Month: October 2024
New Responsible AI Features for Building Trustworthy AI
Last week at our first Microsoft AI Tour stop in Mexico City, we announced Trustworthy AI, our One Microsoft approach towards how we deliver privacy, safety, and security, through both commitments and capabilities.
Every AI innovation at Microsoft is grounded in a comprehensive set of AI principles, policies and standards. This includes foundational commitments, such as our Secure Future Initiative, AI Principles, and Privacy Principles. These commitments give you confidence that you control your data, and your data is secure in any state, whether at rest or in transit. We’re transparent about where data is located and how it’s used, and we’re committed to making sure AI systems are developed responsibly. These commitments also ensure that the AI systems we build have the right Privacy, Safety, and Security in mind from the start. We use our own best practices and learnings to provide you with capabilities and tools to help you build your own AI applications that share the same high standards that we strive for. Whether you are an enterprise leader, an AI developer, or a copilot enthusiast, Microsoft provides the foundation you need to build and use generative AI that you can trust.
In true fashion, with new announcements come new products and features! In his blog post, Takeshi Numoto, Executive Vice President and Chief Marketing Officer, shares more about Trustworthy AI and all of the product announcements we shared in Mexico City. However, for our Responsible AI blog series, we want to take a moment to dive deeper into the announcements for Responsible AI!
Evaluations
Evaluating your generative AI application is a key part in the Measure stage of the generative AI development lifecycle. While you may consider relying on intuition or applying mitigation strategies based on sporadic feedback you’ve received about your apps output, executing evaluations by way of a methodical, systematic approach provides you with signals that inform targeted mitigation steps.
We announced 4 new capabilities in public preview to help you evaluate and improve your application’s outputs with greater ease:
Risk and safety evaluations for indirect prompt injection attacks
Risk and safety evaluations for protected material (text)
Math-based metrics ROUGE, BLEU, METEOR, and GLEU
Synthetic data generator and similar for non-adversarial tasks
In her blog post, my colleague Minsoo provides more details about these new capabilities and provides step-by-step tutorials that you can try today!
One key change you may have noticed is that we’ve migrated our evaluators from the promptflow-evals package to the new Azure AI Evaluation SDK! I’d highly recommend putting together a migration plan to migrate your existing evaluations to the new SDK. If you continue to use the promptflow-evals package in your existing evaluations, you may run into an error regarding missing inputs. We’ve modified property names, and therefore your existing dataset may be using the incorrect ones.
Looking for the reference docs? Don’t worry, I’ve got you covered! You can explore the new evaluation package here: azure.ai.evaluation package | Microsoft Learn.
Azure AI Content Safety
Azure AI Content Safety provides a robust set of guardrails for generative AI. We have a growing list of features and capabilities which you can explore within our RAI Playlist. Not to mention, we also have a new Operationalize AI Responsibly with Azure AI Studio Learn Path which provides guided instruction on applying these features in either a UI-based or code-first approach. However, joining the list of Content Safety capabilities are some amazing new features:
Correction capability in Groundedness Detection
Protected material detection for code
Embedded content safety
As a former XR developer, I was pleasantly surprised to learn that Unity uses our content filtering models for Muse Chat! Carlotta recently shared more about Content Filtering in her Content Filtering with Azure AI Studio post. I’d suggest giving the article a read to learn more!
Data Protection
For those developing AI solutions within highly regulated sectors, a paramount consideration is data protection. Data privacy is a universal concern, but the challenge of processing sensitive or regulated data in the cloud—ensuring it remains encrypted at all times, including during processing—is an issue we are actively addressing. Explore our latest features and capabilities designed to tackle this concern:
Confidential inferencing
Azure OpenAI Data Zones
As a heads up, we’re starting with a limited preview for Azure AI Confidential Inferencing. Have a use case in mind? We want to hear from you! Fill out this form to sign up for a preview of our confidential inferencing service: Azure AI Confidential Inferencing Preview Sign-Up (office.com).
Next Steps
Many of our existing products and Azure services support our approach to Trustworthy AI. As a developer, if you’re wondering where’s the best place to start, I’d suggest assessing your existing generative AI solution(s) and pinpoint how you’ve integrated features which support security, privacy, and safety. Maybe you’ll uncover an opportunity to leverage one of the new capabilities I shared within this post? Or maybe an idea will spark while exploring our new Operationalize AI Responsibly with Azure AI Studio Learn Path!
If you’re still in the ideation phase and haven’t quite put keystroke to code editor, check out Pablo’s lesson on the Generative AI Application Lifecycle, which is part of our Generative AI for Beginners course. As you review the lesson, pinpoint areas of opportunity to integrate privacy, safety, and security. There are more ways than 1 and I’m excited to see what you decide!
Whichever path you pursue, just know that you’re taking a great stride towards building AI-solutions that are trustworthy!
Microsoft Tech Community – Latest Blogs –Read More
Making Sure that Outlook Puts Deleted Items in the Right Place
Moving Deleted Items and Other New Outlook Functionality
As everyone knows by now, the new Outlook for Windows is generally available. Normally, this means that a product is feature complete and ready for deployment. Alas. The situation is more complicated because the new Outlook is still well away from a stage where enterprise customers might consider the client to be the finished article. It’s certainly better than the old Windows Mail and Calendar clients, but there’s a reason why Microsoft will support Outlook (classic) until at least 2029.
To Microsoft’s credit, they continue to add features to Outlook, like the update described in message center notification MC896715 (Microsoft 365 roadmap item 413716) telling us that in November 2024 users can drag an item to the calendar icon in the navigation bar to cause Outlook to create a new event. The downside of Microsoft pushing forward with adding features to the new Outlook is that it removes engineering resources from working on stuff that enterprises value, like support for PSTs. I’m sure that creating calendar events from email (which happens today for messages like airline bookings) will be good, but closing the feature gap with Outlook (classic) appears to be much more important.
Controlling Moving Deleted Items from Shared Mailboxes with Outlook Classic
Which brings me to the topic of deleting items from shared mailboxes. Quite why Outlook (classic) insists on moving deleted items from shared mailboxes to the Deleted Items folder in the user’s primary mailbox is beyond me, but that’s the client’s default behavior. The approach might be justifiable if only a single person accessed the shared mailbox, in which case you’d always know where the deleted items are, but the whole point of shared mailboxes is that they’re a resource accessible by multiple people. Scattering deleted items across many different mailboxes just doesn’t seem logical.
Thankfully, a registry setting exists to force Outlook (classic) to keep deleted items in the Deleted Items folder of the shared mailbox. Or rather, in the Deleted Items folder of any mailbox where delegated access allows the deletion of items. The DelegateWastebasketStyle DWORD can be:
Not present: Move delete items to the Deleted Items folder in the user’s mailbox
4: Move deleted items to the Deleted Items in the shared mailbox.
8: As for “not present.”
In most cases, setting the value to 4 is what’s needed. You can update the registry manually (Figure 1) or via group policy. The article cited above contains some caveats that you should be aware of, but in general, 4 works well and is what I use for all the shared mailboxes that I access daily.
Figure 1: Updating the system registry to control the processing of deleted items
No Setting to Control Moving Deleted Items in the New Outlook
The New Outlook is very like OWA and eschews the system registry for application settings. Instead, Outlook settings are stored in hidden items in user mailboxes. This is the right approach because it means that settings are transportable across workstations. In other words, when someone gets a new PC, they don’t need to spend hours configuring Outlook to work the way it did on the old PC. It also means that OWA and the new Outlook share settings, which makes moving to the new Outlook very easy for people who now use OWA.
Good as transportable settings are, it means that the engineers building the new Outlook must track down every registry setting that can be applied to Outlook (classic) and recreate the setting (if required) for the new Outlook. And today, the new Outlook has no equivalent setting to control where messages deleted from shared mailboxes end up. It’s an example of work that needs to be done at some time in the future before Microsoft can retire Outlook (classic).
Debugging the New Outlook
All software is imperfect in some way. Finding glitches in the transition of a client that’s been in use since 1997 is easy, especially during a platform change. Organizations won’t discover if the new Outlook fits their requirements unless people use the client for real work. It’s easy to switch back to the classic client if you find something doesn’t work as expected. And if you do, be sure to let Microsoft know.
So much change, all the time. It’s a challenge to stay abreast of all the updates Microsoft makes across the Microsoft 365 ecosystem. Subscribe to the Office 365 for IT Pros eBook to receive monthly insights into what happens, why it happens, and what new features and capabilities mean for your tenant.
How to distinguish between different time blocks and proprieties
I am very confused between different time stage or topologies like in photo for simulink
-Power gui sample time
-Solver fixed time
And blocks sample time
Each one has own value
Is there any rule to respect when choosing seting time for each configuration
picture attachedI am very confused between different time stage or topologies like in photo for simulink
-Power gui sample time
-Solver fixed time
And blocks sample time
Each one has own value
Is there any rule to respect when choosing seting time for each configuration
picture attached I am very confused between different time stage or topologies like in photo for simulink
-Power gui sample time
-Solver fixed time
And blocks sample time
Each one has own value
Is there any rule to respect when choosing seting time for each configuration
picture attached time delay, fixed time solver, powergui MATLAB Answers — New Questions
Everytime I run code the color of lines on my graph changes
load ENGR131_lab4_Data.mat
function h = CalcPosition(t,DC,w)
wn=1.8
o=DC.*wn;
h=1-exp(-o.*t).*cos(w.*t);
end
function x = five(t,N,V,h,w)
z=evalin(‘base’,’DC’)
for N=1:2
switch N
case 1
plot(t,h)
hold on
case 2
plot(t,h);
hold on
case 3
LineColor=’k-‘;
plot(t,h,’:’);
hold on
case 4
LineColor= ‘m-‘;
plot(t,h,’-.’);
hold on
end
end
end
for V=1
subplot(2,3,V)
t=linspace(0,20,100)
for N=1:2
figure(1)
h=CalcPosition(t,DC(1,N),w(1,V))
five(t,N,V,h,w)
end
endload ENGR131_lab4_Data.mat
function h = CalcPosition(t,DC,w)
wn=1.8
o=DC.*wn;
h=1-exp(-o.*t).*cos(w.*t);
end
function x = five(t,N,V,h,w)
z=evalin(‘base’,’DC’)
for N=1:2
switch N
case 1
plot(t,h)
hold on
case 2
plot(t,h);
hold on
case 3
LineColor=’k-‘;
plot(t,h,’:’);
hold on
case 4
LineColor= ‘m-‘;
plot(t,h,’-.’);
hold on
end
end
end
for V=1
subplot(2,3,V)
t=linspace(0,20,100)
for N=1:2
figure(1)
h=CalcPosition(t,DC(1,N),w(1,V))
five(t,N,V,h,w)
end
end load ENGR131_lab4_Data.mat
function h = CalcPosition(t,DC,w)
wn=1.8
o=DC.*wn;
h=1-exp(-o.*t).*cos(w.*t);
end
function x = five(t,N,V,h,w)
z=evalin(‘base’,’DC’)
for N=1:2
switch N
case 1
plot(t,h)
hold on
case 2
plot(t,h);
hold on
case 3
LineColor=’k-‘;
plot(t,h,’:’);
hold on
case 4
LineColor= ‘m-‘;
plot(t,h,’-.’);
hold on
end
end
end
for V=1
subplot(2,3,V)
t=linspace(0,20,100)
for N=1:2
figure(1)
h=CalcPosition(t,DC(1,N),w(1,V))
five(t,N,V,h,w)
end
end graphing MATLAB Answers — New Questions
Performs the generalized app
Please help to generalized the program for given n and input data read from a Excel file Aleator.xlsx with n=1024 or the general case n read as input or set from the begining?
D = xlsread(‘Aleat.xlsx’,1);
n = 11;
nCols = 11
a11 = 0; a21 = 0 ; a31 = 0; a41 = 0; a51 = 0; a61 =0; a71=0; a81=0; a91=0; a101=0;
M = zeros(n,n);
M(1,1:n) = 0;
DM = zeros(10,10);
for i = 1:n
DM(i,1) = D(i,1)-D(i+1,1);
end;
for i = 1:(n-1)
DM(i,2) = DM(i,1)-DM(i+1,1);
end;
for i = 1:(n-2)
DM(i,3) = DM(i,2)-DM(i+1,2);
end;
for i = 1:(n-3)
DM(i,4) = DM(i,3)-DM(i+1,3);
end;
for i = 1:(n-4)
DM(i,5) = DM(i,4)-DM(i+1,4);
end;
for i = 1:(n-5)
DM(i,6) = DM(i,5)-DM(i+1,5);
end;
for i = 1:(n-6)
DM(i,7) = DM(i,6)-DM(i+1,6);
end;
for i = 1:(n-7)
DM(i,8) = DM(i,7)-DM(i+1,7);
end;
for i = 1:(n-8)
DM(i,9) = DM(i,8)-DM(i+1,8);
end;
for i = 1:(n-9)
DM(i,10) = DM(i,9)-DM(i+1,9);
end;
for i = 1:(n-10)
DM(i,11) = DM(i,10)-DM(i+1,10);
end;
b1 = D(14,1); …..b11 = D(4,1);
B1 = [b1 b2 b3 b4 b5 b6 b7 b8 b9 b10 b11];
B2 = B1′
if size(DM, 1) < nCols
error(‘Insufficient number of equations.’);
end
a = DM’ B1′;
X = linsolve(DM, B1′);
a11 = a(1,1); a21 = a(2,1); a31 = a(3,1); a41 = a(4,1); a51 = a(5,1); a61 = a(6,1); a71 = a(7,1); a81 = a(8,1); a91 = a(9,1); a101 = a(10,1);
b1 = DM(1,1)*a11+DM(1,2)*a21+DM(1,3)*a31+DM(1,4)*a41+DM(1,5)*a51+DM(1,6)*a61+DM(1,7)*a71+DM(1,8)*a81+DM(1,9)*a91+DM(1,10)*a101;
b2 = ….
b10 = DM(10,1)*a11+DM(10,2)*a21+DM(10,3)*a31+DM(10,4)*a41+DM(10,5)*a51+DM(10,6)*a61+DM(10,7)*a71+DM(10,8)*a81+DM(10,9)*a91+DM(10,10)*a101;
a = DM’ B1′;
X = linsolve(DM, B1′);
disp(a);
disp(X);
To read from a Excel file Aleator.xlsx with n=1024 or the general case n read as input or set from the begining?Please help to generalized the program for given n and input data read from a Excel file Aleator.xlsx with n=1024 or the general case n read as input or set from the begining?
D = xlsread(‘Aleat.xlsx’,1);
n = 11;
nCols = 11
a11 = 0; a21 = 0 ; a31 = 0; a41 = 0; a51 = 0; a61 =0; a71=0; a81=0; a91=0; a101=0;
M = zeros(n,n);
M(1,1:n) = 0;
DM = zeros(10,10);
for i = 1:n
DM(i,1) = D(i,1)-D(i+1,1);
end;
for i = 1:(n-1)
DM(i,2) = DM(i,1)-DM(i+1,1);
end;
for i = 1:(n-2)
DM(i,3) = DM(i,2)-DM(i+1,2);
end;
for i = 1:(n-3)
DM(i,4) = DM(i,3)-DM(i+1,3);
end;
for i = 1:(n-4)
DM(i,5) = DM(i,4)-DM(i+1,4);
end;
for i = 1:(n-5)
DM(i,6) = DM(i,5)-DM(i+1,5);
end;
for i = 1:(n-6)
DM(i,7) = DM(i,6)-DM(i+1,6);
end;
for i = 1:(n-7)
DM(i,8) = DM(i,7)-DM(i+1,7);
end;
for i = 1:(n-8)
DM(i,9) = DM(i,8)-DM(i+1,8);
end;
for i = 1:(n-9)
DM(i,10) = DM(i,9)-DM(i+1,9);
end;
for i = 1:(n-10)
DM(i,11) = DM(i,10)-DM(i+1,10);
end;
b1 = D(14,1); …..b11 = D(4,1);
B1 = [b1 b2 b3 b4 b5 b6 b7 b8 b9 b10 b11];
B2 = B1′
if size(DM, 1) < nCols
error(‘Insufficient number of equations.’);
end
a = DM’ B1′;
X = linsolve(DM, B1′);
a11 = a(1,1); a21 = a(2,1); a31 = a(3,1); a41 = a(4,1); a51 = a(5,1); a61 = a(6,1); a71 = a(7,1); a81 = a(8,1); a91 = a(9,1); a101 = a(10,1);
b1 = DM(1,1)*a11+DM(1,2)*a21+DM(1,3)*a31+DM(1,4)*a41+DM(1,5)*a51+DM(1,6)*a61+DM(1,7)*a71+DM(1,8)*a81+DM(1,9)*a91+DM(1,10)*a101;
b2 = ….
b10 = DM(10,1)*a11+DM(10,2)*a21+DM(10,3)*a31+DM(10,4)*a41+DM(10,5)*a51+DM(10,6)*a61+DM(10,7)*a71+DM(10,8)*a81+DM(10,9)*a91+DM(10,10)*a101;
a = DM’ B1′;
X = linsolve(DM, B1′);
disp(a);
disp(X);
To read from a Excel file Aleator.xlsx with n=1024 or the general case n read as input or set from the begining? Please help to generalized the program for given n and input data read from a Excel file Aleator.xlsx with n=1024 or the general case n read as input or set from the begining?
D = xlsread(‘Aleat.xlsx’,1);
n = 11;
nCols = 11
a11 = 0; a21 = 0 ; a31 = 0; a41 = 0; a51 = 0; a61 =0; a71=0; a81=0; a91=0; a101=0;
M = zeros(n,n);
M(1,1:n) = 0;
DM = zeros(10,10);
for i = 1:n
DM(i,1) = D(i,1)-D(i+1,1);
end;
for i = 1:(n-1)
DM(i,2) = DM(i,1)-DM(i+1,1);
end;
for i = 1:(n-2)
DM(i,3) = DM(i,2)-DM(i+1,2);
end;
for i = 1:(n-3)
DM(i,4) = DM(i,3)-DM(i+1,3);
end;
for i = 1:(n-4)
DM(i,5) = DM(i,4)-DM(i+1,4);
end;
for i = 1:(n-5)
DM(i,6) = DM(i,5)-DM(i+1,5);
end;
for i = 1:(n-6)
DM(i,7) = DM(i,6)-DM(i+1,6);
end;
for i = 1:(n-7)
DM(i,8) = DM(i,7)-DM(i+1,7);
end;
for i = 1:(n-8)
DM(i,9) = DM(i,8)-DM(i+1,8);
end;
for i = 1:(n-9)
DM(i,10) = DM(i,9)-DM(i+1,9);
end;
for i = 1:(n-10)
DM(i,11) = DM(i,10)-DM(i+1,10);
end;
b1 = D(14,1); …..b11 = D(4,1);
B1 = [b1 b2 b3 b4 b5 b6 b7 b8 b9 b10 b11];
B2 = B1′
if size(DM, 1) < nCols
error(‘Insufficient number of equations.’);
end
a = DM’ B1′;
X = linsolve(DM, B1′);
a11 = a(1,1); a21 = a(2,1); a31 = a(3,1); a41 = a(4,1); a51 = a(5,1); a61 = a(6,1); a71 = a(7,1); a81 = a(8,1); a91 = a(9,1); a101 = a(10,1);
b1 = DM(1,1)*a11+DM(1,2)*a21+DM(1,3)*a31+DM(1,4)*a41+DM(1,5)*a51+DM(1,6)*a61+DM(1,7)*a71+DM(1,8)*a81+DM(1,9)*a91+DM(1,10)*a101;
b2 = ….
b10 = DM(10,1)*a11+DM(10,2)*a21+DM(10,3)*a31+DM(10,4)*a41+DM(10,5)*a51+DM(10,6)*a61+DM(10,7)*a71+DM(10,8)*a81+DM(10,9)*a91+DM(10,10)*a101;
a = DM’ B1′;
X = linsolve(DM, B1′);
disp(a);
disp(X);
To read from a Excel file Aleator.xlsx with n=1024 or the general case n read as input or set from the begining? loop MATLAB Answers — New Questions
Guidance for handling CUPS remote code execution vulnerability using Microsoft Security capabilities
A new critical Remote code execution (RCE) vulnerability affecting CUPS (Common Unix Printing System) has been identified published last week, putting at risk organizations with Unix (Linux, Gnu and other systems). In this blogpost we will demonstrate how you can easily discover if your organization is vulnerable to the new critical unauthenticated RCE flaws in CUPS printing systems and view guidelines on remediation.
Affected versions:
CVE-2024-47176: cups-browsed binds on UDP port 631, accepting packets from any source. (cups-browsed ≤ 2.0.1)
CVE-2024-47076: libcupsfilters does not validate IPP attributes, allowing attacker-controlled data (libcupsfilters ≤ 2.1b1)
CVE-2024-47175: libppd does not sanitize IPP attributes, enabling data injection. (libppd ≤ 2.1b1)
CVE-2024-47177: foomatic-rip allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter. (cups-filters ≤ 2.0.)*
* Coverage for this vulnerability is expected shortly.
Impact
A remote attacker can replace or install printers with malicious IPP URLs, leading to arbitrary command execution when a print job is started.
We will demonstrate how organizations can harness the capabilities of Attack Path analysis together with Microsoft Defender suite of products to pinpoint and neutralize threats arising from such events. Our examination will center on: mapping vulnerabilities, evaluating affected assets, gauging potential impact via blast radius analysis, and implementing efficacious mitigations.
Recommendations for Mitigation and Best Practices
Mitigating risks associated with vulnerabilities requires a combination of proactive measures and real-time defenses. Here are some recommendations:
Update the CUPS package.
Disable and remove the cups-browsed service if not needed.
Block traffic to UDP port 631 and DNS-SD traffic if not necessary.
Mapping the CUPS vulnerability in Your Organization:
The first step in managing an incident is to map affected software within your organization’s assets. Defender Vulnerability Management solution provides a comprehensive vulnerability assessment across all your devices.
You can also use the following KQL query or this link, this query searches software vulnerabilities related to the specified CVEs and summarizes them by device name, OS version and device ID:
DeviceTvmSoftwareVulnerabilities
| where CveId has_any (“CVE-2024-47176”, “CVE-2024-47076”, “CVE-2024-47175”)
| summarize by DeviceName, DeviceId, OS=strcat(OSPlatform, “-“, OSVersion), SoftwareName, SoftwareVersion
Using Cloud Security Explorer
You can use the Cloud Security Explorer feature within Defender for Cloud to perform queries related to your posture across Azure, AWS, GCP, and code repositories. This allows you to investigate the specific CVE, identify affected machines, and understand the associated risks.
We have created specific queries for this CVE that help you to easily get an initial assessment of the threat this vulnerability creates for your organization, with choices for customization:
Virtual machines vulnerable to OpenPrinting CUPS
Container images with OpenPrinting CUPS critical vulnerabilities
Understanding potential impact with Microsoft Security Exposure Management
Attack paths:
Automated attack path analysis maps out potential attacks starting from exposed resources and tracing the possible routes an attacker might take to compromise critical assets. The analysis identifies exposed cloud compute resources, such virtual machines and Kubernetes containers, that are vulnerable to remote code execution vulnerabilities and the possible lateral movement steps the adversary might take in the environment. The attack paths are presented for all the supported cloud environments (Azure, AWS and GCP). To present the paths filter the view by the following example titles:
Internet exposed Azure VM with RCE vulnerabilities
Internet exposed GCP compute instance with RCE vulnerabilities
Internet exposed AWS EC2 instance with RCE vulnerabilities
Attack path analysis is available both in Microsoft Security Exposure Management and Microsoft Defender for Cloud.
Critical assets:
It is also advisable to filter for critical assets (devices that were identified as sensitive by the Critical Asset Protection rule engine) that are affected by the vulnerabilities, using the following query or this link:
ExposureGraphNodes
| where NodeProperties has ‘criticalityLevel’
| where NodeLabel in (‘microsoft.compute/virtualmachines’, ‘compute.instances’, ‘ec2.instance’, ‘device’, ‘container-image’, ‘microsoft.hybridcompute/machines’)
| join kind=inner (ExposureGraphEdges | where SourceNodeName in (‘CVE-2024-47076’, ‘CVE-2024-47175’, ‘CVE-2024-47176’, ‘CVE-2024-47177’))
on $left.NodeId == $right.TargetNodeId
Asset exposure:
Asset Exposure provides a complementary perspective by revealing all the routes leading to vulnerable entities. Using this capability according to the guidelines provided here, enables to identify potential areas of the attack surface that can lead to vulnerable resources. Strengthening the attack surface reduces the risk of internal vulnerable resources being discovered and exploited.
Conclusion
By following these guidelines and utilizing end-to-end integrated Microsoft Security products, organizations can better prepare for, prevent and respond to attacks, ensuring a more secure and resilient environment. While the above process provides a comprehensive approach to protecting your organization, continual monitoring, updating, and adapting to new threats are essential for maintaining robust security.
Microsoft Tech Community – Latest Blogs –Read More
¿Por qué el Timestamp que obtengo en Power Automate no coincide con la hora que pongo en To Do?
Buenos días,
Tengo unos flujos en Power Automate mediante los cuales accedo a propiedades de una tarea de una lista de To Do. Por ejemplo, el Reminder Time, recordatorio.
Unas listas de tareas nos las he creado yo y son las que funcionan bien cuando las accedo mediante Power Automate.
Creé listas adicionales y cuando las accedo con flujos de Power Automate obtengo datos que no son correctos.
Por ejemplo, creo una tarea desde mi aplicación To Do de escritorio en una lista de un compañero (no creada por mi) y le pongo un recordatorio a las 14:00 y cuando reviso el flujo de power automate verifico que power automate lee la tarea y obtiene un timestamp en el que aparece la hora correcta, las 14:00.
Ahora bien, si hago exactamente lo mismo pero la tarea la creo en una lista creada por mi, cuando leo el recordatorio que puse a las 14:00 con Power Automate en el timestamp aparece como hora las 12:00.
¿A qué se debe este comportamiento? La única diferencia es quién ha creado las listas.
Parece que debe deberse a una cuestión de zonas horarias pero ya he comprobado que todas las cuentas de que intervienen están en la misma zona.
Aparte del parche de sumar dos horas al timestamp según de quién sea la lista, ¿hay alguna solución para configurar adecuadamente la lista y que con power automate pueda leer la hora que pongo en To Do?
Gracias, un saludo.
Buenos días, Tengo unos flujos en Power Automate mediante los cuales accedo a propiedades de una tarea de una lista de To Do. Por ejemplo, el Reminder Time, recordatorio. Unas listas de tareas nos las he creado yo y son las que funcionan bien cuando las accedo mediante Power Automate. Creé listas adicionales y cuando las accedo con flujos de Power Automate obtengo datos que no son correctos. Por ejemplo, creo una tarea desde mi aplicación To Do de escritorio en una lista de un compañero (no creada por mi) y le pongo un recordatorio a las 14:00 y cuando reviso el flujo de power automate verifico que power automate lee la tarea y obtiene un timestamp en el que aparece la hora correcta, las 14:00. Ahora bien, si hago exactamente lo mismo pero la tarea la creo en una lista creada por mi, cuando leo el recordatorio que puse a las 14:00 con Power Automate en el timestamp aparece como hora las 12:00. ¿A qué se debe este comportamiento? La única diferencia es quién ha creado las listas. Parece que debe deberse a una cuestión de zonas horarias pero ya he comprobado que todas las cuentas de que intervienen están en la misma zona. Aparte del parche de sumar dos horas al timestamp según de quién sea la lista, ¿hay alguna solución para configurar adecuadamente la lista y que con power automate pueda leer la hora que pongo en To Do? Gracias, un saludo. Read More
Open library mask block using callback in same window
I am working with a Simulink model in R2023b.Created a mask and added callback to forcefully open model, when I double-click on a subsystem in a model, the subsystem opens in the same window; but when I double-click on a subsystem in a library, the subsystem opens in a new window.I am working with a Simulink model in R2023b.Created a mask and added callback to forcefully open model, when I double-click on a subsystem in a model, the subsystem opens in the same window; but when I double-click on a subsystem in a library, the subsystem opens in a new window. I am working with a Simulink model in R2023b.Created a mask and added callback to forcefully open model, when I double-click on a subsystem in a model, the subsystem opens in the same window; but when I double-click on a subsystem in a library, the subsystem opens in a new window. mask, simulink, window, library MATLAB Answers — New Questions
Importation de data depuis Excel sur Matlab pour un entrainement sur ‘Neural Network Fitting’
j’aimerai faire une prediction sur Matlab en utilsant l’APP sur Neural Network Fitting, mais encore sur l’importation des données je suis deja blocquée. Mes données comportes une 1ere colone de datatime vu que ce sont des données de consommation energetiques de quelques années pour différentes emplacement. Pouvez vous m’aidez sur cela s’il vous plait?j’aimerai faire une prediction sur Matlab en utilsant l’APP sur Neural Network Fitting, mais encore sur l’importation des données je suis deja blocquée. Mes données comportes une 1ere colone de datatime vu que ce sont des données de consommation energetiques de quelques années pour différentes emplacement. Pouvez vous m’aidez sur cela s’il vous plait? j’aimerai faire une prediction sur Matlab en utilsant l’APP sur Neural Network Fitting, mais encore sur l’importation des données je suis deja blocquée. Mes données comportes une 1ere colone de datatime vu que ce sont des données de consommation energetiques de quelques années pour différentes emplacement. Pouvez vous m’aidez sur cela s’il vous plait? neural network fitting MATLAB Answers — New Questions
Microsoft developer registration
Okay so I am trying to sign up as an individual in this program: https://developer.microsoft.com/en-us/microsoft-store/register
I keep getting the following error message: Microsoft runs on trust. We engage in a rigorous set of evaluation and certification processes; as a result your request was blocked. If you require further information please reach out to Microsoft support with reference number: 715-123225 and transaction ID: 5011567b-3c68-4222-9632-0ec0d2ead0a3.
Correlation ID: 9bdd32db-f3f4-41fc-83fb-026733aeef7f.
I cannot submit a complaint here: https://partner.microsoft.com/en-us/support?stage=2&topicid=b0d88868-85bd-3805-77d4-10a3889b9363
Because of this: You can’t create a support request for this topic because you do not have access to the Account Settings workspace.
I do not know what else to do, regular microsoft support cannot help me and I cannot contact the Partner Center support.
Okay so I am trying to sign up as an individual in this program: https://developer.microsoft.com/en-us/microsoft-store/register I keep getting the following error message: Microsoft runs on trust. We engage in a rigorous set of evaluation and certification processes; as a result your request was blocked. If you require further information please reach out to Microsoft support with reference number: 715-123225 and transaction ID: 5011567b-3c68-4222-9632-0ec0d2ead0a3.Correlation ID: 9bdd32db-f3f4-41fc-83fb-026733aeef7f. I cannot submit a complaint here: https://partner.microsoft.com/en-us/support?stage=2&topicid=b0d88868-85bd-3805-77d4-10a3889b9363 Because of this: You can’t create a support request for this topic because you do not have access to the Account Settings workspace. I do not know what else to do, regular microsoft support cannot help me and I cannot contact the Partner Center support. Read More
Files added not sync & no files in other user ToDo
Since last week dated 28/9/2024, any files we added in task, there was no files can be view or choose to open in other user ToDo.
Since last week dated 28/9/2024, any files we added in task, there was no files can be view or choose to open in other user ToDo. Read More
Bug in Windows App? AVD/WVD/Private Link/Workspace
Hello,
Situation is this:
Both Windows App and Azure Remote Desktop are in private network.
Host pool – both communications are switched to private link – public access is disabled.
We try to use private endpoint also for workspace.
If the workspace access is disabled Windows App stops work, but the older client remote desktop correctly continues.
It look like the new Windows App use some additional URL comparing to Remote Desktop which stays public. (I am not sure whether because of DNS or communication not available inside private endpoint or both.
Do you have similar experience? Is it known bug? Is there workaround?
I did not try switch the global feed discovery to private, because our other workspaces needs be reachable publicly.
How is it with the additional security provided by moving feeds download to private network, does it make sense at all? or Is it over security?
Hello, Situation is this:Both Windows App and Azure Remote Desktop are in private network.Host pool – both communications are switched to private link – public access is disabled.We try to use private endpoint also for workspace. If the workspace access is disabled Windows App stops work, but the older client remote desktop correctly continues.It look like the new Windows App use some additional URL comparing to Remote Desktop which stays public. (I am not sure whether because of DNS or communication not available inside private endpoint or both. Do you have similar experience? Is it known bug? Is there workaround?I did not try switch the global feed discovery to private, because our other workspaces needs be reachable publicly.How is it with the additional security provided by moving feeds download to private network, does it make sense at all? or Is it over security? Read More
IFS FUNCTION IS NOT WORKING
HELO DEAR,
COULD ANYONE HELP ME TO USE IFS FUNCTION IN MY EXCEL, BECAUSE THIS FUNCTION (IFS) NOT AVAILABLE IN MY EXCEL.. THANKS
HELO DEAR, COULD ANYONE HELP ME TO USE IFS FUNCTION IN MY EXCEL, BECAUSE THIS FUNCTION (IFS) NOT AVAILABLE IN MY EXCEL.. THANKS Read More
Unable to extract information of Custom Sensitive Info types from Purview API
Hi Guys,
Last few days I was trying to extract information on the Custom Sensitive Info types from the below API end point.
{purview ATLAS endpoint}/datamap/api/atlas/v2/types/typedef/guid/{guid}
Even though I can get all the BASE classifiers information from that, whenever I drop in the custom classifier ‘Guid’, api return
Code: 404
reason: “Not Found”
text: Given type guid XXXXXXXXXX was invalid
The API client got admin level privileges.
Appreciate if someone can help to a solution for this.
Thanks
Hi Guys, Last few days I was trying to extract information on the Custom Sensitive Info types from the below API end point.{purview ATLAS endpoint}/datamap/api/atlas/v2/types/typedef/guid/{guid}Even though I can get all the BASE classifiers information from that, whenever I drop in the custom classifier ‘Guid’, api return Code: 404reason: “Not Found”text: Given type guid XXXXXXXXXX was invalidThe API client got admin level privileges. Appreciate if someone can help to a solution for this. Thanks Read More
How to download Matlab 2018a?
Hello, can I get link to download Matlab 2018a?Hello, can I get link to download Matlab 2018a? Hello, can I get link to download Matlab 2018a? r2018a MATLAB Answers — New Questions
how to extract (x) coordinates and (y) coordinates of the top boundary from bwimage
Post Content Post Content code generation MATLAB Answers — New Questions
Algebraic state in algebraic loop containing … computed at time 0.0 is Inf or NaN.
Hello,
I am making a collision avoidance application such that an ego vehicle must avoid collision with another vehicle using responsibilty sensative safety by mobileye, controlling the ego vehicle with an mpc to get to point A to point B, and changing the optimal control with a Barrier Certificate Enforcement to avoid other vehicles.
I’ve attached a compressed file of the matlab codes and simulink model. I believe its necessary that I attach it all because this error is coming from a matrix multiplier.
The error I recieve is…
An error occurred while running the simulation and the simulation was terminated
Caused by:
Algebraic state in algebraic loop containing ‘feedbackmpcCBFv3/Barrier certificate enforcement/Barrier Certificate Enforcement/Barrier Certificate Constraint/Product1’ computed at time 0.0 is Inf or NaN. There may be a singularity in the solution. If the model is correct, try reducing the step size (either by reducing the fixed step size or by tightening the error tolerances) or tweak the initial guess of algebraic loop variable values.
In my barrier function I divide by a parameter called LODSDSD(Longitudinal opposite direction/same direction safe distance). This value is calculated by using the longitudinal velocity data of the non-ego vehicle from the scenario reader.
When I log the signal of the non-ego vehicle’s longitudinal velocity it comes out as 0 which would cause that barrier function to be a non-real number which is why I believe im getting this error from. I’ve verified that the scenario is inputted properly by making a feedfoward system with the same scenario to just log the data. and the initial condition of the non-ego vehicle is correct but when I turn it back to a feedback loop the intial longitudinal velocity of the non-ego vehicle is 0.
I’ve tried to change to a stiffer solver (ode15s(stiff/NDF)) and tighten my error tolerance.
I believe my model is correct as im use a model from Rajesh Rajamani – Vehicle Dynamics and Control Second Edition book.
Thank you in advance for anyone that can assist me with this error,
Marshall BottaHello,
I am making a collision avoidance application such that an ego vehicle must avoid collision with another vehicle using responsibilty sensative safety by mobileye, controlling the ego vehicle with an mpc to get to point A to point B, and changing the optimal control with a Barrier Certificate Enforcement to avoid other vehicles.
I’ve attached a compressed file of the matlab codes and simulink model. I believe its necessary that I attach it all because this error is coming from a matrix multiplier.
The error I recieve is…
An error occurred while running the simulation and the simulation was terminated
Caused by:
Algebraic state in algebraic loop containing ‘feedbackmpcCBFv3/Barrier certificate enforcement/Barrier Certificate Enforcement/Barrier Certificate Constraint/Product1’ computed at time 0.0 is Inf or NaN. There may be a singularity in the solution. If the model is correct, try reducing the step size (either by reducing the fixed step size or by tightening the error tolerances) or tweak the initial guess of algebraic loop variable values.
In my barrier function I divide by a parameter called LODSDSD(Longitudinal opposite direction/same direction safe distance). This value is calculated by using the longitudinal velocity data of the non-ego vehicle from the scenario reader.
When I log the signal of the non-ego vehicle’s longitudinal velocity it comes out as 0 which would cause that barrier function to be a non-real number which is why I believe im getting this error from. I’ve verified that the scenario is inputted properly by making a feedfoward system with the same scenario to just log the data. and the initial condition of the non-ego vehicle is correct but when I turn it back to a feedback loop the intial longitudinal velocity of the non-ego vehicle is 0.
I’ve tried to change to a stiffer solver (ode15s(stiff/NDF)) and tighten my error tolerance.
I believe my model is correct as im use a model from Rajesh Rajamani – Vehicle Dynamics and Control Second Edition book.
Thank you in advance for anyone that can assist me with this error,
Marshall Botta Hello,
I am making a collision avoidance application such that an ego vehicle must avoid collision with another vehicle using responsibilty sensative safety by mobileye, controlling the ego vehicle with an mpc to get to point A to point B, and changing the optimal control with a Barrier Certificate Enforcement to avoid other vehicles.
I’ve attached a compressed file of the matlab codes and simulink model. I believe its necessary that I attach it all because this error is coming from a matrix multiplier.
The error I recieve is…
An error occurred while running the simulation and the simulation was terminated
Caused by:
Algebraic state in algebraic loop containing ‘feedbackmpcCBFv3/Barrier certificate enforcement/Barrier Certificate Enforcement/Barrier Certificate Constraint/Product1’ computed at time 0.0 is Inf or NaN. There may be a singularity in the solution. If the model is correct, try reducing the step size (either by reducing the fixed step size or by tightening the error tolerances) or tweak the initial guess of algebraic loop variable values.
In my barrier function I divide by a parameter called LODSDSD(Longitudinal opposite direction/same direction safe distance). This value is calculated by using the longitudinal velocity data of the non-ego vehicle from the scenario reader.
When I log the signal of the non-ego vehicle’s longitudinal velocity it comes out as 0 which would cause that barrier function to be a non-real number which is why I believe im getting this error from. I’ve verified that the scenario is inputted properly by making a feedfoward system with the same scenario to just log the data. and the initial condition of the non-ego vehicle is correct but when I turn it back to a feedback loop the intial longitudinal velocity of the non-ego vehicle is 0.
I’ve tried to change to a stiffer solver (ode15s(stiff/NDF)) and tighten my error tolerance.
I believe my model is correct as im use a model from Rajesh Rajamani – Vehicle Dynamics and Control Second Edition book.
Thank you in advance for anyone that can assist me with this error,
Marshall Botta simulink, error, data MATLAB Answers — New Questions
Adding a trend line
All the videos I’m watching are telling me to press the “+” in the top right corner of my graph or select the “trend line” option under the “chart design” tab. I don’t know if theres been an update or if my account is jacked but I don’t have any of those options. Does anyone know how to add a trend line to my scatter graph?
TIA,
Amber
All the videos I’m watching are telling me to press the “+” in the top right corner of my graph or select the “trend line” option under the “chart design” tab. I don’t know if theres been an update or if my account is jacked but I don’t have any of those options. Does anyone know how to add a trend line to my scatter graph? TIA, Amber Read More
[powershell]Help!I can’t use ‘new-pssession’ to connect localhost.
I have open the “winrm” and run it.
I have set the firewall to pass
even close the firewll .
but I cant connect any computer .
look at this picture .
I have open the “winrm” and run it.I have set the firewall to pass even close the firewll .but I cant connect any computer .look at this picture . Read More
Mouse randomly stops working until restart
The bug seems to occur whenever my PC goes to sleep overnight.
When the bug occurs, my mouse stops working until I reboot.
Things I tried:
This mouse works perfectly fine on other PCs.Other working mouses do not work on this PC
OS: Windows 11
PC type: Asus laptop
The bug seems to occur whenever my PC goes to sleep overnight.When the bug occurs, my mouse stops working until I reboot.Things I tried:This mouse works perfectly fine on other PCs.Other working mouses do not work on this PCOS: Windows 11PC type: Asus laptop Read More