Month: May 2024
New Blog | Microsoft Security Exposure Management Graph: unveiling the power
Introduction
In the complicated and rapidly evolving realm of cybersecurity, Exposure Management plays a pivotal role in fortifying organization’s defenses against potential threats. To empower security teams, Microsoft Security Exposure Management has unveiled two new powerful tables within
Advanced Hunting: ExposureGraphNodes and ExposureGraphEdges.
The introduction of these tables opens novel capabilities for security teams. It enables efficient investigation of security posture across organizational assets. This is the first in a series of posts where we will present the tables and share investigation scenarios (along with relevant queries) for Advanced Hunting. These queries unlock capabilities that were previously unattainable. We’ll provide screenshots and Kusto Query Language snippets to guide you through your reading.
Understanding the tables
As John Lambert’s saying that is well-known in the security domain goes, ‘Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.’ By exposing the context around each asset, relations between assets and the graph-based toolset for exploring them, we hope to start changing this.
Read the full post here: Microsoft Security Exposure Management Graph: unveiling the power
By Andrey Karpovsky
Introduction
In the complicated and rapidly evolving realm of cybersecurity, Exposure Management plays a pivotal role in fortifying organization’s defenses against potential threats. To empower security teams, Microsoft Security Exposure Management has unveiled two new powerful tables within Advanced Hunting: ExposureGraphNodes and ExposureGraphEdges.
The introduction of these tables opens novel capabilities for security teams. It enables efficient investigation of security posture across organizational assets. This is the first in a series of posts where we will present the tables and share investigation scenarios (along with relevant queries) for Advanced Hunting. These queries unlock capabilities that were previously unattainable. We’ll provide screenshots and Kusto Query Language snippets to guide you through your reading.
Understanding the tables
As John Lambert’s saying that is well-known in the security domain goes, ‘Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.’ By exposing the context around each asset, relations between assets and the graph-based toolset for exploring them, we hope to start changing this.
Read the full post here: Microsoft Security Exposure Management Graph: unveiling the power Read More
New Blog | Best Practices to Manage and Mitigate Security Recommendations
In the fast-evolving landscape of cloud security, Microsoft Defender for Cloud (MDC) stands as a robust Cloud Native Application Protection Platform (CNAPP). One of its standout features is the premium Cloud Security Posture Management (CSPM) solution, known as Defender CSPM. Among the myriads of advanced capabilities offered by Defender CSPM, the “Governance Rule” feature is a game-changer. This empowers security teams to streamline and automate the assignment, management, and tracking of security recommendations.
In this blog, we’ll delve into best practices for leveraging Governance Rule to ensure effective, efficient, and timely remediation actions and explore practical use cases for maximizing its potential.
Understanding Governance Rule
Governance Rule in Defender CSPM is designed to simplify the management of security recommendations by enhancing accountability. You can define rules that assign an owner and a due date for addressing recommendations for specific resources. This provides resource owners with a clear set of tasks and deadlines for remediating recommendations. By making the assignment and tracking of these tasks more visible, Governance Rule ensures that critical security issues are promptly addressed, reducing the risk of breaches and enhancing overall security posture.
Best Practices for Utilizing Governance Rule
Define Clear Remediation Ownership
Assigning remediation tasks to specific owners is crucial for accountability. Governance Rule allows you to specify who is responsible for each security recommendation. Ensure that each task is assigned to the most appropriate individual or team with the necessary expertise and authority to address the issue. Clear ownership helps avoid confusion and ensures that remediation actions are taken seriously.
Set Realistic ETAs and Grace Periods
Establishing realistic Estimated Time of Arrival (ETA) and grace periods for remediation tasks is essential for maintaining a balance between urgency and feasibility. Overly aggressive timelines can lead to rushed and potentially ineffective fixes, while overly lenient deadlines may delay critical security improvements. Analyze the complexity and impact of each security finding to set achievable timelines that encourage timely resolution without compromising quality.
Prioritize Based on Risk
Not all security recommendations are created equal. Use severity-based prioritization to determine which issues need immediate attention and which can be scheduled for later remediation. Defender CSPM’s Governance Rule allows you to categorize tasks based on their severity and potential impact on your organization’s security posture. Focus on high-severity findings first to mitigate the most significant threats promptly.
Automate Workflow Integration
Leverage the automation capabilities of Governance Rule to integrate remediation workflows with your existing security tools and processes. Automated notifications, status updates, and task assignments can significantly reduce manual effort and improve coordination across teams. By integrating these workflows, you ensure that security recommendations are seamlessly managed from detection to resolution.
Regularly Monitor and Adjust Rules
The dynamic nature of cloud environments means that security needs can change rapidly. Regularly review and adjust your Governance Rules to ensure they remain aligned with your organization’s security objectives and compliance requirements. Monitor the performance of these rules and gather feedback from your security teams to identify areas for improvement.
Foster a Culture of Continuous Improvement
Encourage a culture where continuous improvement is the norm. Use insights gained from the Governance Rule feature to identify recurring security issues and root causes. Implement lessons learned to refine your security policies and practices, reducing the likelihood of similar issues arising in the future.
Before you begin
The Defender Cloud Security Posture Management (CSPM) plan must be enabled.
You need Contributor, Security Admin, or Owner permissions on the Azure subscriptions.
For AWS accounts and GCP projects, you need Contributor, Security Admin, or Owner permissions on the Defender for Cloud AWS or GCP connectors.
Read the full post here: Best Practices to Manage and Mitigate Security Recommendations
By Giulio Astori
In the fast-evolving landscape of cloud security, Microsoft Defender for Cloud (MDC) stands as a robust Cloud Native Application Protection Platform (CNAPP). One of its standout features is the premium Cloud Security Posture Management (CSPM) solution, known as Defender CSPM. Among the myriads of advanced capabilities offered by Defender CSPM, the “Governance Rule” feature is a game-changer. This empowers security teams to streamline and automate the assignment, management, and tracking of security recommendations.
In this blog, we’ll delve into best practices for leveraging Governance Rule to ensure effective, efficient, and timely remediation actions and explore practical use cases for maximizing its potential.
Understanding Governance Rule
Governance Rule in Defender CSPM is designed to simplify the management of security recommendations by enhancing accountability. You can define rules that assign an owner and a due date for addressing recommendations for specific resources. This provides resource owners with a clear set of tasks and deadlines for remediating recommendations. By making the assignment and tracking of these tasks more visible, Governance Rule ensures that critical security issues are promptly addressed, reducing the risk of breaches and enhancing overall security posture.
Best Practices for Utilizing Governance Rule
Define Clear Remediation OwnershipAssigning remediation tasks to specific owners is crucial for accountability. Governance Rule allows you to specify who is responsible for each security recommendation. Ensure that each task is assigned to the most appropriate individual or team with the necessary expertise and authority to address the issue. Clear ownership helps avoid confusion and ensures that remediation actions are taken seriously.
Set Realistic ETAs and Grace PeriodsEstablishing realistic Estimated Time of Arrival (ETA) and grace periods for remediation tasks is essential for maintaining a balance between urgency and feasibility. Overly aggressive timelines can lead to rushed and potentially ineffective fixes, while overly lenient deadlines may delay critical security improvements. Analyze the complexity and impact of each security finding to set achievable timelines that encourage timely resolution without compromising quality.
Prioritize Based on RiskNot all security recommendations are created equal. Use severity-based prioritization to determine which issues need immediate attention and which can be scheduled for later remediation. Defender CSPM’s Governance Rule allows you to categorize tasks based on their severity and potential impact on your organization’s security posture. Focus on high-severity findings first to mitigate the most significant threats promptly.
Automate Workflow IntegrationLeverage the automation capabilities of Governance Rule to integrate remediation workflows with your existing security tools and processes. Automated notifications, status updates, and task assignments can significantly reduce manual effort and improve coordination across teams. By integrating these workflows, you ensure that security recommendations are seamlessly managed from detection to resolution.
Regularly Monitor and Adjust Rules
The dynamic nature of cloud environments means that security needs can change rapidly. Regularly review and adjust your Governance Rules to ensure they remain aligned with your organization’s security objectives and compliance requirements. Monitor the performance of these rules and gather feedback from your security teams to identify areas for improvement.
Foster a Culture of Continuous Improvement
Encourage a culture where continuous improvement is the norm. Use insights gained from the Governance Rule feature to identify recurring security issues and root causes. Implement lessons learned to refine your security policies and practices, reducing the likelihood of similar issues arising in the future.
Before you begin
The Defender Cloud Security Posture Management (CSPM) plan must be enabled.
You need Contributor, Security Admin, or Owner permissions on the Azure subscriptions.
For AWS accounts and GCP projects, you need Contributor, Security Admin, or Owner permissions on the Defender for Cloud AWS or GCP connectors.
Read the full post here: Best Practices to Manage and Mitigate Security Recommendations Read More
ProcDump 3.3 for Linux and Process Explorer v17.06
Microsoft Tech Community – Latest Blogs –Read More
VBA to save a xlsm as an xlsm
I have the following macro which I now want to save the file as a .xlsm file type rather than an xls
I’ve tried various permutations and nothing has changed the file type!
Is anyone able to help please?
Sheets(“Control Sheet”).Select
Range(“d5”).Copy
Range(“e5”).PasteSpecial Paste:=xlPasteValues
Dim fPath
Dim fName
With Application.FileDialog(msoFileDialogFolderPicker)
If .Show = True Then
fPath = .SelectedItems(1) & “”
fName = fPath & Range(“e5”).Value & “.xls”
Call MsgBox(fName, vbInformation, “Save Path”)
ThisWorkbook.SaveAs Filename:=fName
Range(“e5”).Select
Selection.ClearContents
Range(“c5”).Select
Sheets(“Preparer”).Select
Range(“c13”).Select
End If
End With
End Sub
I have the following macro which I now want to save the file as a .xlsm file type rather than an xls I’ve tried various permutations and nothing has changed the file type! Is anyone able to help please? Sheets(“Control Sheet”).SelectRange(“d5”).CopyRange(“e5”).PasteSpecial Paste:=xlPasteValuesDim fPathDim fNameWith Application.FileDialog(msoFileDialogFolderPicker)If .Show = True ThenfPath = .SelectedItems(1) & “”fName = fPath & Range(“e5”).Value & “.xls”Call MsgBox(fName, vbInformation, “Save Path”)ThisWorkbook.SaveAs Filename:=fNameRange(“e5”).SelectSelection.ClearContentsRange(“c5”).SelectSheets(“Preparer”).SelectRange(“c13”).SelectEnd IfEnd WithEnd Sub Read More
VBA to save a xlsm as an xlsx
I have the following macro which I now want to save the file as a .xlsx file type rather than a macro-enabled workbook.
I’ve tried various permutations and nothing has changed the file type!
Is anyone able to help please?
PS It would also be great if it didn’t give the warning that the macros will no longer work!
Sheets(“Control Sheet”).Select
Range(“d5”).Copy
Range(“e5”).PasteSpecial Paste:=xlPasteValues
Dim fPath
Dim fName
With Application.FileDialog(msoFileDialogFolderPicker)
If .Show = True Then
fPath = .SelectedItems(1) & “”
fName = fPath & Range(“e5”).Value & “.xls”
Call MsgBox(fName, vbInformation, “Save Path”)
ThisWorkbook.SaveAs Filename:=fName
Range(“e5”).Select
Selection.ClearContents
Range(“c5”).Select
Sheets(“Preparer”).Select
Range(“c13”).Select
End If
End With
End Sub
I have the following macro which I now want to save the file as a .xlsx file type rather than a macro-enabled workbook.I’ve tried various permutations and nothing has changed the file type!Is anyone able to help please?PS It would also be great if it didn’t give the warning that the macros will no longer work!Sheets(“Control Sheet”).SelectRange(“d5”).CopyRange(“e5”).PasteSpecial Paste:=xlPasteValuesDim fPathDim fNameWith Application.FileDialog(msoFileDialogFolderPicker)If .Show = True ThenfPath = .SelectedItems(1) & “”fName = fPath & Range(“e5”).Value & “.xls”Call MsgBox(fName, vbInformation, “Save Path”)ThisWorkbook.SaveAs Filename:=fNameRange(“e5”).SelectSelection.ClearContentsRange(“c5”).SelectSheets(“Preparer”).SelectRange(“c13”).SelectEnd IfEnd WithEnd Sub Read More
Complex (for me!) lookup formula – help please….
I need an Excel formula to return a lookup value based on date. The lookup dates and values (exchange rates for each date) are arranged in two columns per year.
More detail in this sample spreadsheet.
Can anyone help?
Thank you in advance!
I need an Excel formula to return a lookup value based on date. The lookup dates and values (exchange rates for each date) are arranged in two columns per year.More detail in this sample spreadsheet. Can anyone help? Thank you in advance! Read More
Top Stories: May 28, 2024
News and events you don’t want to miss.
English Top Stories: May 28, 2024 | Microsoft
Français À la une : 28 mai 2024 | Microsoft
Español Novedades más relevantes: 28 de mayo de 2024 | Microsoft
Português Notícias principais: 28 de maio de 2024 | Microsoft
News and events you don’t want to miss.
English Top Stories: May 28, 2024 | Microsoft
Français À la une : 28 mai 2024 | Microsoft
Español Novedades más relevantes: 28 de mayo de 2024 | Microsoft
Português Notícias principais: 28 de maio de 2024 | Microsoft Read More
Cannot transfer schema using NTDSUTIL
When trying to transfer operational control to a new A/D server, I tried to use the GUI but it would not show the new A/D. I found a note which indicated to use NTDSUTIL to perform the task. When issueing the commands:
roles
connections
connect to server dc1 – put the target DC server’s name here
quit
transfer infrastructure master
transfer naming master
transfer pdc
transfer rid master
transfer schema master
quit
quit
Everything appears to be fine, however, when I issue the netdom query fsmo, all of the roles refer to the new server, but the Schema Master still points to the existing A/D server. I am part of the schema admin group but I don’t know what else to do except maybe to use the Seize option which appears to be a last resort. What other settings should I look for?
When trying to transfer operational control to a new A/D server, I tried to use the GUI but it would not show the new A/D. I found a note which indicated to use NTDSUTIL to perform the task. When issueing the commands:rolesconnectionsconnect to server dc1 – put the target DC server’s name herequittransfer infrastructure mastertransfer naming mastertransfer pdctransfer rid mastertransfer schema masterquitquit Everything appears to be fine, however, when I issue the netdom query fsmo, all of the roles refer to the new server, but the Schema Master still points to the existing A/D server. I am part of the schema admin group but I don’t know what else to do except maybe to use the Seize option which appears to be a last resort. What other settings should I look for? Read More
PROBLEMAS NA ATUALIZAÇÃO DO WINDOWS INSIDER.
//Toda vez que tento atualizar o windows insider da erro
//Chega a baixar e instalar até 100%, mas quando completa, dá erro
//Vários programas e até mesmo a aba de “segurança do windows” não abrem
//Não obtive sucesso em resolver som o suporte também
//Toda vez que tento atualizar o windows insider da erro//Chega a baixar e instalar até 100%, mas quando completa, dá erro//Vários programas e até mesmo a aba de “segurança do windows” não abrem//Não obtive sucesso em resolver som o suporte também Read More
send an attachement file received in forms
Hey pros !
So i’ve been struggling with this.
I have a form with only 5 questions, one of them would be a file upload that is mandatory.
I was able to get it but only with a link to my onedrive and the original name
But what i need is to :
Receive an email with only the file (might be pdf or jpeg or whatever) they have sent in the form
I need it to be named after question #1 and #2.
Sorry its in french
Hey pros !So i’ve been struggling with this. I have a form with only 5 questions, one of them would be a file upload that is mandatory.I was able to get it but only with a link to my onedrive and the original name But what i need is to :Receive an email with only the file (might be pdf or jpeg or whatever) they have sent in the formI need it to be named after question #1 and #2. Sorry its in french Read More
Migrating Mailbox On-premise to the Cloud
Hello
Please i need your help on this issue.
We have over 150 active mailboxes On-Prem which we would like to migrate to the cloud.
Please how do i go about this. Is there any guidance or steps to go about it.
Hello Please i need your help on this issue. We have over 150 active mailboxes On-Prem which we would like to migrate to the cloud.Please how do i go about this. Is there any guidance or steps to go about it. Read More
Excell formula
It has been awhile since i worked on advanced formulas in excel.
I am working on a budget sheet and am having trouble on a formula to sum numbers in column F based on a range of numbers (a week of rows) in column E that can be extended to other rows (drag fill) to get a dollar amount needed for a specific day. This is what i have as of now;
=IF E3:E40,>=H46-1,and<=H46+5,SUM(F3,F40)
E is the due date column in a table
H is the reference date outside the table with the range (minus a day and plus 5 days)
F is the column of numbers in the table i want summed.
So if i put in 15 in cell H, i would like it to sum the numbers in column F that are in the range of 14-20 in column E.
Is it possible to get it to wrap around back to 1 since there are no more than 31 days in a month, rather then the range increasing to 35?
It has been awhile since i worked on advanced formulas in excel.I am working on a budget sheet and am having trouble on a formula to sum numbers in column F based on a range of numbers (a week of rows) in column E that can be extended to other rows (drag fill) to get a dollar amount needed for a specific day. This is what i have as of now;=IF E3:E40,>=H46-1,and<=H46+5,SUM(F3,F40)E is the due date column in a tableH is the reference date outside the table with the range (minus a day and plus 5 days)F is the column of numbers in the table i want summed. So if i put in 15 in cell H, i would like it to sum the numbers in column F that are in the range of 14-20 in column E.Is it possible to get it to wrap around back to 1 since there are no more than 31 days in a month, rather then the range increasing to 35? Read More
ATTENTION: Microsoft Learn Update
(Please note: Clicking on this image will provide you with a standard sized view. This update is also uploaded in a PDF format at the bottom of this post. Thank you!)
(Please note: Clicking on this image will provide you with a standard sized view. This update is also uploaded in a PDF format at the bottom of this post. Thank you!) Read More
Extract area from elipsoidal/cirle trajectory.
Dear all, how are you?
I created the following code to simulate an anticlockwise rotating trajectory forced by an external velocity. Now, I want to calculate the area each time the trajectory makes a closed circle, as described in the attached image. I would appreciate any help in finding the best way to identify the areas inside the circles for each loop/circle in the trajectory. Thanks for your time!
clear all,close all;
Fs = 1/0.5;
duration_hours = 25 * 24;
t = 0:1/Fs:duration_hours;
period = 20;
phase = -pi/2;
num_periods = floor(duration_hours / period);
amplitudes = 0.1/2 + 0.1 * rand(1, num_periods); % Random amplitudes between 0.1 and 0.3
y = zeros(size(t));
for i = 1:num_periods
start_idx = (i-1) * period * Fs + 1;
end_idx = i * period * Fs;
uI(start_idx:end_idx) = amplitudes(i) * sin(2*pi*(t(start_idx:end_idx) – t(start_idx))/period);
end
amplitudes = 0.1/2 + 0.1 * rand(1, num_periods); % Random amplitudes between 0.1 and 0.3
for i = 1:num_periods
start_idx = (i-1) * period * Fs + 1;
end_idx = i * period * Fs;
vI(start_idx:end_idx) = amplitudes(i) * sin(2*pi*(t(start_idx:end_idx) – t(start_idx))/period);
end
uI = uI(10:end);
vI = vI(1:length(uI));
cv = complex(uI*100,vI*100);
dt=0.5/24;
dt=dt*3600*24;
cxI=cumsum(cv)*dt;
cxI=cxI/100/1000;
x = real(cxI + complex(cumsum(repmat(0.1,1191,1)),0)’ );
y = imag(cxI + complex(cumsum(repmat(0.1,1191,1)),0)’ );
clearvars -except x y;
plot(x,y),axis equal;Dear all, how are you?
I created the following code to simulate an anticlockwise rotating trajectory forced by an external velocity. Now, I want to calculate the area each time the trajectory makes a closed circle, as described in the attached image. I would appreciate any help in finding the best way to identify the areas inside the circles for each loop/circle in the trajectory. Thanks for your time!
clear all,close all;
Fs = 1/0.5;
duration_hours = 25 * 24;
t = 0:1/Fs:duration_hours;
period = 20;
phase = -pi/2;
num_periods = floor(duration_hours / period);
amplitudes = 0.1/2 + 0.1 * rand(1, num_periods); % Random amplitudes between 0.1 and 0.3
y = zeros(size(t));
for i = 1:num_periods
start_idx = (i-1) * period * Fs + 1;
end_idx = i * period * Fs;
uI(start_idx:end_idx) = amplitudes(i) * sin(2*pi*(t(start_idx:end_idx) – t(start_idx))/period);
end
amplitudes = 0.1/2 + 0.1 * rand(1, num_periods); % Random amplitudes between 0.1 and 0.3
for i = 1:num_periods
start_idx = (i-1) * period * Fs + 1;
end_idx = i * period * Fs;
vI(start_idx:end_idx) = amplitudes(i) * sin(2*pi*(t(start_idx:end_idx) – t(start_idx))/period);
end
uI = uI(10:end);
vI = vI(1:length(uI));
cv = complex(uI*100,vI*100);
dt=0.5/24;
dt=dt*3600*24;
cxI=cumsum(cv)*dt;
cxI=cxI/100/1000;
x = real(cxI + complex(cumsum(repmat(0.1,1191,1)),0)’ );
y = imag(cxI + complex(cumsum(repmat(0.1,1191,1)),0)’ );
clearvars -except x y;
plot(x,y),axis equal; Dear all, how are you?
I created the following code to simulate an anticlockwise rotating trajectory forced by an external velocity. Now, I want to calculate the area each time the trajectory makes a closed circle, as described in the attached image. I would appreciate any help in finding the best way to identify the areas inside the circles for each loop/circle in the trajectory. Thanks for your time!
clear all,close all;
Fs = 1/0.5;
duration_hours = 25 * 24;
t = 0:1/Fs:duration_hours;
period = 20;
phase = -pi/2;
num_periods = floor(duration_hours / period);
amplitudes = 0.1/2 + 0.1 * rand(1, num_periods); % Random amplitudes between 0.1 and 0.3
y = zeros(size(t));
for i = 1:num_periods
start_idx = (i-1) * period * Fs + 1;
end_idx = i * period * Fs;
uI(start_idx:end_idx) = amplitudes(i) * sin(2*pi*(t(start_idx:end_idx) – t(start_idx))/period);
end
amplitudes = 0.1/2 + 0.1 * rand(1, num_periods); % Random amplitudes between 0.1 and 0.3
for i = 1:num_periods
start_idx = (i-1) * period * Fs + 1;
end_idx = i * period * Fs;
vI(start_idx:end_idx) = amplitudes(i) * sin(2*pi*(t(start_idx:end_idx) – t(start_idx))/period);
end
uI = uI(10:end);
vI = vI(1:length(uI));
cv = complex(uI*100,vI*100);
dt=0.5/24;
dt=dt*3600*24;
cxI=cumsum(cv)*dt;
cxI=cxI/100/1000;
x = real(cxI + complex(cumsum(repmat(0.1,1191,1)),0)’ );
y = imag(cxI + complex(cumsum(repmat(0.1,1191,1)),0)’ );
clearvars -except x y;
plot(x,y),axis equal; matlab, time series MATLAB Answers — New Questions
How to install PV_LIB Toolbox for Matlab
The download for PV_LIB is at:
PV_LIB Toolbox – PV Performance Modeling Collaborative (PVPMC) (sandia.gov)
I’ve looked at the Add-on Explorer and toolbox installation code in Matlab help:
Get and Manage Add-Ons – MATLAB & Simulink – MathWorks United Kingdom
Install toolbox file – MATLAB matlab.addons.toolbox.installToolbox – MathWorks United Kingdom
The problem is I can’t see anything with a .mltbx extension in the PV_LIB download. I think I only need a small relevant code snippet. Please can you advise.The download for PV_LIB is at:
PV_LIB Toolbox – PV Performance Modeling Collaborative (PVPMC) (sandia.gov)
I’ve looked at the Add-on Explorer and toolbox installation code in Matlab help:
Get and Manage Add-Ons – MATLAB & Simulink – MathWorks United Kingdom
Install toolbox file – MATLAB matlab.addons.toolbox.installToolbox – MathWorks United Kingdom
The problem is I can’t see anything with a .mltbx extension in the PV_LIB download. I think I only need a small relevant code snippet. Please can you advise. The download for PV_LIB is at:
PV_LIB Toolbox – PV Performance Modeling Collaborative (PVPMC) (sandia.gov)
I’ve looked at the Add-on Explorer and toolbox installation code in Matlab help:
Get and Manage Add-Ons – MATLAB & Simulink – MathWorks United Kingdom
Install toolbox file – MATLAB matlab.addons.toolbox.installToolbox – MathWorks United Kingdom
The problem is I can’t see anything with a .mltbx extension in the PV_LIB download. I think I only need a small relevant code snippet. Please can you advise. toolbox, pv_lib, photovoltaic, solar MATLAB Answers — New Questions
Business Applications Partner News: Week of May 28
Check out this week’s top resources to stay up-to-date on the latest Business Applications Partner News. Remember to sign up for the monthly Dynamics 365 and Power Platform partner pulse newsletters.
What to register for:
THIS WEEK!
May 28 (PDT): Optimizing Business Impact through the Microsoft Commercial Marketplace
May 28-31 (PDT): Accelerate Business Process Automation using Microsoft Power Platform Workshop
May 29: Microsoft AI Training Roadshows (Tokyo, Japan)
May 30: Copilot Studio Partner Opportunity Webinar
Closes May 31: Q4 Microsoft Catalyst Partner Training
Save the date: Join us on July 11 for MCAPS Start for Partners
What to download
Microsoft Build 2024 assets:
What’s new for Copilot Studio – Build 2024
Copilot Studio Agents Vision Deck
ISV Copilot datasheet
Build 2024 ISV quotes
What to review/like/share:
Partner Alert: Microsoft Build
Copilot Studio brings power of generative AI to ISV offerings: LinkedIn post | blog link
Majesco creates AI-driven digital assistant with Copilot Studio: LinkedIn post | blog link
Announcing Partner Center to certify and publish Power Platform Copilot connectors and plugins: LinkedIn | blog link
Directions North America recap: LinkedIn | blog link
Blog: Revolutionize the way you work with automation and AI
What to watch:
Microsoft Build replay
Welcome to the future of automation with AI flows in Power Automate
Automate your desktop with multi-modal AI
Reminders: Register for the upcoming partner events!
Events:
June 4-7 (IST), (BST): Accelerate Business Process Automation using Microsoft Power Platform Workshop
July 22: Microsoft Partner FY25 GTM Launch Event for Business Applications
Trainings:
June 11 (IST) (BST): Dynamics 365 Supply Chain Management – Demand Planning Workshop
Level Up Copilot Sales Champion training course (access code: MOKC-MCJB)
FY24 High Volume Acceleration Program (Advanced)
Check out this week’s top resources to stay up-to-date on the latest Business Applications Partner News. Remember to sign up for the monthly Dynamics 365 and Power Platform partner pulse newsletters.
What to register for:
THIS WEEK!
May 28 (PDT): Optimizing Business Impact through the Microsoft Commercial Marketplace
May 28-31 (PDT): Accelerate Business Process Automation using Microsoft Power Platform Workshop
May 29: Microsoft AI Training Roadshows (Tokyo, Japan)
May 30: Copilot Studio Partner Opportunity Webinar
Closes May 31: Q4 Microsoft Catalyst Partner Training
Save the date: Join us on July 11 for MCAPS Start for Partners
What to download
Microsoft Build 2024 assets:
What’s new for Copilot Studio – Build 2024
Copilot Studio Agents Vision Deck
ISV Copilot datasheet
Build 2024 ISV quotes
What to review/like/share:
Partner Alert: Microsoft Build
Copilot Studio brings power of generative AI to ISV offerings: LinkedIn post | blog link
Majesco creates AI-driven digital assistant with Copilot Studio: LinkedIn post | blog link
Announcing Partner Center to certify and publish Power Platform Copilot connectors and plugins: LinkedIn | blog link
Directions North America recap: LinkedIn | blog link
Blog: Revolutionize the way you work with automation and AI
What to watch:
Microsoft Build replay
Welcome to the future of automation with AI flows in Power Automate
Automate your desktop with multi-modal AI
Reminders: Register for the upcoming partner events!
Events:
June 4-7 (IST), (BST): Accelerate Business Process Automation using Microsoft Power Platform Workshop
July 22: Microsoft Partner FY25 GTM Launch Event for Business Applications
Trainings:
June 11 (IST) (BST): Dynamics 365 Supply Chain Management – Demand Planning Workshop
Level Up Copilot Sales Champion training course (access code: MOKC-MCJB)
FY24 High Volume Acceleration Program (Advanced)
Unable to get cells with % Formulas to add up to100% but yet the Sum Total in the cell shows 100%
Example Column Cell K5=SUM(C5,E5,G5,I5)
Then all of Column K is added up with the following formula K31 =SUM(K5:K30)
Column L, rows 5 thru 30 are a % of the rows Total (Cell K31) or the formula of Cell K31 =SUM(K5:K30)
Cell L5=K5/K31 to get a % or 24% This is duplicated for Cells L6 through L30 for a total of 100% in cell L31 but the actual total of the column is only 99%. How can this be corrected so that the numbers are accurate and don’t need to manually add to see if the total is correct. I have had to do manual adjustments to make the numbers add up to the 100%. Your assistance is greatly appreciated.
Example Column Cell K5=SUM(C5,E5,G5,I5)Then all of Column K is added up with the following formula K31 =SUM(K5:K30) Column L, rows 5 thru 30 are a % of the rows Total (Cell K31) or the formula of Cell K31 =SUM(K5:K30)Cell L5=K5/K31 to get a % or 24% This is duplicated for Cells L6 through L30 for a total of 100% in cell L31 but the actual total of the column is only 99%. How can this be corrected so that the numbers are accurate and don’t need to manually add to see if the total is correct. I have had to do manual adjustments to make the numbers add up to the 100%. Your assistance is greatly appreciated. Read More
How to use ray tracing tool for visible light
Hello all,
I am working on MATLAB ray tracing tool for visible light communication. But the "txsite" command takes maximum "Transmitter Frequency" of 2e11 and starting frequency of visible light is 4.62e14. Please provide a solution to this problem.Hello all,
I am working on MATLAB ray tracing tool for visible light communication. But the "txsite" command takes maximum "Transmitter Frequency" of 2e11 and starting frequency of visible light is 4.62e14. Please provide a solution to this problem. Hello all,
I am working on MATLAB ray tracing tool for visible light communication. But the "txsite" command takes maximum "Transmitter Frequency" of 2e11 and starting frequency of visible light is 4.62e14. Please provide a solution to this problem. visiblelight MATLAB Answers — New Questions
User defined function for curve fitting, but the defined function is complicated
Hi all,
I am working on this project whihc requires me to fit my experimental data using a complicated function (function is attached in the picture below). May I ask how can I create this fitting function using matlab codes?
Information about function:
function (2):
dependent: A_CC
independent: hbar*omega
parameters: A_1, E_b, E_g, Gamma
function (3):
dependent: A_EC
independent: hbar*omega
parameters: A_2, E_b, E_g, Gamma
Please note that any over lapping terms in both functions should have the same value. For instance, Gamma exist in both (2) and (3), and hence they need to have the same value.
thank you!Hi all,
I am working on this project whihc requires me to fit my experimental data using a complicated function (function is attached in the picture below). May I ask how can I create this fitting function using matlab codes?
Information about function:
function (2):
dependent: A_CC
independent: hbar*omega
parameters: A_1, E_b, E_g, Gamma
function (3):
dependent: A_EC
independent: hbar*omega
parameters: A_2, E_b, E_g, Gamma
Please note that any over lapping terms in both functions should have the same value. For instance, Gamma exist in both (2) and (3), and hence they need to have the same value.
thank you! Hi all,
I am working on this project whihc requires me to fit my experimental data using a complicated function (function is attached in the picture below). May I ask how can I create this fitting function using matlab codes?
Information about function:
function (2):
dependent: A_CC
independent: hbar*omega
parameters: A_1, E_b, E_g, Gamma
function (3):
dependent: A_EC
independent: hbar*omega
parameters: A_2, E_b, E_g, Gamma
Please note that any over lapping terms in both functions should have the same value. For instance, Gamma exist in both (2) and (3), and hence they need to have the same value.
thank you! curve fitting MATLAB Answers — New Questions
Owner of Teams Channel not showing in Teams Channel Distribution List
I requested for a new Team’s Channel be created that includes a distribution list. The distribution list works great – as soon as I add or remove people from the channel, the distribution list is updated. Exactly what I wanted, except for one thing – I’m not included in the distribution list. So if someone else uses the distribution list for communication, I do not receive the email. Is there a way to resolve this?
I requested for a new Team’s Channel be created that includes a distribution list. The distribution list works great – as soon as I add or remove people from the channel, the distribution list is updated. Exactly what I wanted, except for one thing – I’m not included in the distribution list. So if someone else uses the distribution list for communication, I do not receive the email. Is there a way to resolve this? Read More