Month: August 2024
“Why Is My New Computer Showing a Black Screen?”
I had configured my new computer to enter sleep mode after 30 minutes of inactivity, so I didn’t think much of it when I saw the screen go black. The power light was still on, indicating it was operational. However, when I attempted to wake it up, nothing happened. Pressing the power button did not respond either, and even disconnecting the A/C power cord did not turn it off completely as the internal battery sustained the light.
Concerned that my new computer had become unresponsive after just two weeks, I contemplated returning it to Best Buy during the Black Friday sale. In a moment of desperation, I repeatedly pressed the power button, and to my surprise, other small lights began flashing and the computer sprang back to life.
It turned out that the computer was in the midst of an automatic software update to Windows 11, even while in sleep mode. It remained inoperable until the upgrade completed. If the computer had been awake, I might have received a notification about the upgrade.
To add to the complexity, my Chrome Browser had all its URLs removed, prompting me to re-enter each address manually. I speculate that if I had been using Microsoft Edge instead of Google Chrome, this issue might not have occurred.
I had configured my new computer to enter sleep mode after 30 minutes of inactivity, so I didn’t think much of it when I saw the screen go black. The power light was still on, indicating it was operational. However, when I attempted to wake it up, nothing happened. Pressing the power button did not respond either, and even disconnecting the A/C power cord did not turn it off completely as the internal battery sustained the light. Concerned that my new computer had become unresponsive after just two weeks, I contemplated returning it to Best Buy during the Black Friday sale. In a moment of desperation, I repeatedly pressed the power button, and to my surprise, other small lights began flashing and the computer sprang back to life. It turned out that the computer was in the midst of an automatic software update to Windows 11, even while in sleep mode. It remained inoperable until the upgrade completed. If the computer had been awake, I might have received a notification about the upgrade. To add to the complexity, my Chrome Browser had all its URLs removed, prompting me to re-enter each address manually. I speculate that if I had been using Microsoft Edge instead of Google Chrome, this issue might not have occurred. Read More
Could someone proficient in PowerShell assist with troubleshooting a complex single-line command?
I’m currently working on a command that will be integrated into a batch file. The command aims to change the MBR partition type IDs of the first two partitions on each drive, specifically based on the presence of certain files on the root of the partitions.
The initial command I have already put together successfully changes the partition type IDs. However, I am now looking to refine the command to include a check for the presence of files named VOL1_M_MEDIA.WIM and VOL2_M_MEDIA.WIM on the root of the partitions before making the type changes.
This is the improved command that I am testing, but it has not been effective thus far. Although the command completes without errors, the partition type is not updated despite the specified files being present:
“`powershell.exe -executionpolicy bypass -command “Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 1 -and $_.mbrtype -eq ‘0x0c’ -and (Test-Path ‘\$($_.UniqueId)\VOL1_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x1c’; Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 2 -and $_.mbrtype -eq ‘0x07’ -and (Test-Path ‘\$($_.UniqueId)\VOL2_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x17′”`
“`
Please note that the intention is for the command to dynamically find the specified files without relying on specific drive letters.
I’m currently working on a command that will be integrated into a batch file. The command aims to change the MBR partition type IDs of the first two partitions on each drive, specifically based on the presence of certain files on the root of the partitions. The initial command I have already put together successfully changes the partition type IDs. However, I am now looking to refine the command to include a check for the presence of files named VOL1_M_MEDIA.WIM and VOL2_M_MEDIA.WIM on the root of the partitions before making the type changes. This is the improved command that I am testing, but it has not been effective thus far. Although the command completes without errors, the partition type is not updated despite the specified files being present: “`powershell.exe -executionpolicy bypass -command “Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 1 -and $_.mbrtype -eq ‘0x0c’ -and (Test-Path ‘\$($_.UniqueId)\VOL1_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x1c’; Get-Disk | Get-Partition | Where-Object { $_.PartitionNumber -eq 2 -and $_.mbrtype -eq ‘0x07’ -and (Test-Path ‘\$($_.UniqueId)\VOL2_M_MEDIA.WIM’) } | Set-Partition -mbrtype ‘0x17′”““ Please note that the intention is for the command to dynamically find the specified files without relying on specific drive letters. Read More
Character count mismatch between different word version
Hi
I just taking a character count using the word inbuild option, but I found different character count for the same document as listed below
Word 2010 — 416116 character count
word O365 — 405392 character count
Word web — 404756 character count
I tested the same word file in the above 3 version it showing different character count. Any one have face this kind of issue. please let us know
Thanks
Ganesh.R
Hi I just taking a character count using the word inbuild option, but I found different character count for the same document as listed below Word 2010 — 416116 character countword O365 — 405392 character countWord web — 404756 character count I tested the same word file in the above 3 version it showing different character count. Any one have face this kind of issue. please let us know ThanksGanesh.R Read More
EdgeSidebarAppUrlHostBlockList policy is not available in Edge Management Service
This (group) policy is available from Edge version 127 but is not available in the new Edge Management Service (it is there in Group Policy).
Anyone knows why ?
Manage the sidebar in Microsoft Edge | Microsoft Learn
This (group) policy is available from Edge version 127 but is not available in the new Edge Management Service (it is there in Group Policy). Anyone knows why ? Manage the sidebar in Microsoft Edge | Microsoft Learn Read More
Adding security layers to Azure Kubernetes Service: 8 you can use from Rancher and NeuVector by SUSE
In this guest blog post, Tracy Walker, Senior Security Engineer for NeuVector by SUSE, explores how to implement additional security layers for Azure Kubernetes Service using SUSE’s Rancher Prime and NeuVector Prime.
Experienced users of Microsoft Azure or other public cloud services are likely familiar with the shared-responsibility model and the anxiety of determining where “shared responsibility” stops and “It’s my responsibility” starts. Add an unexpected security event, and you can find yourself searching for additional layers that work with your existing security and let you maintain independent control. In this brief blog, let’s detail exactly how you can quickly add additional security layers to Azure Kubernetes Service (AKS) using SUSE’s Rancher Prime and NeuVector Prime.
Understanding the threats to containerized environments
Before we get into the details of security layers for AKS clusters, let’s address two common questions that will help us get straight to the point:
1. How can you presume my existing security is not good enough for container security? You have no idea what I’m doing for container security.
Simply, let’s say you are not using SUSE NeuVector or NeuVector Prime but are using an eBPF-centric solution or virtual machine security. You do not have complete network visibility east-west inside your Kubernetes cluster. Allow me to explain: The trade-off from gaining Kubernetes automated networking is losing full visibility of network payload and protocol east-west within the cluster, specifically layers 5-7 of the network OSI model (session layer, presentation layer, and application layer). VM security tools or kernel-centric tools that use popular eBPF technology can identify only layer 3 network and layer 4 transport protocols and cannot “see” network payloads potentially carrying live attacks. Your cluster network remains an entry point to zero-day exploits, remote privilege escalation, or code executions that cannot be mitigated by common vulnerabilities and exposures (CVE) remediation or eBPF system call filtering.
NeuVector detects your workload’s unique network traffic to define security policies specific to your unique workload network behavior, creating Zero Trust microsegmentation that allows only known network traffic and can alert or block any traffic unknown to your workload. Unlike eBPF, NeuVector can identify threats in network traffic earlier in the kill chain, and before they reach the kernel.
In other words, neither virtual machines nor eBPF security layers can inspect full network traffic through layer 7 inside Kubernetes. This creates a security blind spot. NeuVector uses patented open-source technology to add multiple network-centric security layers to mitigate this blind spot.
2. Isn’t AKS already protecting me?
Azure’s shared-responsibility model makes clear that users of AKS PaaS are responsible for network controls, application security, and identity management. SUSE recommends security layers, such as Microsoft Defender for Containers, as well as adding security layers provided by Rancher and NeuVector for security threats not mitigated by your cloud provider. For example, NeuVector provides network threat detection and layer 7 protocol identification and validation for all network traffic where Microsoft Defender does not have such visibility.
As an independent source of truth for network activity, NeuVector complements Microsoft Defender for Containers by creating security policies directly from the unique workload network patterns that NeuVector detects, and it can then alert or block any anomalous behavior at runtime — including zero-day attacks — as well as automatically packet-capture the attack for post-event forensics. One example of how multiple security layers from NeuVector could be used against the recent XZ Backdoor attack is detailed here in this blog.
2 Rancher security layers
Rancher simplifies the management of Kubernetes clusters by providing a centralized platform for deploying, scaling, and monitoring containerized applications. With Rancher, you can easily provision AKS clusters on Azure and automate day-to-day operations such as upgrades and maintenance tasks.
For security, Rancher provides two foundational security layers for role-based access control (RBAC) and network policy enforcement. Users can deploy both of these layers to control access to clusters and prevent unauthorized actions.
Configure 6 NeuVector security layers in under 15 minutes
NeuVector complements Kubernetes and AKS security with up to eight security layers that include real-time network threat detection, Zero Trust security policies for both network traffic and container/node processes, scanning for vulnerabilities and security misconfigurations, and data leak prevention. Because NeuVector is Kubernetes-native, you can deploy using a HELM chart, directly using Rancher, or automatically from the Azure Marketplace.
Enable the following NeuVector security layers for your AKS cluster to mitigate specific threats with very little time or effort:
Layers 1 and 2: Automated CVE and security configuration scanning: Enabling NeuVector’s Auto Scan will immediately inspect and report on all nodes, your orchestrator platform, and containers to detect both known CVE exploits and security misconfigurations as compared to recommended CIS Benchmarks for Kubernetes and Docker.
Configuration time: 10 seconds.
Layers 3 and 4: Zero Trust runtime network and process security: Achieve full network and process microsegmentation. Because NeuVector defaults to Discover Mode upon installation, your workload network and process behaviors are automatically “learned” and defined as security policies to allow those behaviors in a Zero Trust cluster. Configure the Service Group Mode Automation in NeuVector’s settings to automatically enable Monitor or Protect enforcement modes, thus enabling Zero Trust segmentation between known and unknown network or process behaviors for all pods and nodes. NeuVector’s runtime layers are effective detecting any anomalous behavior, zero-day attack, internal actor, or attempted exploit of unpatched CVE because it derives the security policies directly from workload behavior. Bonus: Both network and process runtime policies can be exported as security-policy-as-code YAML, so your security can automatically be deployed to any cluster with your workloads.
Configuration time: 20 seconds.
Layer 5: Live network threat detection: The only security layer that is 100 percent automatic and requires no setup or configuration. NeuVector uses its patented Deep Packet Inspection to detect and block more than 24 known network threats as they occur, and also perform an automatic packet capture of what triggered the violation.
Configuration time: Automatic (zero seconds).
Layer 6: NeuVector admission controller: NeuVector’s admission controller gives you 31 prebuilt policies that are CVE- and compliance-aware when using registry scanning.
Configuration time: Two minutes per rule.
Extra: Layers 7 and 8: Data leak prevention (DLP) and ingress WAF sensors: These advanced security layers focus on egress or ingress traffic, but are a little more advanced in their setup and use. DLP and WAF sensors can be completely customized to your specific environment, so SUSE recommends using these security layers after the other six layers are in place, perhaps in conjunction with NeuVector Prime support.
Configuration time: Varies: See NeuVector Prime.
Conclusion
Securing Azure Kubernetes Service necessitates multiple security layers using tools like Rancher and NeuVector by SUSE to eliminate blind spots. By deploying these tools and implementing the security layers recommended, you can rapidly mature your security posture and mitigate known or unknown risks associated with your AKS environments.
Securing any Kubernetes cluster should always be understood as an ongoing process that requires vigilance and reviews to identify new or unmitigated threats. With SUSE tools and security best practices in place, you can confidently secure any Kubernetes cluster using multiple automated security layers while minimizing management overhead.
Microsoft Tech Community – Latest Blogs –Read More
Untraining the SalsaNext model Architecture
I used the following repository to evaluate my data (https://github.com/matlab-deep-learning/pretrained-salsanext), but it loads a pretrained SalsaNext model. I would like to know whether it is possible to untrain the model, or to train it from scratch without creating the layergraph (Since this model involves a large number of layers, and the work seems to be cumbersome, and error-prone).
ThanksI used the following repository to evaluate my data (https://github.com/matlab-deep-learning/pretrained-salsanext), but it loads a pretrained SalsaNext model. I would like to know whether it is possible to untrain the model, or to train it from scratch without creating the layergraph (Since this model involves a large number of layers, and the work seems to be cumbersome, and error-prone).
Thanks I used the following repository to evaluate my data (https://github.com/matlab-deep-learning/pretrained-salsanext), but it loads a pretrained SalsaNext model. I would like to know whether it is possible to untrain the model, or to train it from scratch without creating the layergraph (Since this model involves a large number of layers, and the work seems to be cumbersome, and error-prone).
Thanks salsanext, untraining, neural network MATLAB Answers — New Questions
Designing fuzzy inference system and subsystems
Hello.I have several fuzzy systems about security, all of which have 3 outputs: weak, medium and strong. In the comprehensive system, I want to enter all these fuzzy systems and in addition ask it to calculate if it sees 10 weak cases, the final output will be the vulnerable level. Is this possible? Can you guide me?Hello.I have several fuzzy systems about security, all of which have 3 outputs: weak, medium and strong. In the comprehensive system, I want to enter all these fuzzy systems and in addition ask it to calculate if it sees 10 weak cases, the final output will be the vulnerable level. Is this possible? Can you guide me? Hello.I have several fuzzy systems about security, all of which have 3 outputs: weak, medium and strong. In the comprehensive system, I want to enter all these fuzzy systems and in addition ask it to calculate if it sees 10 weak cases, the final output will be the vulnerable level. Is this possible? Can you guide me? fuzzy inference system, fuzzy MATLAB Answers — New Questions
Icons Missing in Personal Folder After Latest Update
After upgrading to the most recent public Cumulative update, I observed that the yellow folders within my User directory no longer display icons within them, regardless of their size. Interestingly, the icons remain visible in the Details column on the right-hand side. My operating system is Windows 11 Pro 22H2 Build 22621.2715.
Has anyone else experienced this issue?
After upgrading to the most recent public Cumulative update, I observed that the yellow folders within my User directory no longer display icons within them, regardless of their size. Interestingly, the icons remain visible in the Details column on the right-hand side. My operating system is Windows 11 Pro 22H2 Build 22621.2715. Has anyone else experienced this issue? Read More
How to Modify the Windows Registry.
Hello. Recently, I successfully made my first Windows registry modification to resolve an annoyance. To ensure I don’t create any issues in the future, I’m seeking guidance. Currently, we have three PCs in use. One of them has only one Local Admin Account without a Standard User Account. Following a tutorial, I made a modification to the HKEY_CURRENT_USER key, and it worked smoothly.
On the other hand, our other two PCs, operating on Windows 11 22H2, have both a Local non-Microsoft Admin Account and a Standard Local User Account. The registry keys displayed in regedit are the typical ones: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG.
If I wish to implement a change in the registry that applies to both the Admin and Standard User accounts, should I make modifications within the HKEY_LOCAL_MACHINE key instead of CURRENT_USER, as I did with the PC that only has one account? Additionally, I want to mention that I created a backup of the Registry before proceeding with any modifications.
I would appreciate any advice to ensure I’m following the correct approach. Thank you.
Hello. Recently, I successfully made my first Windows registry modification to resolve an annoyance. To ensure I don’t create any issues in the future, I’m seeking guidance. Currently, we have three PCs in use. One of them has only one Local Admin Account without a Standard User Account. Following a tutorial, I made a modification to the HKEY_CURRENT_USER key, and it worked smoothly. On the other hand, our other two PCs, operating on Windows 11 22H2, have both a Local non-Microsoft Admin Account and a Standard Local User Account. The registry keys displayed in regedit are the typical ones: HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG. If I wish to implement a change in the registry that applies to both the Admin and Standard User accounts, should I make modifications within the HKEY_LOCAL_MACHINE key instead of CURRENT_USER, as I did with the PC that only has one account? Additionally, I want to mention that I created a backup of the Registry before proceeding with any modifications. I would appreciate any advice to ensure I’m following the correct approach. Thank you. Read More
Copilot working for word but not for any other programs
Hi There,
Co pilot is working on word but not on any other app like outlook or excel.
Can anyone help
Hi There, Co pilot is working on word but not on any other app like outlook or excel. Can anyone help Read More
Troubleshooting Slow Cold Boot and Driver Loading Issues
Hi there,
I recently utilized AMD’s “auto-update” tool to update all AMD-related drivers on my 5900HX laptop. Unfortunately, when attempting to download the latest Adrenaline drivers, I encountered compatibility issues as it no longer supported GCN/Vega. Without realizing this, I opted to update using the auto-update tool.
Since the update, the cold boot time has significantly increased to about 2 minutes compared to the previous 20 seconds (loading animation screen). Upon enabling boot logging, I noticed Windows repeatedly trying to load the same drivers without success, resulting in numerous BOOTLOG_NOT_LOADED entries (see screenshot). Seeking a solution, I turned to Windows’ verifier tool, but after selecting all drivers for verification and restarting, I began experiencing “system_thread_exception_not_handled” BSODs consistently. To regain access to Windows, I had to reset verifier and deactivate driver verification.
I am unsure how to proceed from here and would prefer to avoid a fresh Windows installation if possible. Any guidance on resolving this issue would be greatly appreciated.
Thank you.
Hi there, I recently utilized AMD’s “auto-update” tool to update all AMD-related drivers on my 5900HX laptop. Unfortunately, when attempting to download the latest Adrenaline drivers, I encountered compatibility issues as it no longer supported GCN/Vega. Without realizing this, I opted to update using the auto-update tool. Since the update, the cold boot time has significantly increased to about 2 minutes compared to the previous 20 seconds (loading animation screen). Upon enabling boot logging, I noticed Windows repeatedly trying to load the same drivers without success, resulting in numerous BOOTLOG_NOT_LOADED entries (see screenshot). Seeking a solution, I turned to Windows’ verifier tool, but after selecting all drivers for verification and restarting, I began experiencing “system_thread_exception_not_handled” BSODs consistently. To regain access to Windows, I had to reset verifier and deactivate driver verification. I am unsure how to proceed from here and would prefer to avoid a fresh Windows installation if possible. Any guidance on resolving this issue would be greatly appreciated. Thank you. Read More
Bi-nance: Empfehlungscode “C15HJGN1” – Empfehlungs ID
Was ist der Bi-nance Empfehlungscode?
Bi-nance-Empfehlungscode: Er wird als “C15HJGN1“ verwendet. Er ist der am häufigsten verwendete, lebenslang gültige Bi-nance-Empfehlungscode mit dem höchsten Rabatt der Welt. Wenn Sie sich bei der Kryptowährungsbörse Bi-nance registrieren, schreiben Sie “C15HJGN1” anstelle von “Empfehlungs-ID“. Der Transaktionsgebührenrabatt, den Sie erhalten, beträgt 30 %.
Kurzfassung
Maximieren Sie Ihre Ersparnisse mit einem verifizierten Bi-nance-Empfehlungscode (C15HJGN1) für einen lebenslangen Rabatt von 20 % auf Transaktionsgebühren und einen Registrierungsbonus von 600 $.
Erhöhen Sie Ihre Provisionsrate auf 40 %, indem Sie Transaktionsgebühren mit BNB-Coins bezahlen!
Um das Bi-nance-Benutzererlebnis auf die nächste Stufe zu heben, zahlen Sie nach der Durchführung des Identitätsüberprüfungsprozesses Geld ein und profitieren Sie von Kryptowährungs-Kauf-/Verkaufstransaktionen, dem Eröffnen von Futures-Positionen, Verdienen, Launchpad und Launchpool-Tools!
Was ist der Bi-nance Empfehlungscode?Bi-nance-Empfehlungscode: Er wird als “C15HJGN1“ verwendet. Er ist der am häufigsten verwendete, lebenslang gültige Bi-nance-Empfehlungscode mit dem höchsten Rabatt der Welt. Wenn Sie sich bei der Kryptowährungsbörse Bi-nance registrieren, schreiben Sie “C15HJGN1” anstelle von “Empfehlungs-ID“. Der Transaktionsgebührenrabatt, den Sie erhalten, beträgt 30 %.KurzfassungMaximieren Sie Ihre Ersparnisse mit einem verifizierten Bi-nance-Empfehlungscode (C15HJGN1) für einen lebenslangen Rabatt von 20 % auf Transaktionsgebühren und einen Registrierungsbonus von 600 $.Erhöhen Sie Ihre Provisionsrate auf 40 %, indem Sie Transaktionsgebühren mit BNB-Coins bezahlen!Um das Bi-nance-Benutzererlebnis auf die nächste Stufe zu heben, zahlen Sie nach der Durchführung des Identitätsüberprüfungsprozesses Geld ein und profitieren Sie von Kryptowährungs-Kauf-/Verkaufstransaktionen, dem Eröffnen von Futures-Positionen, Verdienen, Launchpad und Launchpool-Tools! Read More
Compliance Manager Default Alert Policy
Hi everyone,
I just got a notification that a medium-severity alert has been triggered.
I’ve never encountered this before, can anyone tell me more about it and whether I should take any actions?
Compliance Manager Default Alert Policy
Hi everyone,I just got a notification that a medium-severity alert has been triggered. I’ve never encountered this before, can anyone tell me more about it and whether I should take any actions? Compliance Manager Default Alert Policy Read More
People search results excluding external/guest users
I would like to exclude/hide external/guest users in the people search in our SharePoint intranet site. In SharePoint admin centre created a new search “local people search2” which excludes external users using –AccountName:“#ext#”
Than in the “People-Directory.aspx” and “peopleresults.aspx” pages, I have edited the pages and webpart section and changed the query using “change query” section where I changed from the default “local people search” to “local people search2” see below. I saved and published the changes but it keeps defaulting back to “local people search” instead on “local people search2”, where am I going wrong, why does it keep defaulting back? When I test the query in the edit webpart it does what I need it to do, but it does not save the change from “local people search” instead on “local people search2”
I would like to exclude/hide external/guest users in the people search in our SharePoint intranet site. In SharePoint admin centre created a new search “local people search2″ which excludes external users using -AccountName:”#ext#” Than in the “People-Directory.aspx” and “peopleresults.aspx” pages, I have edited the pages and webpart section and changed the query using “change query” section where I changed from the default “local people search” to “local people search2” see below. I saved and published the changes but it keeps defaulting back to “local people search” instead on “local people search2”, where am I going wrong, why does it keep defaulting back? When I test the query in the edit webpart it does what I need it to do, but it does not save the change from “local people search” instead on “local people search2” Read More
Creating Default Save Folders on Your PC for Seamless Synchronization with OneDrive Cloud
Is it possible for me to automatically back up all folders and files to my PC while selecting specific folders to sync with Onedrive cloud as a backup? Currently, all autosaves are directed to Onedrive Personal. Will I still be able to access them without an internet connection?
Is it possible for me to automatically back up all folders and files to my PC while selecting specific folders to sync with Onedrive cloud as a backup? Currently, all autosaves are directed to Onedrive Personal. Will I still be able to access them without an internet connection? Read More
Increased Vertical Spacing for Jump List
Hello everyone,
I’m regretting my recent upgrade to Win11! However, I guess it was bound to happen sooner or later.
One issue I’m facing is the excessive line spacing in the jump list, which makes it difficult to view a good number of items easily. How can I decrease the line spacing in jump lists?
(The jump list refers to the list of currently open items that appears when you hover over an application on the taskbar. If there are too many items to display horizontally, they appear in a vertical list.)
Hello everyone,I’m regretting my recent upgrade to Win11! However, I guess it was bound to happen sooner or later. One issue I’m facing is the excessive line spacing in the jump list, which makes it difficult to view a good number of items easily. How can I decrease the line spacing in jump lists?(The jump list refers to the list of currently open items that appears when you hover over an application on the taskbar. If there are too many items to display horizontally, they appear in a vertical list.) Read More
Error 25 in VolSnap
Greetings! Here are the details of the primary computer setup:
– Intel Core i9-13900K processor running at stock settings
– 32 GB of G.SKILL DDR5 6800 RAM (2 x 16 GB)
– Gigabyte Gaming RTX 4090 graphics card
– Aorus Elite Z790 AX motherboard
– 2TB Kingston SSD
– Seasonic 1300W PX ATX 3.0 PCIE 5 power supply
– Operating system: Windows 11
When using this system for gaming, I periodically check the event logs for any issues. On a recent check, I encountered the VolSnap 25 Error message indicating that the shadow copies of volume C: were deleted due to insufficient shadow copy storage growth time. To address this, it is advisable to lessen the input/output (IO) load on the system or designate a different shadow copy storage volume that is not currently being shadow copied.
While this error may cause concern, it is generally recommended to take necessary action to prevent data loss. Therefore, it would be wise to investigate and potentially resolve the issue rather than ignoring it.
Greetings! Here are the details of the primary computer setup:- Intel Core i9-13900K processor running at stock settings- 32 GB of G.SKILL DDR5 6800 RAM (2 x 16 GB)- Gigabyte Gaming RTX 4090 graphics card- Aorus Elite Z790 AX motherboard- 2TB Kingston SSD- Seasonic 1300W PX ATX 3.0 PCIE 5 power supply- Operating system: Windows 11 When using this system for gaming, I periodically check the event logs for any issues. On a recent check, I encountered the VolSnap 25 Error message indicating that the shadow copies of volume C: were deleted due to insufficient shadow copy storage growth time. To address this, it is advisable to lessen the input/output (IO) load on the system or designate a different shadow copy storage volume that is not currently being shadow copied. While this error may cause concern, it is generally recommended to take necessary action to prevent data loss. Therefore, it would be wise to investigate and potentially resolve the issue rather than ignoring it. Read More
“Does the rotor core of the Synchronous Machine Model 1.0 include hysteresis characteristics?”
I am using the Synchronous Machine Model 1.0 in Simulink Simscape.
Does the rotor core of the Synchronous Machine Model 1.0 include hysteresis characteristics?I am using the Synchronous Machine Model 1.0 in Simulink Simscape.
Does the rotor core of the Synchronous Machine Model 1.0 include hysteresis characteristics? I am using the Synchronous Machine Model 1.0 in Simulink Simscape.
Does the rotor core of the Synchronous Machine Model 1.0 include hysteresis characteristics? simulink, simscape, electric_motor_control, model MATLAB Answers — New Questions
Problem with single agent Simulink using RL toolbox
I am using RL toolbox to train a single agent with the following specifications:
for type=1
% obsMat = [1 1];
obsMat = [4 3; 5 3; 6 3; 7 3; 8 3; 9 3; 5 11; 6 11; 7 11; 8 11; 6 12; 7 12; 3 12; ];
% obsMat = [ ];
sA0 = [2 5];
switch type
case 1
s0 = [sA0];
end
Ts = 0.1;
Tf = 100;
maxsteps = ceil(Tf/Ts);
switch type
case 1
mdl = "rlAreaCoverage1";
end
open_system(mdl)
% Define observation specifications.
obsSize = [12 12 4];
oinfo = rlNumericSpec(obsSize);
oinfo.Name = "observations";
% Define action specifications.
numAct=131
switch numAct
case 131
actionSpace = {1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 129 130 131 132 133 134 136 137 140 141 142 143 144};
end
ainfo = rlFiniteSetSpec(actionSpace);
ainfo.Name = "actions";
switch type
case 1
blks = mdl + ["/Agent A (Red)"];
end
switch type
case 1
env = rlSimulinkEnv(mdl,blks,{oinfo},{ainfo});
end
env.ResetFcn = @(in) resetMap(in, obsMat);
rng(0)
but I see this error:
Error using rlSimulinkEnv>localValidateIOSpecs (line 178)
Invalid size or type for observation specification.
Error in rlSimulinkEnv (line 90)
localValidateIOSpecs(numAgents,observationInfo,actionInfo);
Do you have any idea what is wrong in my setup?I am using RL toolbox to train a single agent with the following specifications:
for type=1
% obsMat = [1 1];
obsMat = [4 3; 5 3; 6 3; 7 3; 8 3; 9 3; 5 11; 6 11; 7 11; 8 11; 6 12; 7 12; 3 12; ];
% obsMat = [ ];
sA0 = [2 5];
switch type
case 1
s0 = [sA0];
end
Ts = 0.1;
Tf = 100;
maxsteps = ceil(Tf/Ts);
switch type
case 1
mdl = "rlAreaCoverage1";
end
open_system(mdl)
% Define observation specifications.
obsSize = [12 12 4];
oinfo = rlNumericSpec(obsSize);
oinfo.Name = "observations";
% Define action specifications.
numAct=131
switch numAct
case 131
actionSpace = {1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 129 130 131 132 133 134 136 137 140 141 142 143 144};
end
ainfo = rlFiniteSetSpec(actionSpace);
ainfo.Name = "actions";
switch type
case 1
blks = mdl + ["/Agent A (Red)"];
end
switch type
case 1
env = rlSimulinkEnv(mdl,blks,{oinfo},{ainfo});
end
env.ResetFcn = @(in) resetMap(in, obsMat);
rng(0)
but I see this error:
Error using rlSimulinkEnv>localValidateIOSpecs (line 178)
Invalid size or type for observation specification.
Error in rlSimulinkEnv (line 90)
localValidateIOSpecs(numAgents,observationInfo,actionInfo);
Do you have any idea what is wrong in my setup? I am using RL toolbox to train a single agent with the following specifications:
for type=1
% obsMat = [1 1];
obsMat = [4 3; 5 3; 6 3; 7 3; 8 3; 9 3; 5 11; 6 11; 7 11; 8 11; 6 12; 7 12; 3 12; ];
% obsMat = [ ];
sA0 = [2 5];
switch type
case 1
s0 = [sA0];
end
Ts = 0.1;
Tf = 100;
maxsteps = ceil(Tf/Ts);
switch type
case 1
mdl = "rlAreaCoverage1";
end
open_system(mdl)
% Define observation specifications.
obsSize = [12 12 4];
oinfo = rlNumericSpec(obsSize);
oinfo.Name = "observations";
% Define action specifications.
numAct=131
switch numAct
case 131
actionSpace = {1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 129 130 131 132 133 134 136 137 140 141 142 143 144};
end
ainfo = rlFiniteSetSpec(actionSpace);
ainfo.Name = "actions";
switch type
case 1
blks = mdl + ["/Agent A (Red)"];
end
switch type
case 1
env = rlSimulinkEnv(mdl,blks,{oinfo},{ainfo});
end
env.ResetFcn = @(in) resetMap(in, obsMat);
rng(0)
but I see this error:
Error using rlSimulinkEnv>localValidateIOSpecs (line 178)
Invalid size or type for observation specification.
Error in rlSimulinkEnv (line 90)
localValidateIOSpecs(numAgents,observationInfo,actionInfo);
Do you have any idea what is wrong in my setup? reinforcement learning MATLAB Answers — New Questions
I want to plot the auto correlation function for 15 numbers without using the inbuilt function. My series is P=[ 47,64,23,71,38,64,55,41,59,48,71,35,57,40,58 ] and the plot should be autocorrelation function vs lags.
I want to plot the auto correlation function for 15 numbers without using the inbuilt function.
My code is as follows:
P=[ 47,64,23,71,38,64,55,41,59,48]; %%,71,35,57,40,58 ];
N=length(P);
Q=P(1:N);
R=P(1:N);
N1=length(Q);
N2=length(R);
u=mean(P);
sum= ((Q-u)*(R-u).’);
covar0=sum/N1;
for k=1:N-1 %% k is no. of lags and its max value can be 14 here
Q1=P(1:N-k); %% Splitting the series into 2 series separated by lag k
R1=P(1+k:N);
N1_1=length(Q1);
N2_1=length(R1);
sum1= ((Q1-u)*(R1-u).’);
covark=sum1/N;
acf=covark/covar0;
acf;
end
But after execution of the loop,I am getting acf value only for last value of k, which rather should have been an array for values of k=1 to 14.
I am new to matlab. Plz help me resolve the code.I want to plot the auto correlation function for 15 numbers without using the inbuilt function.
My code is as follows:
P=[ 47,64,23,71,38,64,55,41,59,48]; %%,71,35,57,40,58 ];
N=length(P);
Q=P(1:N);
R=P(1:N);
N1=length(Q);
N2=length(R);
u=mean(P);
sum= ((Q-u)*(R-u).’);
covar0=sum/N1;
for k=1:N-1 %% k is no. of lags and its max value can be 14 here
Q1=P(1:N-k); %% Splitting the series into 2 series separated by lag k
R1=P(1+k:N);
N1_1=length(Q1);
N2_1=length(R1);
sum1= ((Q1-u)*(R1-u).’);
covark=sum1/N;
acf=covark/covar0;
acf;
end
But after execution of the loop,I am getting acf value only for last value of k, which rather should have been an array for values of k=1 to 14.
I am new to matlab. Plz help me resolve the code. I want to plot the auto correlation function for 15 numbers without using the inbuilt function.
My code is as follows:
P=[ 47,64,23,71,38,64,55,41,59,48]; %%,71,35,57,40,58 ];
N=length(P);
Q=P(1:N);
R=P(1:N);
N1=length(Q);
N2=length(R);
u=mean(P);
sum= ((Q-u)*(R-u).’);
covar0=sum/N1;
for k=1:N-1 %% k is no. of lags and its max value can be 14 here
Q1=P(1:N-k); %% Splitting the series into 2 series separated by lag k
R1=P(1+k:N);
N1_1=length(Q1);
N2_1=length(R1);
sum1= ((Q1-u)*(R1-u).’);
covark=sum1/N;
acf=covark/covar0;
acf;
end
But after execution of the loop,I am getting acf value only for last value of k, which rather should have been an array for values of k=1 to 14.
I am new to matlab. Plz help me resolve the code. auto correlation, for loop MATLAB Answers — New Questions