology to pack a lot of charging power into a small package. And as a bonus, it won’t produce a lot of heat in the process.

Here’s the Kensington power adapter next to the Apple 140W adapter that came with my MacBook Pro. As you can see it’s significantly smaller, and I can say it’s lighter as well. Now while I will highlight that the Apple adapter will do 140W, it will only do that over MagSafe. Via USB-C it’s capped at 100W. So if you’re travelling, you likely want to carry the Kensington power adapter with you because it will take up less space and it is lighter. But in my case, I replaced the Apple adapter with the Kensington one because it takes up less space on my uninterruptible power supply. That allows me to get this result:

This gives me a one cable solution that allows me to use my monitor and charge my MacBook Pro as well as have the uninterruptible power supply communicate with my computer. And unlike the USB-C adapter that I was using previously, I get two USB-A ports and a couple of card reader ports as well. I’m not using the Ethernet jack as I’ve got 802.11ax/WiFi in the condo which eliminates the need for a wired connection.

One thing that I did observe is from a video perspective, this hub delivers much sharper and more fluid video than my previous adapter provided. And it supported 120 Hz video via HDMI even though 60 Hz is the supposed limit of the Kensington adapter. In terms of data transfer speeds, while the Kensington adapter maxes out at 5Gbps a second, I found transfer speeds from USB-A attached devices more than acceptable. If you need something faster, Kensington can sell you a Thunderbolt 3 or 4 dock. In terms of charging, the Kensington adapter is capped at 85W which is fine for me as my MacBook Pro has amazing battery life and 85W allows me to charge it at a decent rate.

In terms of gripes? I really don’t have any major ones. This seems to be a well sorted piece of kit that I’d recommend either for a portable use case or my use case. Kensington UH1400P USB-C Mobile Hub has a MSRP of $99.99 CDN and the Kensington 100W USB-C Power Adapter has a MSRP of $99.99 CDN. That’s not a lot to pay for the functionality that you get. I’d take a good look at these products if you need a USB-C hub and power adapter at your desk or on the go.

Attackers Take Aim At Kubernetes & Software Supply Chain

Posted in Commentary with tags on April 21, 2022 by itnerd

A new report from Aqua Security has found that attackers are focused more on the cloud and using sophisticated tactics to aim at Kubernetes and the software supply chain. Seeing as the Kubernetes is the thing at the moment, that means that your approach has to change accordingly. Sitaram Iyer, Global Security Architect, Venafi had this to say:  

“As the popularity of Kubernetes has risen, so too has the severity and frequency of attacks on them, as cybercriminals have realised that Kubernetes can be vulnerable. The cybercrime group TeamTNT has been a real exponent of this, having compromised more than 50,000 Kubernetes clusters over the last few years, spreading malware at will, and eventually launching a cryptominer.“With the pace of innovation in cloud rocketing, so too is the number of machine identities in use for the deployed applications. Many of these applications will be spun up and down in a matter of seconds and are highly ephemeral . However, each application needs to be given an identity, which must be managed throughout its lifecycle. Enterprises are struggling to issue and manage these identities at cloud speed and scale. The result is new security risks due to mismanagement of machine identities.”

“Zero trust is vital to protecting organisations against attacks targeting Kubernetes. Its important businesses stop blindly trusting everything within their build environments and instead adopt a stance whereby every component of the build pipeline is proactively challenged.

“Automated machine identity is crucial to ensuring companies don’t kill the speed of development whilst deploying this zero trust model. Through automation, organisations can ensure the dynamic nature of cloud-native environments remain secure, as manually checking the provenance of every component of a build pipeline would take weeks. Developers need solutions that enable – instead of hinder – speed and security.”

If Kubernetes is your thing, I’d be taking Mr. Iyer’s advice as clearly threat actors are targeting you.

CommSafe AI: First-to-Market Software That Flags Toxic Workplace Emails And DMs

Posted in Commentary on April 21, 2022 by itnerd

CommSafe AI, a leader in workplace conflict and violence prevention, announces the commercial launch of its first-to-market flagship product, CommSafe AI Safe Communication Software™. The software has received certification with ServiceNow, a leader in enterprise digital process automation tools. CommSafe AI also integrates with Microsoft products and Google Workspace accounts.

The CommSafe AI tool is a Software-as-a-Service (SaaS) product that in near real-time allows companies to get ahead of threats of conflict and violence in the workplace before they escalate to situations of physical or psychological harm causing costly lawsuits. The tool uses artificial intelligence (AI) models to analyze company communication to identify toxic behaviors and IP loss.

The smart and scalable software integrates into a company’s human resource workflow to capture in real time toxic email and chat communications among employees. In addition, CommSafe AI employs algorithms not only to identify toxicity, but also poor sentiments.

Because employees feel safer knowing their company is taking steps to protect them from harassment, they are focused and more productive. Equally important, company brand reputation remains uncompromised.

Earlier this year, CommSafe AI spent time beta testing its communication analysis tool with select clients and conducted toxicity audits to assess any threats companies are currently facing.

The company’s software release comes at a time when concern over conflict and violence are at an all-time high in the United States. A recent report, “2021 State of Protective Intelligence Report: The Outlook from Physical Security, Legal, Compliance and Risk Leaders,” showed top concerns for security decision-makers at U.S. companies include a dramatic rise in physical threats, lack of unified intelligence, and physical security challenges brought on by COVID-19.

For companies and employees worried about privacy concerns, the software does not monitor electronic communications; rather it scans and flags potentially toxic language and poor sentiment.

Certification by ServiceNow is only granted to Apps available in the ServiceNow Store and signifies that CommSafe AI has successfully completed a series of tests surrounding Now Platform® security, compatibility, performance, and integration interoperability. The certification also reflects that ServiceNow best practices are utilized in the design and implementation of CommSafe AI.

Oracle Patches Java Bug That’s Very Bad

Posted in Commentary with tags on April 21, 2022 by itnerd

Oracle has apparently patched a vulnerability in server-side Java that allowed an attacker to forge some kinds of SSL certificates and handshakes, along with several kinds of authentication messages. The vulnerabilities were discovered by ForgeRock security researcher Neil Madden and documented here. But here’s the info that what you need to know:

It’s hard to overstate the severity of this bug. If you are using ECDSA signatures for any of these security mechanisms, then an attacker can trivially and completely bypass them if your server is running any Java 15, 16, 17, or 18 version before the April 2022 Critical Patch Update (CPU). For context, almost all WebAuthn/FIDO devices in the real world (including Yubikeys*) use ECDSA signatures and many OIDC providers use ECDSA-signed JWTs.

If you have deployed Java 15, Java 16, Java 17, or Java 18 in production then you should stop what you are doing and immediately update to install the fixes in the April 2022 Critical Patch Update.

Lovely.

Kevin Bocek, VP, Security Strategy & Threat Intelligence at Venafi had this comment:

“This vulnerability is just one more example of how important machine identities are to global security. It allows an attacker to bypass the TLS session handshake for specific servers so they can install malware and look for ways to pivot across networks. This is a serious vulnerability that needs to be patched quickly.”

Given the severity of this bug, I’d be patching all the things right now before you get pwned now that this is out there.

Okta Says Lapsus$ Breach Smaller Than First Thought…. I’m Not Sure I Buy That

Posted in Commentary with tags on April 20, 2022 by itnerd

Remember when Okta got pwned by Lapsus$, and it looked like over 300 customers were affected by this breach? Okta says an investigation into the January Lapsus$ breach concluded the incident’s impact was significantly smaller than expected. As in it only affected TWO customers.

Really?

I’m getting ahead of myself. Let’s start with this Tweet from Okta’s Co-founder and CEO:

Inside this Tweet is a report done by Okta’s Chief Security Officer David Bradbury. It’s very much worth reading, but I will hit the highlights for you:

  • The attacker only accessed the two active customer tenants after gaining control of a single workstation used by an engineer working for Sitel, the third-party customer support services provider at the center of the incident.
  • The attacker only had access to anything for 25 minutes before being shut down.
  • The attacker didn’t do anything of significance during that 25 minutes.
  • Okta is going to ensure that its services providers comply with new security requirements, including adopting Zero Trust security architecture and authenticating via Okta’s IDAM solution for all workplace apps.
  • Okta’s relationship with Sitel has been terminated and Okta is now directly managing all third-party devices with access to its customer support tools.

I am not sure I am buying this. Here’s why. Their original rundown of this event went like this according to Okta at the time:

  • The hack actually took place in January.
  • The security breach stemmed from someone gaining access to the credentials of a support engineer employed by a sub-contractor, Sitel.
  • Those credentials were then used to access up to 366 client accounts.
  • The company managed to suspend the engineer’s account within 70 minutes of the hack being detected.
  • The subsequent forensic analysis took more than two months.
  • The company didn’t really grasp the implications of this hack until much, much later.

So if you look at this version of events and compare it to today’s version of events, it’s radically different. Thus I have to look at this and ask why is it radically different. I suspect that others watching this story will be asking similar questions. And I will be waiting to see how Okta explains that. If they can.

UPDATE: I got some commentary from Lucas Budman CEO of TruU:

It is great to hear that Okta’s customers were less affected than assumed, however, this breach was preventable. People assume that they are protected by multi-factor authentication (MFA), but the reality is that multi-factor authentication is not truly multi.  Passwords and second factor (2FA) technologies are easily compromised. It is time for the industry to move away from using weak forms of identification and towards truly passwordless MFA based authentication.

New CompTIA A+ Certification Emphasizes The Skills IT Professionals Need to Support Today’s Hybrid Workforce

Posted in Commentary with tags on April 20, 2022 by itnerd

 CompTIA A+, the globally recognized skills certification for technology professionals who provide technical support, has been updated to align with the changing nature of the hybrid workforce.

CompTIA, the nonprofit association for the information technology (IT) industry and workforce, announced today that the new version of CompTIA A+ (220-1101 and 220-1102) is available worldwide. CompTIA A+ is trusted by employers around the world as validation of IT professionals’ ability to think on their feet and perform critical support tasks.

The new CompTIA A+ certification exam:

  • Reflects the increased reliance on software-as-a-service applications for remote work.
  • Includes more focus on troubleshooting and remotely diagnosing and correcting common software, hardware or connectivity problems.
  • Places greater emphasis on changing core technologies, from cloud infrastructure and IoT device security to data management and scripting.
  • Expands coverage of major operating systems, their use cases and how to keep them running properly.

The new exam also recognizes the changing nature of the tech support job role, where many tasks are sent to specialized providers. CompTIA A+ certified personnel are better able to assess whether it is best to fix something on site, or to save time and money by sending proprietary technologies directly to vendors.

Individuals who achieve CompTIA A+ certification have demonstrated the skills to install and configure end-user devices and software; connect devices to networks; perform basic cybersecurity mitigations; troubleshoot common problems to diagnose and resolve issues; and demonstrate basic knowledge of scripting, the cloud, and virtualization.

Accompanying the release of the new exam is the availability of a comprehensive suite of learning and exam preparation resources including:

  • CertMaster Learn for A+, an interactive online learning experience featuring videos, performance-based interactives and practice questions.
  • CertMaster Labs for A+, hands-on 3D workbench simulations and virtual machine-based labs.
  • CertMaster Practice for A+, an adaptive test prep tool that assesses knowledge and exam readiness.

Complete details on CompTIA A+, including exam objectives, practice questions and exam study resources, are available at  https://www.comptia.org/certifications/a.

AV-Comparatives Reveals Top-Performing Consumer Antivirus Products In Latest Malware Protection Test

Posted in Commentary with tags on April 20, 2022 by itnerd

AV-Comparatives, a provider of independent comparative tests and reviews for antivirus products, has released the latest security software evaluation results of its Malware Protection Test for the month of March, and the factsheet for the Real-World Protection Test, carried out between February and March.

The Malware Protection Test report can be found here: 

The Real-World Protection Test report can be found here: 

These tests examined the performance of leading antivirus solutions in order to assess their capabilities in conditions experienced every day by users around the world. 

The antivirus products used in the test are installed on individual fully patched Microsoft Windows 10 64-Bit computers, which are connected to the internet and updated each day as well as before every single test. 

The interim results of this the Real-World Protection Test are based on a set of 362 live test cases (malicious URLs found in the field). The full report, covering four months of testing, will be released in June.

The following products (latest version available at time of testing) were tested: Avast Free Antivirus, AVG Free Antivirus, Avira Prime, Bitdefender Internet Security, ESET Internet Security, G Data Total Security, K7 Total Security, Kaspersky Internet Security, Malwarebytes Premium, McAfee Total Security, Microsoft Defender, Panda Free Antivirus, NortonLifeLock Norton 360 Deluxe, TotalAV Antivirus Pro, Total Defense Essential Anti-Virus, Trend Micro Internet Security and VIPRE Advanced Security.

The test results showed that: 

  • Avira achieved perfect protection and a low rate of false positives. 
  • AVG, Avast, ESET, Kaspersky, Microsoft and VIPRE achieved nearly perfect protection and a low rate of false positives.
  • NortonLifeLock, Trend Micro and Malwarebytes achieved perfect protection and a higher rate of false positives. 

While all products in the test are unanimously viewed as successful participants, AV-Comparatives does issue caution to the products with a higher rate of false positives as it can lead to a less thorough and more time-consuming user experience. 

As part of AV-Comparatives ongoing Consumer Main-Test Series, the Malware Protection Test for consumer security solutions evaluated 17 popular anti-malware programs to assess their ability to detect and block malicious files before, during or after execution. This test examines a product’s ability to prevent a malicious program from making any changes to the system. The test set used for this test consisted of 10,040 malware samples, assembled after consulting telemetry data with the aim of including recent, prevalent samples that are endangering users in the field. To ensure that the tested programs do not protect the system at the expense of high false-alarm rates, a false-positive test was also run. 

The products tested by AV-Comparatives were: Avast Free Antivirus, AVG AntiVirus Free, Avira Prime, Bitdefender Internet Security, ESET Internet Security, G Data Total Security, K7 Total Security, Kaspersky Internet Security, Malwarebytes premium, McAfee Total Protection, Microsoft Defender Antivirus, NortonLifeLock Norton 360 Deluxe, Panda Free Antivirus, TotalAV Antivirus Pro, Total Defense Essential Antivirus, Trend Micro Internet Security and VIPRE Advanced Security. 

A total of 11 products reached the highest award level, Advanced+. These products were: NortonLifeLock, Bitdefender, Avast, AVG, Kaspersky, Total Defense, VIPRE, McAfee, Avira, Microsoft and TotalAV. 

Aura Frames Has A New App Feature Just In Time For Mother’s Day

Posted in Commentary with tags on April 19, 2022 by itnerd

Culture, art – and all of our photos – are increasingly living on our devices. Aura is the connection between digital and physical, giving dedicated space at home to enjoy our most precious memories. Aura is the connected photo frame that makes it easy to instantly frame photos from anywhere – and invite your favorite people to enjoy and share theirs. It’s like a private family network for the people you want to share more with.

A highly requested feature from Aura customers for sharing older photos — we’re launching a photo scanner directly in the Aura app. While most will use this feature to bring printed photos into the digital age to share with family – especially those of mom through the years an Aura frame with the in-app scanner also can be used to easily save and share the growing collection of kids’ artwork coming home every week — allowing you to throw it away... guilt-free.

This feature is launching April 19 and here are a few details:

  • Free update for all Aura customers globally on iOS (iOS 13+) only with Android to quickly follow.
  • In the Aura app, select “Add Photos” and tap the scan icon in the upper right corner.
  • Scan multiple photos, adjust for color (photos or documents/art), crop, and add date information to archive the memory. Slight enhancements will account for angles/adjustments. Once on the frame, adjust position if needed.
  • Photos! Great for older printed photos you wish to share with family.
  • Kid’s Art! Also helps parent’s declutter their kid’s art. Once scanned, display at home, share with grandparents, or even put a dedicated art frame in your kids’ room.


Finally, here’s some Mother’s Day Deals that started on April 15 and running through May 8:

  • Carver Luxe – $199 (reg. $229)
  • Mason – $229 (reg. $259)
  • Mason Luxe – $289 (reg. $319)
  • Smith – $449 (reg. $539)

Rogers Rises From The Dead And Announces 8 Gbps Fibre Internet…. In Select Markets

Posted in Commentary with tags on April 19, 2022 by itnerd

I’ve been very critical of Rogers when it comes to their Internet offerings. Most recently I said this when Bell rolled out 3 Gbps :

Rogers with their current cable offering can only hit a maximum speed of 1 Gbps downstream and a rather pathetic and uncompetitive 30 Mbps upstream. Which when compared to this new offering from Bell isn’t in the same league.

Well, it seems that Rogers still has some fight left in them. The company announced this today:

As leaders in network technology, Rogers announced today that it has successfully completed tests in both lab and customer trials of download and upload speeds of up to 8 Gigabits per second (Gbps) on its fibre-powered network, more than doubling the fastest published Internet speeds of any major provider in Canada. Building on its commitment to provide leading next-generation products and services to its customers, the potential of 8 Gbps speeds will elevate and future-proof home broadband with more bandwidth, making it even easier to stream, work, surf, and game online on even more devices simultaneously.

If they can actually roll this out to homes and it hits these speeds, then Rogers is back in the game. But before you stop traffic and hold a parade outside the Rogers HQ at 1 Mount Pleasant Rd, there’s this:

Rogers new Ignite Internet, offering download and upload speeds of 8 Gbps, will be available in Summer 2022 for customers in select areas across Ontario, New Brunswick and Newfoundland.

That “select areas” part is what gets my attention. That could mean that Rogers is rolling this out to new developments rather than existing areas that Rogers serves. Which means that if you’re a existing Rogers customer, you might not see any benefit from this announcement. At least not for a very long time. Thus why this is a great announcement, it would be in Rogers best interest to disclose where this will be rolled out specifically and get it into as many places as possible ASAP. Otherwise this will end up being a nothing announcement.

Slingshot: The Digital Workplace That Connects Everyone You Work  With to Everything They Need to Get Work Done

Posted in Commentary with tags on April 19, 2022 by itnerd

Slingshot, the digital workplace that connects everyone you work with to everything they need to get work done, today launches to organizations across the U.S. The new digital workplace streamlines companies’ workplace tech stacks by giving remote, in-person and hybrid teams a single place to collaborate, make data-driven decisions, set goals, share content and communicate within the context of the projects they’re working on. Slingshot is available as a desktop app (Mac and Windows) and mobile app (Apple App Store and Google Play), and can be accessed on any web browser at slingshotapp.io. The platform was built by the Infragistics Innovation Lab, the experimental arm of software company Infragistics.  

The workplace is no longer a single physical space that team members occupy during a fixed set of working hours. And teams are often composed of in-house employees, freelance talent and vendor organizations, sometimes spread across time zones and geographic locations. To adapt to this new reality, companies have scrambled to adopt new tools, but have ended up with more than they need. As a result, team members are spending their time switching from one app to the next to figure out where conversations happened, where content is stored, what others are working on, and where they can find the data they need to make decisions. 

Slingshot eliminates these obstacles so that teams–no matter where they are–can work smarter, make better decisions, and achieve optimal results. Its project management interface features native chat functionality, content-sharing, and a data catalog that acts as a central location for the data that matters to an organization, so teams can make informed decisions through dashboards.

An end to app-switching and interrupted workflows.

When companies use different apps for everything that goes into work–communication, file storage, project management, running analytics–team members have too many places to search for the things they need to do their jobs. 

Slingshot puts an end to constant app switching and increases productivity and efficiency by bringing together everything teams need in one place:

  • Project management – Slingshot creates a project control center for teams, where they can easily track the progress of every project and its success. Teams can set start and end dates for projects, break their work down into tasks and sub-tasks, and give ownership to each task for clear accountability. 
  • Data analytics – Every team member has access to an organization’s data and can quickly find the insights they need, when they need them most. With Slingshot, teams can easily integrate different data sources, machine learning models and create visual dashboards with one-click to drive better decisions.
  • Content management – Instead of wasting hours hunting for documents and files across applications, teams can bring together and organize content into structured, contextual views. Slingshot integrates  with OneDrive, Google Drive, Dropbox, Box and SharePoint. Users can also add in direct URLs, images and upload local files directly into the platform.
  • Chat – Teams can have group conversations through threaded discussions or comment directly on specific content and data so that conversations happen in context, rather than separate from the project or process at hand. Users can mention a specific person or people to grab their attention, or collaborate one-on-one through direct messaging.

Democratize data across multiple teams to create a data-driven culture.

Teams often don’t have a quick, holistic lens into the data they need to make critical decisions and move projects forward. This is because data is spread across several systems, channels and gatekeepers, and requires analysis to make it actionable. 

Slingshot brings the power of an integrated business intelligence (BI) machine into the daily workflow, allowing everyone within the organization to not only access data but analyze it through the creation of visual dashboards. This breaks down silos–and eliminates the idea that the most senior, or loudest, person in the room is right. 

  • Connect multiple data sources. Slingshot gives teams a full view of key business insights by bringing together analytics from multiple data sources, including databases and spreadsheets (e.g. Excel and Google Sheets), SaaS systems, Big Data and Cloud data products (e.g., Google Analytics, BigQuery, Snowflake, Azure SQL, Synapse, AWS Athena, Redshift and S3 storage). It additionally integrates with finanicial, marketing and sales tools, including, Salesforce Marketing Cloud, HubSpot, Marketo, Google Console, social media channels (Facebook, Twitter, Linkedin, Instagram) and business tools, including Quickbooks, Microsoft Dynamics and Salesforce.
  • Introduce a centralized Data Catalog for the organization. Companies have an overabundance of data but team members either can’t find what they need or don’t know what to look for. Slingshot’s data catalog functionality acts as an organization’s single source of trusted information so that users can see what data the organization possesses, and easily access it the moment they need it. 
  • Create data visualization dashboards. Rather than stare at spreadsheets of raw data, teams can create multi-source visualizations to identify trends, assess performance and forecast the next best steps for a given project–or the business. Team members can go quickly from a pinned Excel file, for instance, into the Slingshot visualization editor to create dashboards. This lets them validate or disqualify their decisions and empowers them to move forward.
  • Create data-driven discussions directly from insights. Team members can start discussions directly within the Analytics section and comment on specific dashboards for in-context collaboration and iteration.

Empower Teams with Clarity on Priorities, Workload and Expectations. 

Team members often feel overloaded, unsure of priorities and afraid to say no, even when they have too much work on their plates. And Leaders are left scrambling when team members don’t focus on the highest-value task or don’t hold themselves accountable, and often fail to meet deadlines or goals as a result.

Slingshot increases visibility between team members and leaders, so teams can focus on what matters the most and work productively to drive business results.

  • Align on priorities that impact the bottom line. Where teams spend their time is where their priorities lie, but often, these don’t align with an organization’s larger goals. Slingshot aligns teams on goals and objectives so team members can prioritize their work accordingly and focus on the highest-value items that will drive business results.
  • Increase visibility into projects and teams. With Slingshot, team leaders can see what team members are working on–at any given moment–to avoid overloading them. And team members can see what other colleagues are working on to identify any blockers before a project is at risk.
  • Create transparency and trust: When all team members are aligned on the same goals, team leaders have peace of mind that the right things are getting done, and team members are clear on what is being asked of them and the expected outcomes. Team members can better hold themselves accountable, avoiding micromanagement from leaders, and communicate when something isn’t going according to plan.

Guida bootstrapped enterprise-software company Infragistics 32 years ago, and has since grown it to 250 employees, six global offices, and a client roster that boasts 100% of the S&P 500, including IntuitExxon and Morgan Stanley. In June 2021, Guida launched the Infragistics Innovation Fund and Lab to create freedom for internal inventors to innovate and fuel the development of new products. Slingshot is one of the newest releases from the Innovation Fund and Lab, which has invested $30M to bring the digital workplace to market.

Early users of Slingshot include cybersecurity company Sensato and packaging leader Stephen Gould. Business users can get a free trial of Slingshot at slingshotapp.io.