Month: May 2024
[0:0.1:1] whys is not exactly 0.1 steps ?
Anyone know why this code does not return verification 1
it seems instead of being 0.1 is actually makaing 0.10000000001
step=0.1;
max_value=1;
array = 0:step:max_value;
array1 = round(0:step:max_value,1);
check=[array’,array1′];
test=[array==array1]’;
% Why not 1 ?
verification=all(test)Anyone know why this code does not return verification 1
it seems instead of being 0.1 is actually makaing 0.10000000001
step=0.1;
max_value=1;
array = 0:step:max_value;
array1 = round(0:step:max_value,1);
check=[array’,array1′];
test=[array==array1]’;
% Why not 1 ?
verification=all(test) Anyone know why this code does not return verification 1
it seems instead of being 0.1 is actually makaing 0.10000000001
step=0.1;
max_value=1;
array = 0:step:max_value;
array1 = round(0:step:max_value,1);
check=[array’,array1′];
test=[array==array1]’;
% Why not 1 ?
verification=all(test) resolution MATLAB Answers — New Questions
New Learning Paths Released for Marketplace and Partner Center
We have released 3 new learning paths to help you better support your partners and customers with their Partner Center and marketplace needs:
Mastering the Marketplace Fundamentals This learning path provides what you need to get started publishing offers to the Azure Marketplace or helping your partners get their offers onto the marketplace. Learn everything from how the marketplace can drive business for both ISVs and Microsoft to getting started publishing an offer.
Courses include:
Azure Marketplace QuickStart
Getting Started in the Microsoft Commercial Marketplace
Azure Marketplace Incentive Programs
Choosing your Azure Marketplace offer type
Setting up a new marketplace offer
Marketplace Billing and Payouts
Mastering the Marketplace for Developers This technology-focused Learning Path covers all offer types relevant to the Azure Marketplace. Each course takes you through a specific offer type from start to finish, giving you the skills needed to advise ISVs on technical implementation.
Courses include:
Developing SaaS offers for the Azure Marketplace
Developing SaaS offers with the SaaS Accelerator
Developing Virtual Machine offers for the Azure Marketplace
Developing Container offers for the Azure Marketplace
Developing Managed Applications for the Azure Marketplace
Mastering Partner Center The Partner Center portal is where publishers start, manage, and grow their marketplace experience. This course offers an introduction to the portal and covers foundational topics to get you started on a path to successfully using the tool.
Courses include:
Getting started with Partner Center
Navigating Partner Center accounts and identifiers
Verifying account details in Partner Center
Setting up a tax profile in Partner Center
Setting up a payout profile in Partner Center
Role-based access control in Partner Center
Providing information common to all offer types in Partner Center
Creating SaaS offers in Partner Center
We have released 3 new learning paths to help you better support your partners and customers with their Partner Center and marketplace needs:
Mastering the Marketplace Fundamentals This learning path provides what you need to get started publishing offers to the Azure Marketplace or helping your partners get their offers onto the marketplace. Learn everything from how the marketplace can drive business for both ISVs and Microsoft to getting started publishing an offer.
Courses include:
Azure Marketplace QuickStart
Getting Started in the Microsoft Commercial Marketplace
Azure Marketplace Incentive Programs
Choosing your Azure Marketplace offer type
Setting up a new marketplace offer
Marketplace Billing and Payouts
Mastering the Marketplace for Developers This technology-focused Learning Path covers all offer types relevant to the Azure Marketplace. Each course takes you through a specific offer type from start to finish, giving you the skills needed to advise ISVs on technical implementation.
Courses include:
Developing SaaS offers for the Azure Marketplace
Developing SaaS offers with the SaaS Accelerator
Developing Virtual Machine offers for the Azure Marketplace
Developing Container offers for the Azure Marketplace
Developing Managed Applications for the Azure Marketplace
Mastering Partner Center The Partner Center portal is where publishers start, manage, and grow their marketplace experience. This course offers an introduction to the portal and covers foundational topics to get you started on a path to successfully using the tool.
Courses include:
Getting started with Partner Center
Navigating Partner Center accounts and identifiers
Verifying account details in Partner Center
Setting up a tax profile in Partner Center
Setting up a payout profile in Partner Center
Role-based access control in Partner Center
Providing information common to all offer types in Partner Center
Creating SaaS offers in Partner Center Read More
search text inside multiple opened documents
I opened 10 different MS word documents
Now I’m searching some text to get on that point
but MS word does not allow to search text on all opened files together (Ctrl+F)
So how do i work on this task.
I opened 10 different MS word documentsNow I’m searching some text to get on that pointbut MS word does not allow to search text on all opened files together (Ctrl+F)So how do i work on this task. Read More
New Outlook: MAPI / Exchange
Can anyone help please?
I’ve recently updated to Windows 11 and installed Outlook New 365. I was previously using Outlook 2013 on Windows 10 but it stopped working one day.
Outlook New is great but I’m missing the syncronising of Contacts and Calendar (and Notes) with my iPhone. I’ve imported contacts from my iPhone using a csv file. I use webmail for calendar. Thgis is neither elegant or ideal.
Researching this on Google I find this is becauase I am connecting to my Giacom Exchange server via MAPI. My understanding is this is the only way I can connect to this service.
So the first question is when will Outlook New / Microsoft allow connection via my Exchange providor? Giacom do not have an answer to this.
The second question is there any sort of workaround?
BTW, in case you can’t detect from the language I’m not high tech. So simple language replies would be appreciated. Thanks in advance.
Can anyone help please? I’ve recently updated to Windows 11 and installed Outlook New 365. I was previously using Outlook 2013 on Windows 10 but it stopped working one day. Outlook New is great but I’m missing the syncronising of Contacts and Calendar (and Notes) with my iPhone. I’ve imported contacts from my iPhone using a csv file. I use webmail for calendar. Thgis is neither elegant or ideal. Researching this on Google I find this is becauase I am connecting to my Giacom Exchange server via MAPI. My understanding is this is the only way I can connect to this service. So the first question is when will Outlook New / Microsoft allow connection via my Exchange providor? Giacom do not have an answer to this. The second question is there any sort of workaround? BTW, in case you can’t detect from the language I’m not high tech. So simple language replies would be appreciated. Thanks in advance. Read More
Can not use ADFS Extranet Smart Lockout with non-claims-aware application
Based on my tests, ADFS does not register the original client IP, if the client logs on to a non-claims-aware application published by the Web Application Proxy.
In this case, the AD FS Auditing event ID 1200 shows only the WAP server’s IP:
<Component xsi:type=”RequestAuditComponent”>
<Server>http://<adfs server fqdn>/adfs/services/trust</Server>
<AuthProtocol>MSISActive</AuthProtocol>
<NetworkLocation>Extranet</NetworkLocation>
<IpAddress>10.9.40.84</IpAddress>
<ForwardedIpAddress />
<ProxyIpAddress>N/A</ProxyIpAddress>
<NetworkIpAddress>N/A</NetworkIpAddress>
<ProxyServer>WAP</ProxyServer>
<UserAgentString>N/A</UserAgentString>
<Endpoint>/adfs/proxy/relyingpartytoken</Endpoint>
</Component>
If a client from the same IP logs on to a claims aware way published application the IpAddress and ForwardedIpAddress fields are containing the original client IP and the load balancer’s IP sitting before the WAP:
<Component xsi:type=”RequestAuditComponent”>
<Server>http://<adfs server fqdn>/adfs/services/trust</Server>
<AuthProtocol>WSFederation</AuthProtocol>
<NetworkLocation>Extranet</NetworkLocation>
<IpAddress>93.33.65.135,10.9.40.40</IpAddress>
<ForwardedIpAddress>93.33.65.135,10.9.40.40</ForwardedIpAddress>
<ProxyIpAddress>N/A</ProxyIpAddress>
<NetworkIpAddress>N/A</NetworkIpAddress>
<ProxyServer>ORFK-WAP02</ProxyServer>
<UserAgentString>Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36 Edg/125.0.0.0</UserAgentString>
<Endpoint>/adfs/ls/</Endpoint>
</Component>
Consequently, after a successful logon to this non-claims-aware application the WAP IP will be registered as a FamiliarIp in ADFS, and any further logon attempt will be counted as a familiar authentication even if it’s coming from an attackers IP, since the original client IP remains hided for the ADFS ESL service.
Maybe I misconfigured something, or should it be by design?
Any help appreciated.
Best Regards, Mike
Based on my tests, ADFS does not register the original client IP, if the client logs on to a non-claims-aware application published by the Web Application Proxy.In this case, the AD FS Auditing event ID 1200 shows only the WAP server’s IP: <Component xsi:type=”RequestAuditComponent”> <Server>http://<adfs server fqdn>/adfs/services/trust</Server> <AuthProtocol>MSISActive</AuthProtocol> <NetworkLocation>Extranet</NetworkLocation> <IpAddress>10.9.40.84</IpAddress> <ForwardedIpAddress /> <ProxyIpAddress>N/A</ProxyIpAddress> <NetworkIpAddress>N/A</NetworkIpAddress> <ProxyServer>WAP</ProxyServer> <UserAgentString>N/A</UserAgentString> <Endpoint>/adfs/proxy/relyingpartytoken</Endpoint> </Component>If a client from the same IP logs on to a claims aware way published application the IpAddress and ForwardedIpAddress fields are containing the original client IP and the load balancer’s IP sitting before the WAP: <Component xsi:type=”RequestAuditComponent”> <Server>http://<adfs server fqdn>/adfs/services/trust</Server> <AuthProtocol>WSFederation</AuthProtocol> <NetworkLocation>Extranet</NetworkLocation> <IpAddress>93.33.65.135,10.9.40.40</IpAddress> <ForwardedIpAddress>93.33.65.135,10.9.40.40</ForwardedIpAddress> <ProxyIpAddress>N/A</ProxyIpAddress> <NetworkIpAddress>N/A</NetworkIpAddress> <ProxyServer>ORFK-WAP02</ProxyServer> <UserAgentString>Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/125.0.0.0 Safari/537.36 Edg/125.0.0.0</UserAgentString> <Endpoint>/adfs/ls/</Endpoint> </Component>Consequently, after a successful logon to this non-claims-aware application the WAP IP will be registered as a FamiliarIp in ADFS, and any further logon attempt will be counted as a familiar authentication even if it’s coming from an attackers IP, since the original client IP remains hided for the ADFS ESL service.Maybe I misconfigured something, or should it be by design?Any help appreciated.Best Regards, Mike Read More
Conditional formatting across multiple columns
Hi
Is there a way that you can do conditional formatting across 4 columns but 1 row?
I have got a spreadsheet that has got 4 different projects on, with date columns, and I want to highlight if any of the projects in the same row have got the same date:
I have tried doing the COUNTIF, CONCAT formulas etc, and they are not what I need. I need exactly what is on the screen here. Just to show duplicate dates that are in the same row.
I would be very grateful if someone has got an answer!
Thanks in advance.
Maggie
Hi Is there a way that you can do conditional formatting across 4 columns but 1 row?I have got a spreadsheet that has got 4 different projects on, with date columns, and I want to highlight if any of the projects in the same row have got the same date: I have tried doing the COUNTIF, CONCAT formulas etc, and they are not what I need. I need exactly what is on the screen here. Just to show duplicate dates that are in the same row. I would be very grateful if someone has got an answer! Thanks in advance.Maggie Read More
Nested 23H2 cluster deployment stuck in “Resolve requirement”
Hi all,
I’m breaking my head over this. Every time I deploy new cluster it’s always stuck in Resolve requirement. It was fine before but there is no way now to move from it. Host 1 restarts after 15min of deployment and then all goes quiet and finally cluster deployment fails. Anybody any idea?
Hi all,I’m breaking my head over this. Every time I deploy new cluster it’s always stuck in Resolve requirement. It was fine before but there is no way now to move from it. Host 1 restarts after 15min of deployment and then all goes quiet and finally cluster deployment fails. Anybody any idea? Read More
Limited-access user permission lockdown mode disabling impact on SharePoint online site function?
Hi,
On one site, user unable to share folders because of “Limited-access user permission lockdown mode” feature is enabled.
And I do see “SharePoint Server Publishing Infrastructure” enabled hence “Limited-access user permission lockdown mode” is also enabled.
So, if now I disable “Limited-access user permission lockdown mode” feature then what would be the actual impact on the SharePoint online site.
Please suggest.
Hi,On one site, user unable to share folders because of “Limited-access user permission lockdown mode” feature is enabled.And I do see “SharePoint Server Publishing Infrastructure” enabled hence “Limited-access user permission lockdown mode” is also enabled. So, if now I disable “Limited-access user permission lockdown mode” feature then what would be the actual impact on the SharePoint online site.Please suggest. Read More
Purview Glossary Template – Custom template selection always includes default template attributes
I created a glossary. for the glossary term, I create a new custom template in purview. I also create a few attributes in it. I have a csv file with details for these attributes.
When I try to upload the csv the default template is selected by default and the selection includes all default template attributes. is this the default behavior or can i select just the custom template and its attributes. do I have to have a csv that has the default template attributes along with the custom template attributes that i created ?
the picture below shows both selected, i am not able to unselect or deselect the default template.
Hope my description makes sense. can someone shed some light and provide any documentation.
I created a glossary. for the glossary term, I create a new custom template in purview. I also create a few attributes in it. I have a csv file with details for these attributes. When I try to upload the csv the default template is selected by default and the selection includes all default template attributes. is this the default behavior or can i select just the custom template and its attributes. do I have to have a csv that has the default template attributes along with the custom template attributes that i created ? the picture below shows both selected, i am not able to unselect or deselect the default template. Hope my description makes sense. can someone shed some light and provide any documentation. Read More
What is the fcnLossLayer in the generatePolicyFunction network and how can I implement it myself?
I wish to use my trained SAC agent in Matlab only as a policy function. For this, I tried the generatePolicyFunction option. The code and the network works as intended, but I’m having a hard time figuring out the last layer of the network. It says it’s a fcnLossLayer, although I have no idea what does it mean or how does it work. It’s description is very vauge:
>> policy.Layers(11, 1)
ans =
FcnLossLayer with properties:
LossFcn: []
IsNetworkStateful: 0
Name: ‘RepresentationLoss’
ResponseNames: {}
Description: ”
Type: "GenericLossLayer"
This is the only information I get from the DAGNetwork object and it makes no sense to me. Also I couldn’t find any relevant information in the documentation, or in the referenced articles, or anywhere on the internet. I found it’s type is rl.layer.FcnLossLayer, but searching for this I still got nothing. This seams to me like a focalLossLayer, but even if it is, I don’t know its parameters.
This is important to me because I want to use this policy in a previous Matlab version (R2020a), and it doesn’t seem to support this layer, so I want to try and implement it as a custom layer. Thank you for your help in advance!I wish to use my trained SAC agent in Matlab only as a policy function. For this, I tried the generatePolicyFunction option. The code and the network works as intended, but I’m having a hard time figuring out the last layer of the network. It says it’s a fcnLossLayer, although I have no idea what does it mean or how does it work. It’s description is very vauge:
>> policy.Layers(11, 1)
ans =
FcnLossLayer with properties:
LossFcn: []
IsNetworkStateful: 0
Name: ‘RepresentationLoss’
ResponseNames: {}
Description: ”
Type: "GenericLossLayer"
This is the only information I get from the DAGNetwork object and it makes no sense to me. Also I couldn’t find any relevant information in the documentation, or in the referenced articles, or anywhere on the internet. I found it’s type is rl.layer.FcnLossLayer, but searching for this I still got nothing. This seams to me like a focalLossLayer, but even if it is, I don’t know its parameters.
This is important to me because I want to use this policy in a previous Matlab version (R2020a), and it doesn’t seem to support this layer, so I want to try and implement it as a custom layer. Thank you for your help in advance! I wish to use my trained SAC agent in Matlab only as a policy function. For this, I tried the generatePolicyFunction option. The code and the network works as intended, but I’m having a hard time figuring out the last layer of the network. It says it’s a fcnLossLayer, although I have no idea what does it mean or how does it work. It’s description is very vauge:
>> policy.Layers(11, 1)
ans =
FcnLossLayer with properties:
LossFcn: []
IsNetworkStateful: 0
Name: ‘RepresentationLoss’
ResponseNames: {}
Description: ”
Type: "GenericLossLayer"
This is the only information I get from the DAGNetwork object and it makes no sense to me. Also I couldn’t find any relevant information in the documentation, or in the referenced articles, or anywhere on the internet. I found it’s type is rl.layer.FcnLossLayer, but searching for this I still got nothing. This seams to me like a focalLossLayer, but even if it is, I don’t know its parameters.
This is important to me because I want to use this policy in a previous Matlab version (R2020a), and it doesn’t seem to support this layer, so I want to try and implement it as a custom layer. Thank you for your help in advance! rlsacagent, generatepolicyfunction, fcnlosslayer, matlab, neural network, rl.layer.fcnlosslayer MATLAB Answers — New Questions
how I solve the two equation and two unknown variables using ‘levenberg-marquardt’ method?
I wnat to solve follow two equations.
F = @(X) [d(1,3).*(abs(X(1)./(X(2).^2.*ar))+d(2,3).*(X(1)./(X(2).^2.*ar))).^d(3,3).*(bg_loc_M)+d(4,3).*(X(2)).^d(5,3)-l./X(2);
abs(c(1,3)).*(bg_loc_M).^c(2,3).*X(2).^c(3,3).*(ar).^c(4,3).*exp(-abs(c(5,3)).*abs(X(1)+c(6,3).*abs(X(1))).^abs(c(7,3)))-foc];
here, I don’t know X(1) & X(2), and kown others
how I solve the X(1) and X(2)?
I want to use levenberg-marquardt method.
I did follow.
F = @(X) [d(1,3).*(abs(X(1)./(X(2).^2.*ar))+d(2,3).*(X(1)./(X(2).^2.*ar))).^d(3,3).*(bg_loc_M)+d(4,3).*(X(2)).^d(5,3)-l./X(2);
abs(c(1,3)).*(bg_loc_M).^c(2,3).*X(2).^c(3,3).*(ar).^c(4,3).*exp(-abs(c(5,3)).*abs(X(1)+c(6,3).*abs(X(1))).^abs(c(7,3)))-foc];
x0=[0 l];
opts.Algorithm = ‘levenberg-marquardt’;
opts.TolX = 1e-10;
recal=fsolve(F,x0,opts);
But, results of X(1) & X(2) are different real value…..
I need your advice.I wnat to solve follow two equations.
F = @(X) [d(1,3).*(abs(X(1)./(X(2).^2.*ar))+d(2,3).*(X(1)./(X(2).^2.*ar))).^d(3,3).*(bg_loc_M)+d(4,3).*(X(2)).^d(5,3)-l./X(2);
abs(c(1,3)).*(bg_loc_M).^c(2,3).*X(2).^c(3,3).*(ar).^c(4,3).*exp(-abs(c(5,3)).*abs(X(1)+c(6,3).*abs(X(1))).^abs(c(7,3)))-foc];
here, I don’t know X(1) & X(2), and kown others
how I solve the X(1) and X(2)?
I want to use levenberg-marquardt method.
I did follow.
F = @(X) [d(1,3).*(abs(X(1)./(X(2).^2.*ar))+d(2,3).*(X(1)./(X(2).^2.*ar))).^d(3,3).*(bg_loc_M)+d(4,3).*(X(2)).^d(5,3)-l./X(2);
abs(c(1,3)).*(bg_loc_M).^c(2,3).*X(2).^c(3,3).*(ar).^c(4,3).*exp(-abs(c(5,3)).*abs(X(1)+c(6,3).*abs(X(1))).^abs(c(7,3)))-foc];
x0=[0 l];
opts.Algorithm = ‘levenberg-marquardt’;
opts.TolX = 1e-10;
recal=fsolve(F,x0,opts);
But, results of X(1) & X(2) are different real value…..
I need your advice. I wnat to solve follow two equations.
F = @(X) [d(1,3).*(abs(X(1)./(X(2).^2.*ar))+d(2,3).*(X(1)./(X(2).^2.*ar))).^d(3,3).*(bg_loc_M)+d(4,3).*(X(2)).^d(5,3)-l./X(2);
abs(c(1,3)).*(bg_loc_M).^c(2,3).*X(2).^c(3,3).*(ar).^c(4,3).*exp(-abs(c(5,3)).*abs(X(1)+c(6,3).*abs(X(1))).^abs(c(7,3)))-foc];
here, I don’t know X(1) & X(2), and kown others
how I solve the X(1) and X(2)?
I want to use levenberg-marquardt method.
I did follow.
F = @(X) [d(1,3).*(abs(X(1)./(X(2).^2.*ar))+d(2,3).*(X(1)./(X(2).^2.*ar))).^d(3,3).*(bg_loc_M)+d(4,3).*(X(2)).^d(5,3)-l./X(2);
abs(c(1,3)).*(bg_loc_M).^c(2,3).*X(2).^c(3,3).*(ar).^c(4,3).*exp(-abs(c(5,3)).*abs(X(1)+c(6,3).*abs(X(1))).^abs(c(7,3)))-foc];
x0=[0 l];
opts.Algorithm = ‘levenberg-marquardt’;
opts.TolX = 1e-10;
recal=fsolve(F,x0,opts);
But, results of X(1) & X(2) are different real value…..
I need your advice. levenberg-marquardt, non-liner, fsolve, lsqcurvefit MATLAB Answers — New Questions
I have a hexacopter simulink model attached with the controllers and after a particular simulation time my roll pitch and yaw values rapidly increases and simulation stops.
Post Content Post Content solver MATLAB Answers — New Questions
Find intercept point with three boundary conditions
Hi,
Im trying to find a point in a straight line given by an equation F(x)=mx+b, with the following boundary conditions:
-is a tangent of a semicircle
-The semicircle has a center on the horizontal axis
-the semicircle goes thru the origin (x=0, y=0)
Initially I was plotting the line and then start modifying the radius manually of the semicircle until I found one intersection point using InterX, but I think it might exist a way to avoid the manual modification.Hi,
Im trying to find a point in a straight line given by an equation F(x)=mx+b, with the following boundary conditions:
-is a tangent of a semicircle
-The semicircle has a center on the horizontal axis
-the semicircle goes thru the origin (x=0, y=0)
Initially I was plotting the line and then start modifying the radius manually of the semicircle until I found one intersection point using InterX, but I think it might exist a way to avoid the manual modification. Hi,
Im trying to find a point in a straight line given by an equation F(x)=mx+b, with the following boundary conditions:
-is a tangent of a semicircle
-The semicircle has a center on the horizontal axis
-the semicircle goes thru the origin (x=0, y=0)
Initially I was plotting the line and then start modifying the radius manually of the semicircle until I found one intersection point using InterX, but I think it might exist a way to avoid the manual modification. semicirle tangent MATLAB Answers — New Questions
FAQ: “Resell through CSPs” and option to change after publishing
Q: If a partner chooses the option to “Resell through CSPs” – can they switch to another option after publishing?
A: Once an offer is made available to all/any CSPs, ISVs cannot opt-out or scope it down to specific CSPs. If the offer opted-out or is made available to specific CSPs, ISVs can always expand it to all CSPs.
Here are the supported switches:
(1) No CSP –> Specific CSPs
(2) No CSP –> Any/All CSPs
(3) Specific CSPs –> Any/All CSPs
These are not supported:
(1) Any/All CSPs –> No CSPs
(2) Any/All CSPs –> Specific CSPs.
Q: If a partner chooses the option to “Resell through CSPs” – can they switch to another option after publishing?
A: Once an offer is made available to all/any CSPs, ISVs cannot opt-out or scope it down to specific CSPs. If the offer opted-out or is made available to specific CSPs, ISVs can always expand it to all CSPs.
Here are the supported switches:
(1) No CSP –> Specific CSPs
(2) No CSP –> Any/All CSPs
(3) Specific CSPs –> Any/All CSPs
These are not supported:
(1) Any/All CSPs –> No CSPs
(2) Any/All CSPs –> Specific CSPs.
How do I Monitor my LLM Chatbot?
Earlier posts in this series:
Part 1: Is my Chatbot Ready for Production? – A 10,000 foot overview to LLMOps
Part 2: How do I Evaluate my LLM Chatbot? – A guide to different LLM chatbot evaluation techniques and how to implement them
The LLMOps journey does not end when an application is deployed to Production. Continuous monitoring is needed to ensure security and performance and is crucial to a successful LLM powered app. For this blog, think of monitoring as visibility into application and user behavior in near real-time while the application is in Production.
Foremost, monitoring is an important mechanism in application defense. There are many common attacks that an adversary or even an unassuming user can leverage to coax an AI into doing something outside of its guardrails. Attacks such as prompt injection and jailbreaking can lead to data leaks or other unplanned chatbot behaviors. Screening for these events (and taking action) in near-real time is the most effective way to prevent these behaviors.
Another reason to implement a robust monitoring system is to improve customer experience. Among other things, a monitoring system can be used to identify bottlenecks causing latency, compare actual usage to expected usage, and log user inputs and generated outputs for future analysis (Be on the lookout for Part 4 in this series – a deeper dive on Feedback!).
Monitor for Security
Monitoring for security for your LLM powered chatbot can be as simple as adding a step or two to your orchestration. Whether using LangChain, Semantic Kernel, Promptflow, or something else entirely, executing an intelligent and fast method before revealing responses to users could make all the difference.
For example, Azure Content Safety is a free, lightweight, and constantly updated tool to use in these situations. Specifically, PromptShield uses a custom language model to detect adversarial user inputs or documents with hidden embedded instructions. Check out this sample repository that uses Promptflow + PromptShield to identify attacks… adding only 145 ms to the workflow! On top of PromptShield, Content Safety also allows for implementation of custom Blocklists for custom text moderation and levers to for screening generative output in additional categories. (Read more about Content Safety here)
Profile stats for a Sample RAG Chatbot, with PromptShield as the final step
Another potential area to monitor is model output hallucinations. Incorporating a call to RAGAS’s faithfulness metrics or Vectara’s Hughes Hallucination Detection model is a low latency way to identify potential hallucinations as they happen. This unlocks the ability to warn a user of a potential inaccuracy or hide the output from the user altogether, then log the pattern and take corrective action to improve the model.
Monitor for Performance
Techniques for monitoring performance vary slightly depending on the setup of the LLM powering the chatbot. However, the core goal remains the same – ensuring high end user satisfaction by delivering a low latency solution and collecting production input and output data to drive future improvement.
If using a Model-as-a-Service type architecture, (such as Azure OpenAI) using an API Manager to direct traffic is important to avoid dreaded 429 errors. At scale, a Circuit Breaker architecture is the best way to ensure good user experience. For data collection, logging inputs and outputs to a NoSQL datastore such as CosmosDB, or to a storage bucket is a good way to save results for analysis.
Circuit Breaker Architecture in the Context of APIM + AOAI
If using a Model-as-a-Platform type architecture (i.e. Running the model on VMs in your own environment) Azure Machine Learning Managed Online Endpoints can take care of data collection out of the box. Model Data Collection will monitor inputs, outputs, and other metadata for each request, then write that data to a bucket for cheap storage until the data is used later.
In both cases, plugging the solutions into Azure Monitor + Metrics is the most effective way to track standard metrics such as Requests per minute, CPU/GPU utilization, CPU/GPU Memory utilization, errors, disk utilization, and others.
Azure Monitor Sample Reference Architecture
In summary, monitoring is an important part of the LLMOPs process, but it does not need to be overbearing. The right amount of monitoring will strike a perfect balance between securing the application and enabling a positive user experience.
Microsoft Tech Community – Latest Blogs –Read More
New on Azure Marketplace: May 9-11, 2024
We continue to expand the Azure Marketplace ecosystem. For this volume, 66 new offers successfully met the onboarding criteria and went live. See details of the new offers below:
Get it now in our marketplace
aaPanel: aaPanel is a versatile web hosting control panel that simplifies server management for administrators, developers, and businesses. It offers an intuitive interface, extensive features for server configuration, website deployment, and application management. aaPanel streamlines the entire process of creating, modifying, and optimizing online presence, empowering users to focus on core business activities.
Appvia Wayfinder: Wayfinder is a developer platform that enables self-service capabilities for DevOps and platform teams on Microsoft Azure. It offers a defined way of working, integrates with existing technologies, and provides self-service cloud resources with policy controls. The platform also includes features for environment and infrastructure management, team workspaces, workload isolation, and troubleshooting.
BrickBank Platform Professional (Chile): BrickBank offers a complete solution for institutions to stay in the open finance ecosystem with intelligent modules for generating new business. Open finance management services handle consent flows for sharing and transmitting data, and specialists support companies throughout the journey. This offer is available in Spanish.
CCH SureAddress for CCH SureTax: CCH SureAddress validates addresses individually or in bulk for Microsoft Dynamics 365. It supports various pages and transactions and is available in English in the United States and Canada.
Decarbonization as a Service (DaaS): Decarbonization as a Service (DaaS) provides an integrated, scalable solution that harnesses the power of artificial intelligence, machine learning, and blockchain to transform everyday operational data and information from diverse sources in Asset Grade Data. Accurately measure, monitor, and mitigate your company’s carbon emissions with DaaS.
Docker Compose: Docker Compose simplifies orchestration of multi-container Docker apps with custom networking and named volumes for persistent data storage.
Flask: Flask is a lightweight and flexible web framework for Python that allows developers to quickly build web applications with minimal code. It follows the WSGI standard and offers support for routing, templating, and request handling. Flask is a popular choice for web development due to its active community, extensive documentation, and vibrant ecosystem of plugins.
FMAX AI: FMAX is an AI inferencing platform that optimizes CPU architectures for efficient and precise model deployment across various environments. It supports vision and large language models, making it a practical choice for developers and enterprises deploying AI solutions in diverse contexts.
FreePBX: FreePBX is an open-source PBX platform that offers a unified solution for managing voice, video, and messaging. It scales effortlessly to meet your growing communication needs without compromising performance. Join a vibrant community of users and developers passionate about open-source communication solutions.
IBM watsonx.governance: IBM watsonx.governance provides organizations with a platform to govern both generative AI and machine learning models. It offers model governance, risk management, and compliance capabilities with customizable dashboards and reports. The platform automates and scales model governance, monitors for fairness, bias, and drift, and manages compliance with AI regulations and industry standards.
Mattermost: Mattermost is an open-source, self-hosted messaging platform for team collaboration with real-time messaging, channel organization, and customization options.
MobiLab Axium: Axium offers a collaborative space for domain experts to describe their business domain in natural language, which is then translated into universally accepted knowledge notation formats. Axium enables corporations to foster knowledge sharing and boost data-driven decision-making.
Nextuple OMS Studio: Nextuple OMS Studio is a modular, microservice-based platform that enhances legacy order management systems by offering advanced inventory and promising, order orchestration, and store fulfillment capabilities. The platform offers multiple deployment and ownership options, package and bespoke implementations, and consulting/services for business and tech strategy.
Node.js: Node.js is a cross-platform, open-source JavaScript runtime environment with an event-driven and non-blocking I/O model, high scalability for building network applications, and a vast ecosystem of libraries and frameworks. It runs on the V8 JavaScript engine and executes JavaScript code outside a web browser.
Proventeq Content Productivity Suite – Copilot Edition: Proventeq’s Content Productivity Suite Copilot Edition helps organizations transition to an intelligent workplace with AI-powered tools for content understanding, classification, and automation. It includes a Copilot Accelerator for security and compliance readiness, graph connectors, Copilot plugins, and custom generative AI solutions. The suite supports popular enterprise content management systems and facilitates migration projects.
Proventeq Content Productivity Suite – Optimize: Proventeq’s Content Productivity Suite uses AI to help businesses understand their content landscape, gain insights, and classify documents. It automates data organization and migration and has connectors to popular enterprise content management systems.
Proventeq Salesforce to SharePoint Integration: Salesforce customers can integrate with SharePoint Online to enhance collaboration and document management capabilities. This hybrid model can save on license costs and increase data storage capacity, while providing a single collaboration environment. Proventeq’s Content Integrator is recommended for seamless integration and synchronization of content types.
Rocket.Chat: Rocket.Chat is an open-source messaging platform with real-time communication and collaboration features for teams. It allows users to communicate via channels, groups, and direct messages; share files; and integrate with third-party services. To configure with NGINX, edit the configuration file and change the public IP.
Squid Auth Proxy Server on AlmaLinux 8: Squid Auth Proxy Server on AlmaLinux 8 simplifies web access management with enhanced security measures, granular access control, transparent proxy configuration, and scalability. It caters to enterprise networks, educational institutions, and government organizations, ensuring compliance with acceptable use policies and regulatory requirements.
Squid Auth Proxy Server on AlmaLinux 9: Squid Auth Proxy Server on AlmaLinux 9 offers enhanced security and improved performance for network infrastructure. It provides flexible access control, comprehensive logging and monitoring, and seamless integration. This solution caters to system administrators, IT managers, and network security professionals responsible for managing and securing network infrastructure.
Squid Auth Proxy Server on Linux Stream 8: Squid Auth Proxy Server on Linux Stream 8 is a caching proxy server that supports HTTP, FTP, and other protocols. It provides robust authentication and granular content filtering, and it optimizes network performance while seamlessly integrating with existing authentication infrastructure. The solution scales effortlessly to accommodate growth and change, ensuring robust access control, fortified security, and optimal performance across multiple locations and diverse network topologies.
Squid Auth Proxy Server on Oracle 8: Squid Auth Proxy Server on Oracle 8 is a comprehensive solution for reinforcing security and regulating access control. It offers advanced authentication mechanisms, granular access control policies, seamless integration with Oracle 8, and comprehensive logging and reporting. This scalable solution is suitable for businesses of all sizes and provides a reliable defense against unauthorized access attempts and potential security breaches.
Squid Auth Proxy Server on Oracle 9: Squid Auth Proxy Server on Oracle 9 is a reliable solution for network administrators seeking to enforce access policies, authenticate users, and safeguard sensitive data. It enhances network security, streamlines access control, optimizes network performance, ensures regulatory compliance, and reduces security risks. The solution provides a centralized platform for managing user authentication, authorization, and accounting, offering flexibility and control to protect sensitive assets and maintain productivity.
Squid Auth Proxy Server on Rocky 8: Squid Auth Proxy Server on Rocky 8 simplifies web access control and authentication processes. It offers flexible authentication options, granular access control, comprehensive logging and reporting, and an intuitive management interface. Suitable for enterprise networks, government organizations, and small to midsize businesses, it enhances security, efficiency, and control over internet usage.
Squid Auth Proxy Server on Rocky 9: Squid Auth Proxy Server on Rocky 9 is a comprehensive solution for network security and access control. It offers advanced authentication mechanisms, granular access control policies, and seamless integration with Rocky Linux 9. The solution is scalable and suitable for organizations of all sizes. With comprehensive logging and reporting, it ensures compliance and strengthens defenses.
Squid Auth Proxy Server on SUSE 12 SP5: Squid Auth Proxy Server on SUSE 12 SP5 offers extensive connectivity control tools, including whitelists and blacklists for specific websites and URLs. It integrates with existing authentication infrastructures and has stringent security protocols, including SSL inspection and real-time malware scanning. Its intelligent caching mechanisms minimize bandwidth consumption and reduce latency for users, resulting in cost savings and uninterrupted productivity.
Squid Auth Proxy Server on SUSE 15 SP5: Squid Auth Proxy Server on SUSE 15 SP5 is a powerful tool for network security and user identity management. It offers caching, access control, authentication methods, load balancing, and reverse proxy. It enables organizations to establish content filtering features and restrict access to specific network resources.
Fluentis ERP Modules: Fluentis ERP is a comprehensive solution for small and midsize enterprises, covering all main application areas from administration to logistics management. It includes modules for finance, treasury, controlling, purchase, sales, and logistics. The system offers automation and speed in communication with banks and accounting for transactions and helps increase productivity and efficiency by optimizing storage and goods flows.
TMAP: TMAP uses advanced analytics and AI to improve after-sales service in manufacturing. It automates claims, reduces warranty costs, optimizes service parts prices, and detects early warning signals. TMAP leverages generative AI to exceed customer expectations and nurture loyalty.
WeTransact: WeTransact simplifies the process of listing on the Microsoft commercial marketplace by handling technical aspects, ensuring partnership criteria are met, and offering guidance. It helps SaaS companies publish quickly and offers GDPR compliance.
WeTransact Core: WeTransact simplifies the process of listing on Microsoft commercial marketplace for startups. It handles technical aspects, ensures partnership criteria are met, and complies with GDPR.
WeTransact Custom: WeTransact simplifies the process of listing on Microsoft commercial marketplace by handling technical aspects and ensuring partnership criteria are met. It offers 1:1 guidance and complies with GDPR.
WeTransact Extra: WeTransact simplifies the process of listing on Microsoft commercial marketplace by handling technical aspects, ensuring partnership criteria are met, and offering guidance. It helps SaaS companies publish quickly and complies with GDPR.
Go further with workshops, proofs of concept, and implementations
AI Action Accelerator: 2-Day Workshop: eGroup Enabling Technologies offers a two-day Microsoft Azure AI Services Action Accelerator Workshop that provides a prioritized list of AI initiatives and a high-level implementation plan. The workshop covers AI strategy, technical platform, business application, and AI governance, and it includes a discovery session and plan development.
Azure Virtual Desktop Deployment Proof of Concept: Wanstor will provide a pilot deployment of Microsoft Azure Virtual Desktop, enabling the secure delivery of desktop and applications to users on any device while maintaining data integrity. It segregates the end user’s device and the host accessing company data, providing a scalable and robust solution for remote and hybrid work environments.
Azure Virtual Desktop FastStart for SMBs: Azure Virtual Desktop FastStart for SMBs by Advania is a secure and cost-efficient solution for small to midsize businesses looking to adopt virtual desktops. It offers flexibility, scalability, remote work enablement, cost efficiency, security, and simplified IT management. Advania provides comprehensive consultation, planning, and deployment assistance to ensure a seamless transition to Azure Virtual Desktop.
Cognizant AI-Powered Localization Framework: Cognizant AI-Powered Localization Framework is a scalable solution that covers the entire media localization workflow. It ingests media content from various sources and formats, analyzes the content and its metadata, and uses generative AI to generate translations and dubbing for the content in the target languages. The framework also uses contextualization techniques to ensure that the translations and dubbing are relevant and appropriate for the target audiences.
Copilot for Manufacturing: 12-Week Proof of Concept: Cluster Reply Copilot for Manufacturing uses generative AI to analyze real-time and historical data from various sources, including MES, IIOT, WMS, ERP, CMMS, S&OP, and DMS. It facilitates swift and precise identification of root causes, enhances decision-making with real-time guidance, and creates shared procedures and standardized work instructions. The proof-of-concept timeline includes use case identification, discovery, implementation, testing, tuning, and scaling.
Copilot for Security: 3-Hour Introduction Workshop: Copilot for Security is a Microsoft AI technology that integrates with various security solutions to provide machine speed responses for security operators, architects, and IT administrators. The technology can help with investigating security incidents and improving the effectiveness of internal SOC teams. White Hat IT Security’s workshop provides a comprehensive understanding of Copilot for Security and its capabilities.
Eastwall Azure VMware Solution (AVS) Pilot: Azure VMware Solution (AVS) offers a quick and cost-effective way to migrate VMware workloads to the cloud without the need for retraining or new hardware. Eastwall provides assessment, design, and pilot services to help businesses transition to AVS on Microsoft Azure. The team is highly certified in Azure infrastructure and operations and can assist with engagements ranging from four to 12 weeks.
Enterprise Data Modernization for Analytics and AI: Neudesic offers Enterprise Data Modernization for Analytics and AI, a combination of implementation expertise and assets that help organizations set a direction and future-proof their investments. The offering includes Neudesic ONE Data Platform Accelerator, a packaged set of assets that deliver a hyper-automated pre-configured deployment of an enterprise data analytics platform, and Neudesic’s Data Governance Platform Accelerator, which brings together Microsoft Fabric, Microsoft Purview, and Profisee MDM to help organizations overcome common data challenges.
Microsoft Always Connected Technical Support from Sentinel Technologies: 4-Week Proof of Concept: Sentinel Support offers unlimited assistance for Microsoft server and desktop software products, with the option to choose from small, medium, or large escalation tiers. Rapid on-site services and efficient vendor response are ensured, with a goal of one hour for Sev. A, two hours for Sev. B, and four hours for Sev. C.
Microsoft Data Protection Accelerator: 4- to 6-Week Implementation: Arinco’s Data Protection Accelerator is a pre-packaged solution that helps businesses strengthen their defense against data breaches and unauthorized access. It enables the implementation of Microsoft Purview capabilities, including data classification, information protection, data loss prevention, and insider risk management. The accelerator includes three key stages: assess, design and deploy, and operate.
4wardPRO Security Operation Center: 4wardPRO offers managed security services to enhance and ensure the safety of clients’ data and systems. The company provides complete security solutions, including protection against malware, advanced firewalls, access control, data encryption, and vulnerability management. 4wardPRO uses Microsoft Azure Lighthouse and Microsoft Sentinel to manage clients’ cloud services securely and efficiently.
Contact our partners
180ops: Revenue Intelligence SaaS for B2B Enterprises
ACP SOC with Microsoft Sentinel
ai-omatic: Digital Maintenance Assistant for Machines (SaaS)
Azure Migration Readiness Kickstart
Enterprise Workloads on Azure: 2-Day Assessment
IoT/OT Security: 4-Week Assessment
Mainframe and Distributed Workloads Migration to Azure with mLogica
Managed Detection and Response Services Powered by Microsoft Sentinel and AIsaac
Protrak Low-Code Application Platform
This content was generated by Microsoft Azure OpenAI and then revised by human editors.
Microsoft Tech Community – Latest Blogs –Read More
Protection de modification
Bonjour,
J’ai besoin d’un moyen d’appliquer à un fichier plusieurs mots de passe de modification qui donnent accès à différentes parties du fichier.
La situation est la suivante :
Le créateur (moi) doit avoir le droit de modification à tout le fichier.
L’utilisateur principal doit avoir le droit de modification à la majorité du fichier mais pas sur son entièreté, car je souhaite tout de même restreindre certains éléments.
Enfin l’utilisateur secondaire doit avoir accès à une petite partie du fichier.
Actuellement, j’ai mis un mot de passe de modification sur le fichier que l’utilisateur principal et moi-même connaissons. J’ai également bloqué les cellules que je souhaite restreindre à l’utilisateur principal à l’aide d’un mot de passe que moi seul connaît.
Le problème est qu’actuellement, l’utilisateur secondaire ne peut pas accéder à la modification pour sa partie.
Toute idée est la bienvenue
Merci
Bonjour, J’ai besoin d’un moyen d’appliquer à un fichier plusieurs mots de passe de modification qui donnent accès à différentes parties du fichier. La situation est la suivante : Le créateur (moi) doit avoir le droit de modification à tout le fichier. L’utilisateur principal doit avoir le droit de modification à la majorité du fichier mais pas sur son entièreté, car je souhaite tout de même restreindre certains éléments. Enfin l’utilisateur secondaire doit avoir accès à une petite partie du fichier. Actuellement, j’ai mis un mot de passe de modification sur le fichier que l’utilisateur principal et moi-même connaissons. J’ai également bloqué les cellules que je souhaite restreindre à l’utilisateur principal à l’aide d’un mot de passe que moi seul connaît.Le problème est qu’actuellement, l’utilisateur secondaire ne peut pas accéder à la modification pour sa partie. Toute idée est la bienvenueMerci Read More
FAQ: Invoicing – custom parameters for time periods and breaking down to offer level
Q: A few questions related to invoicing –
When purchases come into the Azure invoice, can the customer set custom parameters for time periods?
Can the Azure invoice be broken down to the offer level?
A: Both are possible by downloading the CSV file. There are a lot of filtering options for marketplace invoices: Group and filter options in Cost analysis and budgets – Microsoft Cost Management | Microsoft Learn.
The customer can: 1) download the invoice and/or 2) download the “usage + charges” file. For usage and charges file, they can customize the timespan, or select last 12 months, this year, etc.
Note that right now, the CSV file does not have a MACC filter (to see which of these invoices decremented the customer MACC) – so if you want to see which offers decremented a customer’s MACC, you would need to do a 1:1 mapping based on what offers are MACC-eligible.
For invoice download, there is also a customizable timespan filter.
Q: A few questions related to invoicing –
When purchases come into the Azure invoice, can the customer set custom parameters for time periods?
Can the Azure invoice be broken down to the offer level?
A: Both are possible by downloading the CSV file. There are a lot of filtering options for marketplace invoices: Group and filter options in Cost analysis and budgets – Microsoft Cost Management | Microsoft Learn.
The customer can: 1) download the invoice and/or 2) download the “usage + charges” file. For usage and charges file, they can customize the timespan, or select last 12 months, this year, etc.
Note that right now, the CSV file does not have a MACC filter (to see which of these invoices decremented the customer MACC) – so if you want to see which offers decremented a customer’s MACC, you would need to do a 1:1 mapping based on what offers are MACC-eligible.
For invoice download, there is also a customizable timespan filter.
Read More
FAQ: How to know when a SaaS purchase/subscription has been completed
Q: How do customers know that a SaaS purchase/subscription has been completed. (i.e. from accept, to subscribe to activating the account on the ISV website)? Two questions:
1. Can a customer confirm, (in the SaaS view in the portal?), that the step to activate the account on the ISV website has been complete? Trying to find where a customer can see this.
2. For the ISV, is the “Orders dashboard” in partner center the right place to check whether the customer has completed this? Partner Center Orders dashboard . There is an “order status = active” for the subscription asset, but not sure what subscription this refers to, seems it is the “marketplace subscription” but not the activation of the account of the ISV website?
A: “subscribed” means that SaaS subscription has been activated by the ISV and customer has been billed for the transaction. For SaaS offers, Orders dashboard should show the SaaS subscription associated with the order/purchase.
Q: How do customers know that a SaaS purchase/subscription has been completed. (i.e. from accept, to subscribe to activating the account on the ISV website)? Two questions:
1. Can a customer confirm, (in the SaaS view in the portal?), that the step to activate the account on the ISV website has been complete? Trying to find where a customer can see this.
2. For the ISV, is the “Orders dashboard” in partner center the right place to check whether the customer has completed this? Partner Center Orders dashboard . There is an “order status = active” for the subscription asset, but not sure what subscription this refers to, seems it is the “marketplace subscription” but not the activation of the account of the ISV website?
A: “subscribed” means that SaaS subscription has been activated by the ISV and customer has been billed for the transaction. For SaaS offers, Orders dashboard should show the SaaS subscription associated with the order/purchase. Read More
FAQ: Notifications for changes to customer subscriptions
Q: What notifications, if any, do ISVs receive when customers complete ChangePlan?
A: ISVs receive Webhook notifications when any of the changes listed here occur to their customer’s subscription (including ChangePlan)
Implementing a webhook on the SaaS service | Microsoft Learn
Q: What notifications, if any, do ISVs receive when customers complete ChangePlan?
A: ISVs receive Webhook notifications when any of the changes listed here occur to their customer’s subscription (including ChangePlan)
Implementing a webhook on the SaaS service | Microsoft Learn
Read More