Category: Microsoft
Category Archives: Microsoft
Install apps from microsoft store (New)
i try to install the apps from Microsoft store new some of the apps give me this ( Required and available install) but when i check the Microsoft store i see the apps but need to me to install manually
can i know why
there anu policy i need to add for that actually all apps give me the same error
the attachment for more information
i try to install the apps from Microsoft store new some of the apps give me this ( Required and available install) but when i check the Microsoft store i see the apps but need to me to install manually can i know why there anu policy i need to add for that actually all apps give me the same error the attachment for more information Read More
What is Convolutional Neural Network — CNN (Deep Learning)
Convolutional Neural Networks (CNNs) are a type of deep learning neural network architecture that is particularly well suited to image classification and object recognition tasks. A CNN works by transforming an input image into a feature map, which is then processed through multiple convolutional and pooling layers to produce a predicted output.
Convolutional Neural Network — CNN architecture
In this blog post, we will explore the basics of CNNs, including how they work, their architecture, and how they can be used for a wide range of computer vision tasks. We will also provide examples of some real-world applications of CNNs, and outline some of the benefits and limitations of this deep-learning architecture.
Working of Convolutional Neural Network:
A convolutional neural network starts by taking an input image, which is then transformed into a feature map through a series of convolutional and pooling layers. The convolutional layer applies a set of filters to the input image, each filter producing a feature map that highlights a specific aspect of the input image. The pooling layer then downsamples the feature map to reduce its size, while retaining the most important information.
The feature map produced by the convolutional layer is then passed through multiple additional convolutional and pooling layers, each layer learning increasingly complex features of the input image. The final output of the network is a predicted class label or probability score for each class, depending on the task.
The architecture of Convolutional Neural Network:
A typical CNN architecture is made up of three main components: the input layer, the hidden layers, and the output layer. The input layer receives the input image and passes it to the hidden layers, which are made up of multiple convolutional and pooling layers. The output layer provides the predicted class label or probability scores for each class.
The hidden layers are the most important part of a CNN, and the number of hidden layers and the number of filters in each layer can be adjusted to optimize the network’s performance. A common architecture for a CNN is to have multiple convolutional layers, followed by one or more pooling layers, and then a fully connected layer that provides the final output.
Applications of Convolutional Neural Network:
CNNs have a wide range of applications in computer vision, including image classification, object detection, semantic segmentation, and style transfer.
Image classification: Image classification is the task of assigning a class label to an input image. CNNs can be trained on large datasets of labeled images to learn the relationships between the image pixels and the class labels, and then applied to new, unseen images to make a prediction.
Object detection: Object detection is the task of identifying objects of a specific class in an input image and marking their locations. This can be useful for applications such as security and surveillance, where it is important to detect and track objects in real time.
Semantic segmentation: Semantic segmentation is the task of assigning a class label to each pixel in an input image, producing a segmented image that can be used for further analysis. This can be useful for applications such as medical image analysis, where it is important to segment specific structures in an image for further analysis.
Style transfer: Style transfer is the task of transferring the style of one image to another image while preserving the content of the target image. This can be useful for applications such as art and design, where it is desired to create an image that combines the content of one image with the style of another.
Layers of Convolutional neural network:
The layers of a Convolutional Neural Network (CNN) can be broadly classified into the following categories:
Convolutional Layer: The convolutional layer is responsible for extracting features from the input image. It performs a convolution operation on the input image, where a filter or kernel is applied to the image to identify and extract specific features.
Convolutional Layer
Pooling Layer: The pooling layer is responsible for reducing the spatial dimensions of the feature maps produced by the convolutional layer. It performs a down-sampling operation to reduce the size of the feature maps and reduce computational complexity.
MaxPooling Layer
Activation Layer: The activation layer applies a non-linear activation function, such as the ReLU function, to the output of the pooling layer. This function helps to introduce non-linearity into the model, allowing it to learn more complex representations of the input data.
Activation Layer
Fully Connected Layer: The fully connected layer is a traditional neural network layer that connects all the neurons in the previous layer to all the neurons in the next layer. This layer is responsible for combining the features learned by the convolutional and pooling layers to make a prediction.
Fully Connected Layer
Normalization Layer: The normalization layer performs normalization operations, such as batch normalization or layer normalization, to ensure that the activations of each layer are well-conditioned and prevent overfitting.Dropout Layer: The dropout layer is used to prevent overfitting by randomly dropping out neurons during training. This helps to ensure that the model does not memorize the training data but instead generalizes to new, unseen data.Dense Layer: After the convolutional and pooling layers have extracted features from the input image, the dense layer can then be used to combine those features and make a final prediction. In a CNN, the dense layer is usually the final layer and is used to produce the output predictions. The activations from the previous layers are flattened and passed as inputs to the dense layer, which performs a weighted sum of the inputs and applies an activation function to produce the final output.
Dense layer
Benefits of Convolutional Neural Network:
Feature extraction: CNNs are capable of automatically extracting relevant features from an input image, reducing the need for manual feature engineering.Spatial invariance: CNNs can recognize objects in an image regardless of their location, size, or orientation, making them well-suited to object recognition tasks.Robust to noise: CNNs can often handle noisy or cluttered images, making them useful for real-world applications where image quality may be variable.Transfer learning: CNNs can leverage pre-trained models, reducing the amount of data and computational resources required to train a new model.Performance: CNNs have demonstrated state-of-the-art performance on a range of computer vision tasks, including image classification, object detection, and semantic segmentation.
Limitations of Convolutional Neural Network:
Computational cost: Training a deep CNN can be computationally expensive, requiring significant amounts of data and computational resources.Overfitting: Deep CNNs are prone to overfitting, especially when trained on small datasets, where the model may memorize the training data rather than generalize to new, unseen data.Lack of interpretability: CNNs are considered to be a “black box” model, making it difficult to understand why a particular prediction was made.Limited to grid-like structures: CNNs are limited to grid-like structures and cannot handle irregular shapes or non-grid-like data structures.
Conclusion:
In conclusion, Convolutional Neural Networks (CNNs) is a powerful deep learning architecture well-suited to image classification and object recognition tasks. With its ability to automatically extract relevant features, handle noisy images, and leverage pre-trained models, CNNs have demonstrated state-of-the-art performance on a range of computer vision tasks. However, they also have their limitations, including a high computational cost, overfitting, a lack of interpretability, and a limited ability to handle irregular shapes. Nevertheless, CNNs remain a popular choice for many computer vision tasks and are likely to continue to be a key area of research and development in the coming years.
Convolutional Neural Networks (CNNs) are a type of deep learning neural network architecture that is particularly well suited to image classification and object recognition tasks. A CNN works by transforming an input image into a feature map, which is then processed through multiple convolutional and pooling layers to produce a predicted output. Convolutional Neural Network — CNN architecture In this blog post, we will explore the basics of CNNs, including how they work, their architecture, and how they can be used for a wide range of computer vision tasks. We will also provide examples of some real-world applications of CNNs, and outline some of the benefits and limitations of this deep-learning architecture.Working of Convolutional Neural Network:A convolutional neural network starts by taking an input image, which is then transformed into a feature map through a series of convolutional and pooling layers. The convolutional layer applies a set of filters to the input image, each filter producing a feature map that highlights a specific aspect of the input image. The pooling layer then downsamples the feature map to reduce its size, while retaining the most important information.The feature map produced by the convolutional layer is then passed through multiple additional convolutional and pooling layers, each layer learning increasingly complex features of the input image. The final output of the network is a predicted class label or probability score for each class, depending on the task. The architecture of Convolutional Neural Network:A typical CNN architecture is made up of three main components: the input layer, the hidden layers, and the output layer. The input layer receives the input image and passes it to the hidden layers, which are made up of multiple convolutional and pooling layers. The output layer provides the predicted class label or probability scores for each class.The hidden layers are the most important part of a CNN, and the number of hidden layers and the number of filters in each layer can be adjusted to optimize the network’s performance. A common architecture for a CNN is to have multiple convolutional layers, followed by one or more pooling layers, and then a fully connected layer that provides the final output. Applications of Convolutional Neural Network:CNNs have a wide range of applications in computer vision, including image classification, object detection, semantic segmentation, and style transfer. Image classification: Image classification is the task of assigning a class label to an input image. CNNs can be trained on large datasets of labeled images to learn the relationships between the image pixels and the class labels, and then applied to new, unseen images to make a prediction. Object detection: Object detection is the task of identifying objects of a specific class in an input image and marking their locations. This can be useful for applications such as security and surveillance, where it is important to detect and track objects in real time. Semantic segmentation: Semantic segmentation is the task of assigning a class label to each pixel in an input image, producing a segmented image that can be used for further analysis. This can be useful for applications such as medical image analysis, where it is important to segment specific structures in an image for further analysis. Style transfer: Style transfer is the task of transferring the style of one image to another image while preserving the content of the target image. This can be useful for applications such as art and design, where it is desired to create an image that combines the content of one image with the style of another. Layers of Convolutional neural network:The layers of a Convolutional Neural Network (CNN) can be broadly classified into the following categories: Convolutional Layer: The convolutional layer is responsible for extracting features from the input image. It performs a convolution operation on the input image, where a filter or kernel is applied to the image to identify and extract specific features. Convolutional LayerPooling Layer: The pooling layer is responsible for reducing the spatial dimensions of the feature maps produced by the convolutional layer. It performs a down-sampling operation to reduce the size of the feature maps and reduce computational complexity. MaxPooling LayerActivation Layer: The activation layer applies a non-linear activation function, such as the ReLU function, to the output of the pooling layer. This function helps to introduce non-linearity into the model, allowing it to learn more complex representations of the input data. Activation LayerFully Connected Layer: The fully connected layer is a traditional neural network layer that connects all the neurons in the previous layer to all the neurons in the next layer. This layer is responsible for combining the features learned by the convolutional and pooling layers to make a prediction. Fully Connected LayerNormalization Layer: The normalization layer performs normalization operations, such as batch normalization or layer normalization, to ensure that the activations of each layer are well-conditioned and prevent overfitting.Dropout Layer: The dropout layer is used to prevent overfitting by randomly dropping out neurons during training. This helps to ensure that the model does not memorize the training data but instead generalizes to new, unseen data.Dense Layer: After the convolutional and pooling layers have extracted features from the input image, the dense layer can then be used to combine those features and make a final prediction. In a CNN, the dense layer is usually the final layer and is used to produce the output predictions. The activations from the previous layers are flattened and passed as inputs to the dense layer, which performs a weighted sum of the inputs and applies an activation function to produce the final output. Dense layerBenefits of Convolutional Neural Network:Feature extraction: CNNs are capable of automatically extracting relevant features from an input image, reducing the need for manual feature engineering.Spatial invariance: CNNs can recognize objects in an image regardless of their location, size, or orientation, making them well-suited to object recognition tasks.Robust to noise: CNNs can often handle noisy or cluttered images, making them useful for real-world applications where image quality may be variable.Transfer learning: CNNs can leverage pre-trained models, reducing the amount of data and computational resources required to train a new model.Performance: CNNs have demonstrated state-of-the-art performance on a range of computer vision tasks, including image classification, object detection, and semantic segmentation. Limitations of Convolutional Neural Network:Computational cost: Training a deep CNN can be computationally expensive, requiring significant amounts of data and computational resources.Overfitting: Deep CNNs are prone to overfitting, especially when trained on small datasets, where the model may memorize the training data rather than generalize to new, unseen data.Lack of interpretability: CNNs are considered to be a “black box” model, making it difficult to understand why a particular prediction was made.Limited to grid-like structures: CNNs are limited to grid-like structures and cannot handle irregular shapes or non-grid-like data structures. Conclusion:In conclusion, Convolutional Neural Networks (CNNs) is a powerful deep learning architecture well-suited to image classification and object recognition tasks. With its ability to automatically extract relevant features, handle noisy images, and leverage pre-trained models, CNNs have demonstrated state-of-the-art performance on a range of computer vision tasks. However, they also have their limitations, including a high computational cost, overfitting, a lack of interpretability, and a limited ability to handle irregular shapes. Nevertheless, CNNs remain a popular choice for many computer vision tasks and are likely to continue to be a key area of research and development in the coming years. Read More
MsAccess Help Expressions and property
Hello Access community!
I hope you are doing well, I have this report where someone else made the program using access and he is no longer with us, I have this field as shown in the picture below:
where I am trying to find the calculations that is turning that out.
and when I look at it in the control source it is this buy cost that is there as well so now am not sure where the calculations of this is stored.
this is an expression builder and am a msaccess noob so I dont know how to figure it out, help would be appreciated it!
Hello Access community! I hope you are doing well, I have this report where someone else made the program using access and he is no longer with us, I have this field as shown in the picture below:where I am trying to find the calculations that is turning that out.and when I look at it in the control source it is this buy cost that is there as well so now am not sure where the calculations of this is stored.this is an expression builder and am a msaccess noob so I dont know how to figure it out, help would be appreciated it! Read More
Return Value Based on Latest Date
Hello, I’m trying to return a value based on the latest date which has duplicates
For example…
DateBalance01/01/24£10002/01/24£12001/02/24£20001/03/24£21001/03/24£22001/03/24£230
Date DD/MM format
As there can be multiple transactions on the same day
So I’m trying to return the last value £230
I’ve looked online but couldn’t find a clear enough solution
Office Pro Plus 2021
Please advise & thank you for your time
Hello, I’m trying to return a value based on the latest date which has duplicatesFor example…DateBalance01/01/24£10002/01/24£12001/02/24£20001/03/24£21001/03/24£22001/03/24£230Date DD/MM formatAs there can be multiple transactions on the same daySo I’m trying to return the last value £230I’ve looked online but couldn’t find a clear enough solutionOffice Pro Plus 2021Please advise & thank you for your time Read More
AVERAGE or SUM Formula returning 0
Hi,
I have Excel on Mac and been struggling with a simple AVERAGE and SUM formula which keeps returning 0. I checked the data types, checked for texts with no luck. I notice the formula builder returns the correct answer but the cell just returns 0.
Please help, currently using it to study Data analytics and this is making it really frustrating.
Hi,I have Excel on Mac and been struggling with a simple AVERAGE and SUM formula which keeps returning 0. I checked the data types, checked for texts with no luck. I notice the formula builder returns the correct answer but the cell just returns 0.Please help, currently using it to study Data analytics and this is making it really frustrating. Read More
This Edge Canary Browser Force Crash Error
I think this canary patch is weird. The browser automatically shuts down while in use. Also, reopening closed tabs is not enabled.
Do you know anyone who suffers from these symptoms?
I think this canary patch is weird. The browser automatically shuts down while in use. Also, reopening closed tabs is not enabled.Do you know anyone who suffers from these symptoms? Read More
Set exchange policy with filter?
I am trying to figure out how to run a command to create a exchange online emailadresspolicy.
New-EmailAddressPolicy -Name Groups1 -IncludeUnifiedGroupRecipients -EnabledEmailAddressTemplates “SMTP:@santa.mycompany.com”,”smtp:@santa.mycompany.com” -RecipientFilter {mailNickname -like ‘Santa_*’} -Priority 1
I want all groups that are that have a mailnickname that starts with “Santa_” to be created with a specific subdomain.
I can not create it tho, i get error that recipientFilter is not a valid attribute.
New-EmailAddressPolicy: A parameter cannot be found that matches parameter name ‘RecipientFilter’.
i have also tried ConditionalCustomAttribute1 but get the same error:
anyone able to help?
I am trying to figure out how to run a command to create a exchange online emailadresspolicy. New-EmailAddressPolicy -Name Groups1 -IncludeUnifiedGroupRecipients -EnabledEmailAddressTemplates “SMTP:@santa.mycompany.com”,”smtp:@santa.mycompany.com” -RecipientFilter {mailNickname -like ‘Santa_*’} -Priority 1 I want all groups that are that have a mailnickname that starts with “Santa_” to be created with a specific subdomain.I can not create it tho, i get error that recipientFilter is not a valid attribute.New-EmailAddressPolicy: A parameter cannot be found that matches parameter name ‘RecipientFilter’. i have also tried ConditionalCustomAttribute1 but get the same error: anyone able to help? Read More
Can DHCP Server detect client windows version?
I have a DHCP server and several clients, some running Windows 10 and some Windows 7. I want the DHCP server to be able to identify the Windows version of the clients using the vendor class and assign the settings I’ve specified accordingly. Also, I don’t want to configure anything on the clients; I want the DHCP server to be able to detect the Windows version by itself. Is there a way to do this?
I have a DHCP server and several clients, some running Windows 10 and some Windows 7. I want the DHCP server to be able to identify the Windows version of the clients using the vendor class and assign the settings I’ve specified accordingly. Also, I don’t want to configure anything on the clients; I want the DHCP server to be able to detect the Windows version by itself. Is there a way to do this? Read More
How to access Bigpond account outlook
I am away from home- Australia and have not been able to access my bigpond email account. Can anyone help? Does outlook not allow bigpond accounts any more?
I am away from home- Australia and have not been able to access my bigpond email account. Can anyone help? Does outlook not allow bigpond accounts any more? Read More
Text.Remove a specific word in Power Query
Am I able to use Text.Remove in power Query to remove specific words from a column such as “BLACK” :WHITE” “RED”. if so what is the formula? I have been trying with a custom column and the using Text.Remove and Text.Select
Thank you Eqa
Am I able to use Text.Remove in power Query to remove specific words from a column such as “BLACK” :WHITE” “RED”. if so what is the formula? I have been trying with a custom column and the using Text.Remove and Text.Select Thank you Eqa Read More
Unable to delete outlook from my machine (using windows11 home version 23H2).
Hi, I am unable to delete outlook from my startup/laptop (using windows11 home version 23H2).
when I go into installed apps, there is no outlook as you can see here…
it shows up on my startup and when I click on it, it actually opens outlook… Please help
Thanks
Hi, I am unable to delete outlook from my startup/laptop (using windows11 home version 23H2). when I go into installed apps, there is no outlook as you can see here… it shows up on my startup and when I click on it, it actually opens outlook… Please help Thanks Read More
Windows 10 Updates resetting local ethernet
Hi Microsoft Tech Team,
Riddle me this – why o why do your updates reset all my Ethernet settings??? I mean seriously?
Every time there is an update it scrambles my Ethernet and I can spend up to a week meticulously checking every conceivable setting (mainly power management) in the deep dark catacombs of Windows to get a stable connection. It’s infuriating!!
I’ve just come home from an overseas trip, Windows Update required, now my Ethernet is cycling connect-disconnect every 10 second…. I mean why? It was perfectly stable before the update?
Are you hiring monkeys for the Dev Team now?
Hi Microsoft Tech Team, Riddle me this – why o why do your updates reset all my Ethernet settings??? I mean seriously? Every time there is an update it scrambles my Ethernet and I can spend up to a week meticulously checking every conceivable setting (mainly power management) in the deep dark catacombs of Windows to get a stable connection. It’s infuriating!! I’ve just come home from an overseas trip, Windows Update required, now my Ethernet is cycling connect-disconnect every 10 second…. I mean why? It was perfectly stable before the update? Are you hiring monkeys for the Dev Team now? Read More
Create an IFOR formula
I am trying to create a formula to find any fields that are greater than $1,000, if true, then 0, if false, then $5.00. Below are the fields I created and the formula I am trying to use.
=IF(OR(A1>1000,B1>1000,C1>1000,D1>1000,E1>1000,F1>1000,G1>1000), 0,H2)
I am trying to create a formula to find any fields that are greater than $1,000, if true, then 0, if false, then $5.00. Below are the fields I created and the formula I am trying to use. =IF(OR(A1>1000,B1>1000,C1>1000,D1>1000,E1>1000,F1>1000,G1>1000), 0,H2) Read More
A columns’ data under custom sort but still report to subsequent sheets
Hi Everyone,
This is the leaderboard in our sales office at work. In every Sheet (Month), column BP shows each salesman’s total sales for the month in green. It is custom filtered to order the salesmen from most sales to the least in descending order. Resulting in column BP constantly rearranging; so I am struggling to make the final totals in column BP report on the following months column B titled “Last Month” with the correct corresponding salesman. Does anyone know how I can make each sheets column BP report to column B on the following sheet although they sort every day?
Thank you for your time.
Hi Everyone, This is the leaderboard in our sales office at work. In every Sheet (Month), column BP shows each salesman’s total sales for the month in green. It is custom filtered to order the salesmen from most sales to the least in descending order. Resulting in column BP constantly rearranging; so I am struggling to make the final totals in column BP report on the following months column B titled “Last Month” with the correct corresponding salesman. Does anyone know how I can make each sheets column BP report to column B on the following sheet although they sort every day? Thank you for your time. Read More
Defender API – querying IndentityInfo in Advanced Hunting
Hi,
Is any of you having issues with Defender API in Python when running advanced hunting queries that involve the IdentityInfo table?
When i run anything that involves IdentityInfo, i get error 400: bad request. However, if i remove the IdentityInfo from the query, it simply works.
Hi, Is any of you having issues with Defender API in Python when running advanced hunting queries that involve the IdentityInfo table?When i run anything that involves IdentityInfo, i get error 400: bad request. However, if i remove the IdentityInfo from the query, it simply works. Read More
“Repair your computer” from media creation tool doesn’t start
I’ve been having an issue with starting my windows today, as a result of the “reboot and select proper boot device today” error, to which I have already tried rearranging boot disk order in bios, not working. If anyone knows a way to fix that, that would be great, but that is not the relevant problem here. I’m trying to back up my C drive so I can fix a (presumably) corrupted windows booter, and I’ve used the media creation tool to put a windows installation on a USB drive, however when it starts and I try clicking on the “repair your computer” button, it just goes to a blue screen and does nothing. I’ve waited on this for around an hour and tried multiple times again, but it is still the same and never goes to the windows recovery environment as shown in this video.
I’ve been having an issue with starting my windows today, as a result of the “reboot and select proper boot device today” error, to which I have already tried rearranging boot disk order in bios, not working. If anyone knows a way to fix that, that would be great, but that is not the relevant problem here. I’m trying to back up my C drive so I can fix a (presumably) corrupted windows booter, and I’ve used the media creation tool to put a windows installation on a USB drive, however when it starts and I try clicking on the “repair your computer” button, it just goes to a blue screen and does nothing. I’ve waited on this for around an hour and tried multiple times again, but it is still the same and never goes to the windows recovery environment as shown in this video. Read More
Connect to a Linux VM using Bastion and Key Vault without a private key file
In enterprise environments, requirements often demand the use of private networks, resulting in VMs not being assigned Public IP addresses. In such cases, Azure Bastion offers an extremely useful feature for accessing these VMs without complexity. When logging into Linux VMs on Azure via Azure Bastion using an SSH Private Key, the key is often managed as a local file. Managing SSH Private Key files on individual devices poses risks such as potential key leakage. Therefore, centralized management, including proper role assignment, is preferable from a security standpoint. A common need in such scenarios is to manage SSH Private Keys using Key Vault. This article provides such a comprehensive step-by-step guide.
There are two huge benefits here.
SSH Private Key is no longer required to store as a local file Local file by storing it in Azure Key Vault.
Access to Linux VM can be be controlled using RBAC assignment for Azure Key Vault.
Regarding the first point, storing the SSH Private Key locally after creating it through the Azure Portal can be issues such as loss the file or difficulty in identifying which VM it is for. Additionally, it has the benefit of reducing the risk of file leakage if a developer leaves the company or the project.
Regarding the second point, using Key Vault for access management allows you to control VM access through Key Vault. You can manage access control to specific VMs.
Here is the architecture diagram for the current setup. When creating a Linux VM, the SSH Private Key generated through the Azure portal is registered in Key Vault. This SSH Private Key is then used to access the Linux VM via Azure Bastion.
Prerequisites
Before following this article, you have to create Azure resources as follows:
Virtual Network
Key Vault
Azure Bastion
Setup
First, we create a new SSH Key when creating the Linux VM through the Azure portal. While it is possible to create an SSH Private Key when creating a Linux VM through the Azure portal, you can also create it separately. Once you input the parameters and create the Linux VM, you can download the SSH Private Key and save it as a local file.
If you choose to create the SSH Private Key separately, note that you need to select “Reset password” from the VM menu on Azure Portal and use “Add SSH public key” to set the SSH Key information for the Linux VM. The first link in the References section contains relevant information.
Next, you have to acquire proper RBAC role to manage Azure Key Vault. It’s not enough just having subscription Owner role. In this article, we assign Key Vault Administrator role.
We can use Key Vault Secrets Officer role for developers who access your Linux VM. Please refer to the article as follows to assign proper RBA roles.
Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control
Then, we register the SSH Private Key in the secrets of Azure Key Vault (you cannot select Keys or Certificates with Azure Bastion). There is a tip here that the SSH Private Key contains a multi-line file, but the Key Vault portal does not support the registration of multi-line strings. Therefore, we have to execute this via command line as follows:
az keyvault secret set –name “your-secret-name” –vault-name “your-key-name” –file “my-ssh-private-key.pem”
If the command works well, you can find your SSH Private Key on the Azure Key Vault.
Then, we can access the Linux VM via Azure Bastion. Select the Linux VM, choose “SSH Private Key from Azure Key Vault” from the Authentication Type options, and use the the SSH Private Key you have registered.
Error #1: Register SSH Private Key without RBAC role assignment
You got error as follows if you do not have proper RBAC. I have assigned Key Vault Administrator role to the operator to solve this issue.
Error #2: Access Linux VM without RBAC role assignment
You got error as follows if you do not have proper RBAC. I have assigned Key Vault Secrets Officer role to the operator to solve this issue.
References
ssl – How to use a certificate from a Azure Key Vault to connect to a Azure Virtual Machine through Bastion? – Stack Overflow
az keyvault secret | Microsoft Learn
az sshkey | Microsoft Learn
Connect to a Linux VM using SSH – Azure Bastion | Microsoft Learn
Microsoft Tech Community – Latest Blogs –Read More
Support for Com4 ManagedInProcessServer and others
Com servers may generally be written in managed or unmanaged code. The COM4 schema extensions include elements such as com4:ManagedInProcessServer which allows for the specification of a COM Clsid that is implemented in managed code.
Unfortunately, the foundation manifest was not extended to include these new categories when performing the uniqueness test to ensure that when other element references a CLSID that the ID is defined once and only once in the document. This was done when COM2 was added to the schema set but seems to have been missed here.
These are the lines from the latest SDK version of the FoundationManifestSchema.xsd (starting on line 134) which appear problematic to me:
<xs:unique name=”Class_Id”>
<xs:selector xpath=”f:Applications/f:Application/f:Extensions/com:Extension/com:ComServer/com:ExeServer/com:Class | f:Applications/f:Application/f:Extensions/com:Extension/com:ComServer/com:SurrogateServer/com:Class | f:Applications/f:Application/f:Extensions/com:Extension/com:ComServer/com:TreatAsClass | f:Applications/f:Application/f:Extensions/com:Extension/com:ComInterface/com:ProxyStub | f:Extensions/com:Extension/com:ComInterface/com:ProxyStub | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComServer/com:ExeServer/com:Class | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComServer/com:SurrogateServer/com:Class | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComServer/com:TreatAsClass | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComInterface/com:ProxyStub | f:Extensions/com2:Extension/com2:ComInterface/com:ProxyStub”/>
<xs:field xpath=”@Id”/>
</xs:unique>
This means that while we are able to add the ManagedInProcessServer element to define the com server component (as either a PackageExtension or ApplicationExtension as needed), we cannot reference the Clsid in any other element that would need it, such as a ShellExtension.
Fixing the above in the Foundation (and updating all tooling that verifying the schemas) will be necessary in order to build and package up more modern COM components.
Tagging @Fizza for visibility.
Com servers may generally be written in managed or unmanaged code. The COM4 schema extensions include elements such as com4:ManagedInProcessServer which allows for the specification of a COM Clsid that is implemented in managed code.
Unfortunately, the foundation manifest was not extended to include these new categories when performing the uniqueness test to ensure that when other element references a CLSID that the ID is defined once and only once in the document. This was done when COM2 was added to the schema set but seems to have been missed here.
These are the lines from the latest SDK version of the FoundationManifestSchema.xsd (starting on line 134) which appear problematic to me:
<xs:unique name=”Class_Id”><xs:selector xpath=”f:Applications/f:Application/f:Extensions/com:Extension/com:ComServer/com:ExeServer/com:Class | f:Applications/f:Application/f:Extensions/com:Extension/com:ComServer/com:SurrogateServer/com:Class | f:Applications/f:Application/f:Extensions/com:Extension/com:ComServer/com:TreatAsClass | f:Applications/f:Application/f:Extensions/com:Extension/com:ComInterface/com:ProxyStub | f:Extensions/com:Extension/com:ComInterface/com:ProxyStub | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComServer/com:ExeServer/com:Class | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComServer/com:SurrogateServer/com:Class | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComServer/com:TreatAsClass | f:Applications/f:Application/f:Extensions/com2:Extension/com2:ComInterface/com:ProxyStub | f:Extensions/com2:Extension/com2:ComInterface/com:ProxyStub”/><xs:field xpath=”@Id”/></xs:unique>
This means that while we are able to add the ManagedInProcessServer element to define the com server component (as either a PackageExtension or ApplicationExtension as needed), we cannot reference the Clsid in any other element that would need it, such as a ShellExtension.
Fixing the above in the Foundation (and updating all tooling that verifying the schemas) will be necessary in order to build and package up more modern COM components.
Tagging @Fizza for visibility. Read More
Schedule View By Event
I have a given excel schedule, similar to the “Input” table shown in the attachment. I have a need to organize this table by event and show participants in individual columns. I have this table shown as “Desired Output” in the attachment I also have Power BI available to me, if that provides an easier solution.
Any and all help would be greatly appreciated, thank you.
I have a given excel schedule, similar to the “Input” table shown in the attachment. I have a need to organize this table by event and show participants in individual columns. I have this table shown as “Desired Output” in the attachment I also have Power BI available to me, if that provides an easier solution. Any and all help would be greatly appreciated, thank you. Sheet Read More
Hotmail is conflicting with OneDrive through my Microsoft 365 account
I’ve been struggling for about one month, thus far, with my OneDrive through my Microsoft 365 account. Suddenly, my 40-year-old Hotmail account is frozen, and I cannot send, nor receive email because, the system indicates, my OneDrive is full. When I click on that, to be led to my OneDrive, it shows that I have used less than 0.2 GB from the 15 GB allocated space. In the meantime, I cannot use my Hotmail, where I have deleted about 10 GB of files. This has not helped me, and I cannot reach someone from Microsoft for assistance. Does anyone have any clue about how to resolve this mystery?
I’ve been struggling for about one month, thus far, with my OneDrive through my Microsoft 365 account. Suddenly, my 40-year-old Hotmail account is frozen, and I cannot send, nor receive email because, the system indicates, my OneDrive is full. When I click on that, to be led to my OneDrive, it shows that I have used less than 0.2 GB from the 15 GB allocated space. In the meantime, I cannot use my Hotmail, where I have deleted about 10 GB of files. This has not helped me, and I cannot reach someone from Microsoft for assistance. Does anyone have any clue about how to resolve this mystery? Read More