<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>News Archives - Zeo Technologies</title>
	<atom:link href="https://www.zeotechnologies.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.zeotechnologies.com/category/news/</link>
	<description>Zeo Technologies</description>
	<lastBuildDate>Mon, 16 Mar 2020 14:58:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.2</generator>
<site xmlns="com-wordpress:feed-additions:1">171227897</site>	<item>
		<title>Our Statement on the Coronavirus.</title>
		<link>https://www.zeotechnologies.com/our-statement-on-the-coronavirus/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 14:58:42 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=667</guid>

					<description><![CDATA[<p>The well-being of our employees and clients is our top priority, Zeo will be suspending on-site visits effective Monday, March 16th through Friday March 27th. Due to growing concerns brought upon by COVID-19, we have decided that this decision is in the best interest of our clients, staff and the public at large.   Remote issues, server outages and mission critical problems will still be addressed, however, may require&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/our-statement-on-the-coronavirus/">Our Statement on the Coronavirus.</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="" data-block="true" data-editor="9lp9g" data-offset-key="2ck99-0-0">
<div class="_1mf _1mj" data-offset-key="2ck99-0-0"><span data-offset-key="2ck99-0-0">The well-being of our employees and clients is our top priority, Zeo will be suspending on-site visits effective Monday, March 16th through Friday March 27th. Due to growing concerns brought upon by COVID-19, we have decided that this decision is in the best interest of our clients, staff and the public at large. </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="7b85e-0-0">
<div class="_1mf _1mj" data-offset-key="7b85e-0-0"><span data-offset-key="7b85e-0-0"> </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="duhd-0-0">
<div class="_1mf _1mj" data-offset-key="duhd-0-0"><span data-offset-key="duhd-0-0">Remote issues, server outages and mission critical problems will still be addressed, however, may require additional health safety precautions during onsite visits. Routine system repair will be suspended for the 2 week period. </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="4bn15-0-0">
<div class="_1mf _1mj" data-offset-key="4bn15-0-0"><span data-offset-key="4bn15-0-0"> </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="4tamr-0-0">
<div class="_1mf _1mj" data-offset-key="4tamr-0-0"><span data-offset-key="4tamr-0-0">We are actively monitoring the novel coronavirus (COVID-19) updates from the World Health Organization and the U.S. Centers for Disease Control and Prevention, and will continue to respond based on the best advice of governments, public health authorities and medical professionals. </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="5jque-0-0">
<div class="_1mf _1mj" data-offset-key="5jque-0-0"><span data-offset-key="5jque-0-0"> </span></div>
</div>
<div class="" data-block="true" data-editor="9lp9g" data-offset-key="csvrr-0-0">
<div class="_1mf _1mj" data-offset-key="csvrr-0-0"><span data-offset-key="csvrr-0-0">Please contact us with any questions or concerns. </span></div>
</div>
<p>The post <a href="https://www.zeotechnologies.com/our-statement-on-the-coronavirus/">Our Statement on the Coronavirus.</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">667</post-id>	</item>
		<item>
		<title>Microsoft dissolves links between features and Windows 10 releases</title>
		<link>https://www.zeotechnologies.com/microsoft-dissolves-links-between-features-and-windows-10-releases/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Wed, 08 Jan 2020 18:38:28 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[PC]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=660</guid>

					<description><![CDATA[<p>The company this week made more changes to its Windows 10 development model, changes that have implications for future releases. Microsoft this week reworked its Windows 10 development model, severing links between features and specific releases so that it can deliver the former &#8220;when they are ready.&#8221; &#8220;While features in the active development branch may be slated for a future Windows 10 release, they are no longer matched to&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/microsoft-dissolves-links-between-features-and-windows-10-releases/">Microsoft dissolves links between features and Windows 10 releases</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The company this week made more changes to its Windows 10 development model, changes that have implications for future releases.</h2>
<p>Microsoft this week reworked its Windows 10 development model, severing links between features and specific releases so that it can deliver the former &#8220;when they are ready.&#8221;<br />
&#8220;While features in the active development branch may be slated for a future Windows 10 release, they are no longer matched to a specific Windows 10 release,&#8221; Brandon LeBlanc, a senior program manager on the Windows Insider team, wrote in a Dec. 16 post to a company blog. &#8220;New features and OS improvements done in this branch during these development cycles will show up in future Windows 10 releases when they are ready.&#8221;</p>
<p>Since Windows 10&#8217;s mid-2015 launch, Microsoft has publicly linked features to their intended releases, usually by introducing them in a blog post connected to the preview build in which they debuted. Microsoft has reinforced those connections by repeatedly trumpeting major new features each time it describes the coming release. On occasion, the linkages have had to be broken as the Redmond, Wash. company retracted a feature previously scheduled for a specific release. But that has been rare.</p>
<p>(One of the most prominent features backed out of a release was Windows Sets, which had been touted in 2017 and slated for a 2018 upgrade but ended up as a no-show.)</p>
<p>The difference between the old way and LeBlanc&#8217;s description of the new may be too subtle to be noticeable by outsiders. In the past, Microsoft almost certainly did not share everything related to scheduling the contents of a then-upcoming-now-past upgrade. Just as certainly, that will be the case going forward. What Microsoft doesn&#8217;t tell customers are, to quote a former Secretary of Defense, the &#8220;unknown unknowns — the ones we don&#8217;t know we don&#8217;t know.&#8221;</p>
<p>But by claiming &#8220;when they are ready&#8221; as the guide for future features, Microsoft implied that at least some had not been so when they were baked into past upgrades. That&#8217;s a puzzling tack, even risky, if customers pause a moment to absorb the phrase and inevitably wonder, &#8220;Wait, weren&#8217;t they ready before?&#8221;</p>
<p>Microsoft&#8217;s newfound stance on &#8220;not until it&#8217;s ready&#8221; was reminiscent of browser makers, who have long used that model as they crank out seven or more new versions annually. For browser developers, it&#8217;s nothing for a feature to miss the intended &#8220;train&#8221; or version; the feature can catch the next six or eight weeks later. That was the whole point of a more-is-better release strategy.</p>
<p>The analogy doesn&#8217;t track exactly, though. That&#8217;s because new Windows 10 features can catch only two trains each year, not seven or eight (as with Chrome) or 12 or 13 (Firefox). Miss one and there&#8217;s at least a six-month wait.</p>
<p>Or double that.</p>
<p>In 2019, Microsoft launched a major release in the spring and a minor one in the fall, making the latter little more than a rerun of the former, a &#8220;service pack&#8221; retread with few new features, none of significance. If Microsoft maintains that cadence in 2020 and beyond, delayed features of substance could be postponed a full year.</p>
<h3>Speaking of major and minor&#8230;.</h3>
<p>Microsoft has yet to answer one of the questions about Windows 10 from 2019: Is the major (spring) and minor (fall) upgrade slate a one-off or the new normal?</p>
<p>More than a month ago, Computerworld predicted that Microsoft would tip its hand when it started previewing the version of Windows that was to follow 2004, the Spring 2020 upgrade that by accounts is finished or nearly so. If Microsoft began seeding Insider participants with early code for 21H1 (Microsoft&#8217;s code name for the upgrade eventually released in Spring 2021), 2020 would repeat the cadence of 2019, a major, then a minor release. But if Microsoft instead slotted next year&#8217;s second upgrade, 21H2, into Insider, it would be evidence that it was reverting to the 2017-2018 model of two relatively equal feature upgrades.</p>
<p>What Computerworld failed to consider — like someone asked to predict a coin flip not accounting for it to end on its edge — was neither. By separating features from specific releases, Microsoft is able to dodge the question of what comes after Windows 10 2004. What it will preview via Insider could be destined for 20H2, 21H1 or neither.</p>
<p>Nor did Le Blanc give any clues. &#8220;We may deliver these new features and OS improvements as full OS build updates or servicing releases,&#8221; he wrote, covering both major (full OS) and minor (servicing) releases.</p>
<p>Cynics might be tempted to see the whole instance — the talk of &#8220;when they are ready&#8221; — as a smokescreen that lets Microsoft put off deciding which upgrade cadence to adopt for 2020. There may be something to that: Microsoft has said it is &#8220;closely monitoring feedback&#8221; from the major-minor &#8220;pilot&#8221; of 2019. What with the year&#8217;s minor refresh, 1909, having been available for just a month and seeing as how businesses have likely done next to nothing with the service pack since, there probably is little to no feedback to monitor at this point. The firm may want more time to evaluate the 2019 cadence and whether it worked for the most important customers, enterprises.</p>
<p>By claiming that no feature will be assigned a specific upgrade before its time, Microsoft can continue to issue new code for Insiders to test without committing to a release model.</p>
<h3>Slow down</h3>
<p>Although it can be dangerous to ascribe rationales to decisions others make — it risks organizing something without coherence — that&#8217;s not stopped Computerworld.<br />
Separating features from releases so that the former is added to the latter only &#8220;when they are ready&#8221; may signal that Microsoft expects a slow, if not necessarily slower, upgrade pace — one that is, if nothing else, unhurried.</p>
<p>(If so, the debacle of Windows 10 1809 must still sting in Redmond more so than it has let on publicly. By slowing down the release tempo, Microsoft and its Insiders get more time to test.)</p>
<p>That, in turn, hints at the slower of the two cadences in question: 2019&#8217;s major-minor releases.</p>
<p>But if that is to be the case, why bother changing the feature-release relationship? Assuming the tempo of this year is retained next, what&#8217;s the purpose of Microsoft saying &#8220;((features)) are no longer matched to a specific Windows 10 release&#8221;?</p>
<p>Is it because the linkage will be increasingly unimportant, and because there will be really just one feature upgrade annually? What, exactly, was the purpose of this year&#8217;s 1909, an update that was in no way an upgrade, what with so few new features, enhancements or improvements over 1903? Was it only to have a release that qualified for 30 months of support for Windows 10 Enterprise users?</p>
<p>That could be arranged without the hassle of building a Potemkin upgrade for the fall: Simply announce that the spring refresh, the one that actually includes new functionality and features, will be supported for 30 months on Windows 10 Enterprise and Windows 10 Education.</p>
<p>And then boot the fall upgrade so that there&#8217;s only one each year.</p>
<p>Source:  <a href="https://www.computerworld.com/article/3510649/microsoft-dissolves-links-between-features-and-windows-10-releases.html" target="_blank" rel="noopener noreferrer">ComputerWorld</a></p>
<p>The post <a href="https://www.zeotechnologies.com/microsoft-dissolves-links-between-features-and-windows-10-releases/">Microsoft dissolves links between features and Windows 10 releases</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">660</post-id>	</item>
		<item>
		<title>Cisco issues critical security warnings its Data Center Network Manager</title>
		<link>https://www.zeotechnologies.com/cisco-issues-critical-security-warnings-its-data-center-network-manager/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Tue, 07 Jan 2020 17:01:50 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=643</guid>

					<description><![CDATA[<p>Cisco warns of vulnerabilities that can let attackers issue arbitrary actions with administrative permissions. Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches. DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/cisco-issues-critical-security-warnings-its-data-center-network-manager/">Cisco issues critical security warnings its Data Center Network Manager</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Cisco warns of vulnerabilities that can let attackers issue arbitrary actions with administrative permissions.</h3>
<p>Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches.</p>
<p>DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and real-time health details for fabric, devices, and network topology.  Cisco said that there were three exposures, which it rated as a 9.8 out of 10 on the Common Vulnerability Scoring System, in the DCNM authentication mechanisms that could let a remote attacker bypass authentication and execute arbitrary actions with administrative privileges on vulnerable devices.</p>
<p>Cisco said that the vulnerabilities are independent of each other so exploitation of one is not required to exploit another. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the others, the company said.</p>
<p><strong>The critical weaknesses include:</strong></p>
<p>REST API authentication bypass vulnerability: A vulnerability in the REST API endpoint of Cisco DCNM could allow a remote attacker to bypass authentication. “The vulnerability exists because a static encryption key is shared between installations. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges,” Cisco stated.</p>
<p>SOAP API authentication bypass vulnerability: A weakness in the SOAP API endpoint of Cisco DCNM could let an unauthenticated, remote attacker to bypass authentication on an affected device. Like the REST vulnerability, this problem exists because a static encryption key is shared between installations. Exploits could allow arbitrary actions through the SOAP API with administrative privileges.</p>
<p>Authentication-bypass vulnerability: A weakness in the web-based management interface of Cisco DCNM could also let remote attackers bypass authentication on an affected device. Again, the vulnerability is due to the presence of static credentials that and an attacker could exploit by using them to authenticate against the user interface, Cisco stated. “A successful exploit could allow the attacker to access a specific section of the web interface and obtain certain confidential information from an affected device. This information could be used to conduct further attacks against the system,” Cisco stated.</p>
<p>There are no workarounds that address these vulnerabilities but Cisco has released a DCNM software version that address the problems, the company stated. Cisco said it is not aware of any public announcements about or malicious use of the DCNM vulnerabilities.</p>
<h2>Less severe vulnerabilities</h2>
<p>There were numerous additional DCNM vulnerabilities involving the REST and SOAP APIs  with “high” to “medium” threat ratings including:<br />
REST API SQL-injection vulnerability: A vulnerability in the REST API of Cisco DCNM could let an authenticated, remote attacker with administrative privileges execute arbitrary SQL commands on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API and an attacker could exploit this vulnerability by sending a crafted request to the API, Cisco wrote. A successful exploit could let an attacker view information that they are not authorized to view, make changes to the system that they are not authorized to make, or execute commands within the underlying operating system that may affect the availability of the system.</p>
<p>REST API path-traversal vulnerability: A vulnerability in the REST API of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges to conduct directory-traversal attacks on an affected device. An attacker could exploit this vulnerability by sending a crafted request to the API, which could allow the attacker to read, write, or execute arbitrary files in the system with full administrative privileges. The exposure is due to insufficient validation of user-supplied input to the API, Cisco wrote.</p>
<p>REST API command-injection vulnerability: A weakness in the REST API of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges on the DCNM application to inject arbitrary commands on the underlying OS. An attacker could exploit this vulnerability by sending a crafted request to the API and could let an attacker execute arbitrary commands on the device with full administrative privileges. The vulnerability is due to insufficient validation of user-supplied input to the API, Cisco stated.</p>
<p>SOAP API SQL-injection vulnerability: A weakness in the SOAP API of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges to execute arbitrary SQL commands on an affected device. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, or execute commands within the underlying operating system that may affect the availability of the device. The problem is due to insufficient validation of user-supplied input to the API, Cisco wrote.</p>
<p>SOAP API path-traversal vulnerability: A vulnerability in the SOAP API of DCNM could allow an authenticated, remote attacker with administrative privileges to conduct directory-traversal attacks on an affected device. A successful exploit could allow the attacker to read, write, or execute arbitrary files in the system with full administrative privileges. Cisco said the vulnerability is due to insufficient validation of user-supplied input to the API.</p>
<p>SOAP API command injection vulnerability: A vulnerability in the SOAP API of DCNM could let an authenticated, remote attacker with administrative privileges on the DCNM application inject arbitrary commands on the underlying OS. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could let an attacker execute arbitrary commands on the device with full administrative privileges. Cisco said the vulnerability is due to insufficient validation of user-supplied input to the API.</p>
<p>Path-traversal vulnerability: A vulnerability in the Application Framework feature of DCNM could allow an authenticated, remote attacker with administrative privileges to conduct directory traversal attacks on an affected device. An attacker could exploit this vulnerability by sending a crafted request to the application. A successful exploit could allow the attacker to read, write, or execute arbitrary files in the system with full administrative privileges. The vulnerability is due to insufficient validation of user-supplied input to the Application Framework endpoint, Cisco stated.</p>
<p>Cisco has released software updates that address the vulnerabilities.</p>
<p>Cisco said it fixed all of the vulnerabilities in Cisco DCNM Software releases 11.3.1 and later.</p>
<p>This story, &#8220;Cisco issues critical security warnings its Data Center Network Manager &#8221; was originally published by <a href="https://www.networkworld.com/" target="_blank" rel="noopener noreferrer">Network World</a>.</p>
<p>The post <a href="https://www.zeotechnologies.com/cisco-issues-critical-security-warnings-its-data-center-network-manager/">Cisco issues critical security warnings its Data Center Network Manager</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">643</post-id>	</item>
		<item>
		<title>Windows 10 version 2004 gets one step closer to public release</title>
		<link>https://www.zeotechnologies.com/windows-10-version-2004-gets-one-step-closer-to-public-release/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Tue, 07 Jan 2020 16:00:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[windows update]]></category>
		<guid isPermaLink="false">https://www.zeotechnologies.com/?p=646</guid>

					<description><![CDATA[<p>The November 2019 Update rollout has completed and Microsoft has been working on Windows 10 version 2004, also referred to as 20H1, for early 2020 release. According to a new report, Microsoft finalized the development of Windows 10 version 2004 in December 2019, but it looks like the public rollout won’t happen until the spring. It’s unclear if Microsoft is moving forward with its classic rollout schedule, but right&#8230;</p>
<p>The post <a href="https://www.zeotechnologies.com/windows-10-version-2004-gets-one-step-closer-to-public-release/">Windows 10 version 2004 gets one step closer to public release</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The November 2019 Update rollout has completed and Microsoft has been working on Windows 10 version 2004, also referred to as 20H1, for early 2020 release. According to a new <a href="https://youtu.be/-7C_dyx-RRs?t=491" target="_blank" rel="nofollow noopener noreferrer">report</a>, Microsoft finalized the development of Windows 10 version 2004 in December 2019, but it looks like the public rollout won’t happen until the spring.</p>
<p>It’s unclear if Microsoft is moving forward with its classic rollout schedule, but right now it simply seems like the public launch won’t happen earlier than the spring.</p>
<p>Although Microsoft has most likely finalized the development of the next major update in December 2019, Windows 10 version ‘2004’ suggests that the update could go live for devices in April or May.</p>
<p>While other details are not yet available, Windows 10 Build 19041 is said to be the final candidate or the foundation of the upcoming cumulative updates. Don’t be surprised if a slightly newer build is tested or additional patches are released for this particular build over the next couple of months.</p>
<p>It’s worth noting that Windows 10 Build 19041 has dropped preview watermark on the desktop, which suggests the update is close to completion.</p>
<p>Also, Microsoft hasn’t commented on the current status of Windows 10 version 2004 ‘RTM’ candidate and 20H1 will receive further improvements ahead of its spring launch.</p>
<p>After Windows 10 20H1, Microsoft is expected to roll out Windows 10 20H2 in the second half of 2020 and it could be another minor release like Windows 10 November 2019 Update.</p>
<h2>Windows 10 version 2004 is a major update</h2>
<p>November 2019 Update felt light on new features compared to prior releases. For Windows 10 v2004, there’s a grab bag of new additions and noticeable performance improvement.<br />
One of the key features of the update is Cloud Reset. If you don’t have a recovery drive and local reset is not working for you, you now have the option of entirely re-downloading Windows 10 from Microsoft website during a reset operation.</p>
<p>Another new feature is bandwidth limits for Windows Update. This gives users more control over bandwidth used for downloading Windows Update and Microsoft Store app updates. With Windows 10 20H1, you can set absolute bandwidth limit in Mbps and throttle downloading of updates more accurately.</p>
<p>Microsoft has also focused on performance and rough areas of Windows in this release. For instance, Windows search will get faster on PCs by eliminating excessive disk and CPU usage.</p>
<p>Source:  <a href="https://www.windowslatest.com/2020/01/02/windows-10-version-2004-rtm-rumour/" target="_blank" rel="noopener noreferrer">WindowsLatest.com</a></p>
<p>The post <a href="https://www.zeotechnologies.com/windows-10-version-2004-gets-one-step-closer-to-public-release/">Windows 10 version 2004 gets one step closer to public release</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">646</post-id>	</item>
		<item>
		<title>Welcome to our new website</title>
		<link>https://www.zeotechnologies.com/welcome-to-our-new-website/</link>
		
		<dc:creator><![CDATA[Zeo Technologies]]></dc:creator>
		<pubDate>Wed, 06 Feb 2019 07:21:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://www.zeotechnologies.com?p=211</guid>

					<description><![CDATA[<p>If you are reading this blog post, you must realize there is something different about our website. Our new website launched last Wednesday, the 6th of February after a lot of hard work and dedication. We have added a colorful boost with up-to-date information and upgraded user accessibility.</p>
<p>The post <a href="https://www.zeotechnologies.com/welcome-to-our-new-website/">Welcome to our new website</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you are reading this blog post, you must realize there is something different about our website. Our new website launched last Wednesday, the 6th of February after a lot of hard work and dedication. We have added a colorful boost with up-to-date information and upgraded user accessibility.</p>
<p>The post <a href="https://www.zeotechnologies.com/welcome-to-our-new-website/">Welcome to our new website</a> appeared first on <a href="https://www.zeotechnologies.com">Zeo Technologies</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">211</post-id>	</item>
	</channel>
</rss>
