Category: News
Data and time dimensions are incompatible when running HIL
I have the same question as Data and time dimensions are incompatible error message – MATLAB Answers – MATLAB Central (mathworks.cn). The difference is that when running HIL, the scope cannot display data, while the data inspector will report the error in a few minutes.This bug seriously affects its usage.Hope it can be resolved.I have the same question as Data and time dimensions are incompatible error message – MATLAB Answers – MATLAB Central (mathworks.cn). The difference is that when running HIL, the scope cannot display data, while the data inspector will report the error in a few minutes.This bug seriously affects its usage.Hope it can be resolved. I have the same question as Data and time dimensions are incompatible error message – MATLAB Answers – MATLAB Central (mathworks.cn). The difference is that when running HIL, the scope cannot display data, while the data inspector will report the error in a few minutes.This bug seriously affects its usage.Hope it can be resolved. speedgoat, simulink, datainspector MATLAB Answers — New Questions
Issue With Renewing Azure Devops Service Principle Token
Today i got an issue when tried to build my project in azure devops, and the issue was stating Invalid Client Id or Client Secret.
But they were valid and after doing some research i came to know cause of expired Service Principle Token (which expire once in 3 month) i was getting that issue.
But i wanted to know whether in order to renew the service principle token am i required to have permission’s greater that project administrator something like owner in azure devops ??
Cause i am not able to renew the token using the steps mentioned in the below post
https://learn.microsoft.com/en-us/azure/devops/pipelines/release/azure-rm-endpoint?view=azure-devops#service-principals-token-expired
Today i got an issue when tried to build my project in azure devops, and the issue was stating Invalid Client Id or Client Secret.But they were valid and after doing some research i came to know cause of expired Service Principle Token (which expire once in 3 month) i was getting that issue.But i wanted to know whether in order to renew the service principle token am i required to have permission’s greater that project administrator something like owner in azure devops ??Cause i am not able to renew the token using the steps mentioned in the below posthttps://learn.microsoft.com/en-us/azure/devops/pipelines/release/azure-rm-endpoint?view=azure-devops#service-principals-token-expired Read More
Creating an efficient semantic modeling
I need your help in creating a semantic modeling for the below tables:
I have below 7 tables and their names are:
Unify Budget
Unify Meter Location
Unify Budget Output
Bridging Table
EM DataElectricity
EM Misc Charges
EM Contacts
EM Points
Now above set of unify tables needs to connected with EM set of tables through the Bridging table.
Could you please help me with that sir?
PFA file here Example Extract.xlsx
Please let me know if you need further details
Thanks in advance!
Hi @Sergei Baklan I need your help in creating a semantic modeling for the below tables:I have below 7 tables and their names are:Unify BudgetUnify Meter LocationUnify Budget Output Bridging Table EM DataElectricityEM Misc ChargesEM ContactsEM Points Now above set of unify tables needs to connected with EM set of tables through the Bridging table.Could you please help me with that sir? PFA file here Example Extract.xlsxPlease let me know if you need further details Thanks in advance! Read More
BitTitan T2T Migration Without MPN ID
Hello Community. I am trying to migrate a handful of users from an M365 tenant with a custom domain, to another M365 tenant without a custom domain. After migration we’ll release the domain from tenant A and pick it up in tenant B. In other words, we want to keep the domain from the source and apply it to the target. I am getting errors with BitTitan setting up the project.
It is a generic error that tells me to contact support, which I did and opened a ticket. While I’m waiting, wanted to see if the community has any experience with this type of migration. I see a warning in the application settings in Azure and wondered if it’s relevant. Does anyone know if BitTitan MigrationWiz works with onmicrosoft.com email domain (no MPN ID)?
The BitTitan error.
Many thanks for sharing any experience you have in this topic.
Hello Community. I am trying to migrate a handful of users from an M365 tenant with a custom domain, to another M365 tenant without a custom domain. After migration we’ll release the domain from tenant A and pick it up in tenant B. In other words, we want to keep the domain from the source and apply it to the target. I am getting errors with BitTitan setting up the project. It is a generic error that tells me to contact support, which I did and opened a ticket. While I’m waiting, wanted to see if the community has any experience with this type of migration. I see a warning in the application settings in Azure and wondered if it’s relevant. Does anyone know if BitTitan MigrationWiz works with onmicrosoft.com email domain (no MPN ID)? The BitTitan error.Many thanks for sharing any experience you have in this topic. Read More
Workday Formula auto filling holiday table to the next cells
I am using the workday formula to get 15 business days after the request to extend a due date. Broker ask for an extension X day, we approve and change their invoice due date to Y Day. I wish to exclude weekends and holidays. I have my holiday table on a separate tab (Holiday) from B1 to B10.
The formula is simple:
=workday(date of request C1),15,Holiday!B1:B10)
This works fine in a one off however when I pull the cell down to fill into the next cell below it moves my Table from B1:B10 to B2:B11. I need the fill feature to take the request date from the cell below (Column C is where I put the request date, so it stretches down C1, C2, and so on down the excel sheet). I want column C to move with the formula, but the holiday table to remain fixed.
I am using the workday formula to get 15 business days after the request to extend a due date. Broker ask for an extension X day, we approve and change their invoice due date to Y Day. I wish to exclude weekends and holidays. I have my holiday table on a separate tab (Holiday) from B1 to B10. The formula is simple: =workday(date of request C1),15,Holiday!B1:B10) This works fine in a one off however when I pull the cell down to fill into the next cell below it moves my Table from B1:B10 to B2:B11. I need the fill feature to take the request date from the cell below (Column C is where I put the request date, so it stretches down C1, C2, and so on down the excel sheet). I want column C to move with the formula, but the holiday table to remain fixed. Read More
What Should I Do if QuickBooks QBMpin Out Of Memory Issue on Windows 11?
QuickBooks is an essential tool for many businesses to manage their finances efficiently. However, encountering issues like the QBMpin Out of Memory problem can disrupt your workflow. This error typically occurs when QuickBooks runs out of memory resources, leading to sluggish performance or even crashes. In this guide, we’ll explore various solutions to resolve this issue on Windows 11.
1. Check System Requirements: Ensure your computer meets the minimum system requirements for running QuickBooks and Windows 11. Inadequate system resources can contribute to memory-related errors. Upgrade your RAM if necessary to improve performance.
2. Close Background Applications: Running too many programs simultaneously can exhaust your system’s memory resources. Close unnecessary applications and processes running in the background, especially resource-intensive ones, to free up memory for QuickBooks.
3. Update QuickBooks: Make sure you’re using the latest version of QuickBooks. Intuit regularly releases updates that include bug fixes and performance improvements. Updating QuickBooks may resolve compatibility issues causing the QBMpin Out of Memory error.
4. Adjust QuickBooks Preferences: Optimize QuickBooks settings to reduce memory usage. In QuickBooks, go to Edit > Preferences > Desktop View and set the “Keep QuickBooks running for quick startups” option to “No.” This prevents QuickBooks from consuming excessive memory when minimized.
5. Increase Virtual Memory: Windows uses virtual memory (paging file) to supplement physical RAM. Increasing virtual memory allocation can help alleviate memory shortages. To adjust virtual memory settings, right-click on “This PC” > Properties > Advanced system settings > Performance > Settings > Advanced > Virtual memory > Change. Here, you can manually set the initial and maximum size of the paging file.
6. Run QuickBooks Diagnostic Tool: QuickBooks includes a built-in diagnostic tool to identify and fix common issues. Run the QuickBooks Install Diagnostic Tool to troubleshoot and repair problems related to installation, network connectivity, and performance.
7. Consider Hardware Upgrades: If you frequently encounter memory-related errors despite optimizing software settings, consider upgrading your hardware. Adding more RAM or upgrading to a faster storage drive (SSD) can significantly improve system performance and reduce memory-related issues.
Conclusion:
The QBMpin Out of Memory issue in QuickBooks on Windows 11 can be frustrating, but with the right troubleshooting steps, you can resolve it effectively. By following the suggestions outlined in this guide, you can optimize your system settings, update software, and make necessary hardware upgrades to ensure smooth operation of QuickBooks. If the problem persists, consider seeking assistance from QuickBooks support or consulting with a qualified IT professional.
QuickBooks is an essential tool for many businesses to manage their finances efficiently. However, encountering issues like the QBMpin Out of Memory problem can disrupt your workflow. This error typically occurs when QuickBooks runs out of memory resources, leading to sluggish performance or even crashes. In this guide, we’ll explore various solutions to resolve this issue on Windows 11.1. Check System Requirements: Ensure your computer meets the minimum system requirements for running QuickBooks and Windows 11. Inadequate system resources can contribute to memory-related errors. Upgrade your RAM if necessary to improve performance.2. Close Background Applications: Running too many programs simultaneously can exhaust your system’s memory resources. Close unnecessary applications and processes running in the background, especially resource-intensive ones, to free up memory for QuickBooks.3. Update QuickBooks: Make sure you’re using the latest version of QuickBooks. Intuit regularly releases updates that include bug fixes and performance improvements. Updating QuickBooks may resolve compatibility issues causing the QBMpin Out of Memory error.4. Adjust QuickBooks Preferences: Optimize QuickBooks settings to reduce memory usage. In QuickBooks, go to Edit > Preferences > Desktop View and set the “Keep QuickBooks running for quick startups” option to “No.” This prevents QuickBooks from consuming excessive memory when minimized.5. Increase Virtual Memory: Windows uses virtual memory (paging file) to supplement physical RAM. Increasing virtual memory allocation can help alleviate memory shortages. To adjust virtual memory settings, right-click on “This PC” > Properties > Advanced system settings > Performance > Settings > Advanced > Virtual memory > Change. Here, you can manually set the initial and maximum size of the paging file.6. Run QuickBooks Diagnostic Tool: QuickBooks includes a built-in diagnostic tool to identify and fix common issues. Run the QuickBooks Install Diagnostic Tool to troubleshoot and repair problems related to installation, network connectivity, and performance.7. Consider Hardware Upgrades: If you frequently encounter memory-related errors despite optimizing software settings, consider upgrading your hardware. Adding more RAM or upgrading to a faster storage drive (SSD) can significantly improve system performance and reduce memory-related issues. Conclusion:The QBMpin Out of Memory issue in QuickBooks on Windows 11 can be frustrating, but with the right troubleshooting steps, you can resolve it effectively. By following the suggestions outlined in this guide, you can optimize your system settings, update software, and make necessary hardware upgrades to ensure smooth operation of QuickBooks. If the problem persists, consider seeking assistance from QuickBooks support or consulting with a qualified IT professional. Read More
Network Protection – block country
how can I use Network Protection to block connections to entire countries?
In Entra ID conditional access, I can block access from countries that might
be hostile to a tenanthave no expected authentications
it makes sense, then, that Network Protection should control connections to entire countries, too; this would be an ‘equivalent’ function to that in Entra ID.
How can I do this?
how can I use Network Protection to block connections to entire countries?In Entra ID conditional access, I can block access from countries that mightbe hostile to a tenanthave no expected authenticationsit makes sense, then, that Network Protection should control connections to entire countries, too; this would be an ‘equivalent’ function to that in Entra ID.How can I do this? Read More
Dates of visits from table based on the crtieria
Hello, I have 100 villages on a table, and there is a target of visiting various villages in a month. I have used COUNTIF formula to put on the number of times a village is visited in one month. How to find out dates of each visit for one village. Like Village A is visited twice in May, 5th and 10th of the month. Countif brings 2 for Village A from May, but what formula to use to pull out dates of 5 and 10 may.
Hello, I have 100 villages on a table, and there is a target of visiting various villages in a month. I have used COUNTIF formula to put on the number of times a village is visited in one month. How to find out dates of each visit for one village. Like Village A is visited twice in May, 5th and 10th of the month. Countif brings 2 for Village A from May, but what formula to use to pull out dates of 5 and 10 may. Read More
Email Protection Basics in Microsoft 365 Part Five: Mastering Overrides
Microsoft Support is excited to continue the blog series that will demystify how Microsoft 365 email protection works. In this fifth and final part of the series, we will cover the different overrides, why you may need them, and why it isn’t a good idea to keep them permanently.
Email security is a critical aspect of modern business operations, and Microsoft 365 provides a robust set of tools to keep your communications safe. But what should you do when legitimate emails are blocked? This is where submissions and overrides come into play. As we have covered in part 2 of this series, Submissions help you learn more about why email was junked or quarantined and allow you to notify Microsoft if the filters got it wrong. (It happens.) Overrides are special settings that allow certain emails to bypass the usual security filters, ensuring important communications reach their destination.
A closer look at email overrides
Overrides are not one-size-fits-all; they come in different forms to suit various needs. Use Explorer email summary flyout and email entity pages to learn more about why a message was delivered to a certain location, and if overrides played a role in delivery. Note, since messages can have multiple allow or block overrides as identified in the column Override source, the override that ultimately allowed or blocked the message is identified in Primary override source in Explorer.
Learn more: Understanding overrides within the email entity page in Microsoft Defender for Office 365, Understanding detection technology within the email entity page in Microsoft Defender for Office 365
Tenant Allow Block List (TABL): Ideal for creating temporary and safe exceptions. Based on your submission, Microsoft will analyze the exact part of the email deemed malicious (sender, domain, URL, file hash, spoof, or impersonation). TABL is the preferred choice for maintaining security: “Allows” eventually expire, and until they do, the system learns from your submissions to allow emails with similar elements. Both easy for you to manage, and useful for service filter adjustments. A win-win!
Note: spoof overrides do not expire. Learn more here: Allow or block email using the Tenant Allow/Block List
Exchange Mail Flow Rules (Exchange Transport Rules or ETRs): ETRs provide the most flexibility but come with increased risk. They should be used sparingly and thoughtfully. Safer ETR overrides use conditions for email authentication checks passing before allowing anything (see an example). The Analysis tab of the email entity page in Explorer will help you verify which ETR acted on a message, and the anti-spam message headers will include SFV:SKN if an ETR override is detected.
Figure 1: “Allowed by organization policy: Exchange transport rule” override source on the Email Entity page in Microsoft Defender XDR
Outlook Safe Senders (User Overrides): Users can mark their own trusted senders in Outlook, affecting only their individual mailbox. The screenshot below demonstrates the detailed information from the email entity page in Microsoft Defender XDR, and the anti-spam message headers will include SFV:SFE if a user override is detected.
Figure 2: “Allowed by user policy: Sender address list” override source on the Email Entity page in Microsoft Defender XDR
Certain user allows “win” over tenant configurations and provide the end-users the ability to manage their own exceptions, so make sure to review the “User and tenant settings conflict” section to learn what to expect at Order and precedence of email protection.
Tip: List all overrides for a user or all users in your organization using the PowerShell cmdlet. For full syntax and examples, see Get-MailboxJunkEmailConfiguration.
IP Allow List (Connection Filtering): This allows emails from specified IP addresses to bypass filters as part of connection filtering. One risk here is if an IP you believe is trusted becomes compromised, the entire email filtering stack except Secure by default is bypassed. Another risk is adding IP overrides for shared IP addresses or ranges. If bad actors use the same sender infrastructure for malicious purposes, you will allow bad messages along with good ones. In short: exercise caution, review regularly, keep IP allows to a minimum. The anti-spam message headers will include IPV:CAL if an IP override is detected, and the Explorer email entity page will look like this:
Figure 3: “Allowed by organization policy: Connection policy” override source on the Email Entity page in Microsoft Defender XDR
Anti-Phishing Policy Overrides: Aimed at combating domain, user and mailbox impersonation phishing threats, these overrides will target false positives with UIMP, DIMP, GIMP verdicts only. They are relatively safer as the rest of the protection scans take place, but it’s still a good idea to make sure from time to time any trusted senders and domains are still necessary, as they never expire.
Tip: You can also use Tenant Allow/Block List for impersonation overrides, just note that the allow entry isn’t created in the Tenant Allow/Block List. Instead, the domain or sender is added to the Trusted senders and domains section in the anti-phishing policy that detected the message and it does not expire.
Example
The company CEO, John Smith (johnsmith@contoso.com) is a prime target for impersonation attacks, so your SecOps team adds his address to trusted users to protect in the anti-phishing policy. However, the CEO sometimes sends email to his team from his personal account (johnsmith@outlook.com). After the service flags this correctly as user impersonation, you add the CEO’s personal address to trusted senders, for his emails to get through to recipient inboxes. (Of course, after you educate the CEO about the risks tied to this practice, you remove this entry.)
Figure 4: Add trusted senders part of the anti-phishing policy in Microsoft Defender XDR
Anti-Spam Policy Overrides: used to override spam, bulk, spoofing and low-confidence phishing verdicts (SPM, HSPM, PHISH, SPOOF and BULK), anti-spam policy senders and/or domains allows also override the anti-phishing stack, and they do not expire. Overly broad (domain) allows are particularly risky and known to be a leading cause for letting bad email into your inboxes. Best practice, review your policies periodically and trim/clear these lists. The Analysis tab of the email entity page in Explorer will help you verify if a policy that acted on a message, and the anti-spam message headers will include SFV:SKA if a policy override is detected.
Tip: You can also export an extended report (message trace) for the email in question. The AGENTINFO event in the resulting csv file contains the CustomData field with additional details, such as the GUID of the policy that acted on the message. For example:
S:PCFA=SUM|tact=5|di=SQ|tactcat=SPM|hctfp=191b78dc-9221-4a2c-b51c-208a186e931a;
SQ means the message was routed to Spam Quarantine, and hctfp stands for Hosted Content Filter Policy. Find the policy name by running the cmdlet Get-HostedContentFilteringPolicy in Exchange Online PowerShell.
While most of this article is about allow overrides, you can use Anti-Spam policies to block email, as well. For example, filter messages containing geographies and languages you would not expect to be working with. Learn how to configure spam filter policies.
Secure by Default
Microsoft 365 Secure by Default stance ensures that the system starts with the highest security settings. Notably, verdicts for malware (MALW) and high-confidence phishing (HPHISH) cannot be overridden by ETRs if the MX record points to Office 365. This policy is in place to protect users from the most severe threats automatically.
Why would I ever override Secure by Default?
There are specific instances where an override may be necessary. It is highly recommended to configure the Advanced delivery policy to handle these uses cases securely.
Phishing Simulations: To test their defenses, organizations might run controlled phishing simulations. To ensure these tests reach inboxes when they’re sent over email, overrides are essential.
SecOps Mailboxes: Security teams sometimes need to examine malicious emails for analysis and learning. Access to such emails requires an override to allow them through.
What if the MX record for my domain does not point to Exchange Online Protection?
Secure by default applies only when the MX record for your domain points to Microsoft 365 (contoso-com.mail.protection.outlook.com). If the MX record points to another service or device, it’s possible to override high-confidence phishing verdicts using an Exchange mail flow rule to bypass spam filtering (malware verdicts cannot be overridden). But although it’s technically possible, consider the benefits of defense-in-depth of your filtering solution paired with Microsoft Defender for Office 365. Use Enhanced Filtering for Connectors to skip the last known IP address(es) of your service, and to infer the email authentication information from the original sender IP. In addition, if your filtering solution supports ARC, configure to trust the ARC sealer in Microsoft Defender XDR settings. These configurations will allow you to keep the extra layer of Microsoft protection even when using third party protections.
Learn more about Getting started with defense in-depth configuration for email security, Secure by default in Office 365, Manage mail flow using a third-party cloud service with Exchange Online and Configure trusted ARC sealers.
Messages I send land in spam folders for external recipients. Can I override outbound spam filtering?
No. However, you can take steps to authenticate outbound email to improve deliverability.
Use overrides wisely
While overrides are useful tools, they must be implemented wisely. Incorrect usage can inadvertently open your company to threats. It’s essential to take the following precautions:
Only allow emails from verified and trustworthy sources. And even when you trust the source, consider that it may become compromised, and you would inadvertently allow unwanted phishing or spam.
Use Advanced Hunting in Microsoft Defender XDR to help you discover top overrides sources and remove the unnecessary ones.
Regularly review your overrides to ensure they remain relevant and secure.
Never put domains that you own onto the Allow and blocklists. If you own Contoso, do not add contoso.com to your allow lists.
Never put common domains, such as microsoft.com and office.com, onto the Allow and blocklists.
We hope that by understanding and applying email overrides correctly, you can ensure your organization’s email is both secure and functional, allowing the right messages to get through while keeping the bad ones out.
Do you have questions or feedback about Microsoft Defender for Office 365? Engage with the community and Microsoft experts in the Defender for Office 365 forum.
Click here to view additional posts in this series.
Important resources:
Allow or block email using the Tenant Allow/Block List
Order and precedence of email protection
Understanding overrides within the email entity page in Microsoft Defender for Office 365
Understanding detection technology within the email entity page in Microsoft Defender for Office 365
About Threat Explorer and Real-time detections in Microsoft Defender for Office 365
Getting started with defense in-depth configuration for email security
Review and remove unnecessary allow list entries with Advanced Hunting in Microsoft Defender for Office 365
Create safe sender lists
Create blocked sender lists
Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes
Secure by default in Office 365
Manage mail flow using a third-party cloud service with Exchange Online
Configure trusted ARC sealers
Configure spam filter policies
Configure anti-phishing policies in Microsoft Defender for Office 365
Get-MailboxJunkEmailConfiguration
Authenticate Outbound Email to Improve Deliverability
Microsoft Tech Community – Latest Blogs –Read More
Partner Case Study Series | Azure Rights Management enhances document control at the Navnit Group
Cloud 9 Infosystems digitally transforms businesses to reduce costs by leveraging the extensibility of the cloud
Cloud 9 Infosystems is a Microsoft gold partner and Tier 1 cloud solution provider for data analytics, cloud platform, application development, and application integration. The full-service firm headquartered in Downers Grove, Illinois, helps businesses harness the power of cloud computing to reduce their operational costs. In 2017, Microsoft named Cloud 9 Infosystems the US SMB Rising Star Mid West Partner of the Year.
The Navnit Group is a Mumbai, India-based network of businesses spanning the automotive, infrastructure, marine, adventure sports, aviation, and financial services sectors.
As part of its consulting services, Cloud 9 Infosystems offers a two-week engagement to integrate Office 365, Microsoft Entra ID, Azure Rights Management, and Azure Monitor Log Analytics in clients’ environments.
Continue reading here
**Explore all case studies or submit your own**
Microsoft Tech Community – Latest Blogs –Read More
Code runs well on Windows but gets errors on Apple Silicon Mac
paths;
algorithms = {‘RSA’};
dimension = 20; % (2, 10, 20)
maxFE = 1000; % 1000000
cec2022 = str2func(‘cec22_test_func’);
globalMins = {300, 400, 600, 800, 900, 1800, 2000, 2200, 2300, 2400, 2600, 2700};
experimentNumber = 1; run = 21;
filename = ‘result-‘;
functionsNumber = 12;
global count;
solution = zeros(experimentNumber, functionsNumber, run);
solutionR = zeros(functionsNumber * experimentNumber, run);
for ii = 1 : length(algorithms)
disp(algorithms(ii));
algorithm = str2func(char(algorithms(ii)));
for i = 1 : functionsNumber
disp(i);
for j = 1 : run
[~, bestFitness, ~] = algorithm(cec2022, dimension, maxFE, i);
disp(count);
count = 0;
solution(1, i, j) = bestFitness – globalMins{i};
for k = 1 : experimentNumber
solutionR(k + experimentNumber * (i – 1), j) = solution(k, i, j);
end
end
end
xlswrite(strcat(filename, func2str(algorithm), ‘-d=’, num2str(dimension), ‘.xlsx’), solutionR, 1);
eD = strcat(func2str(algorithm), ‘-Bitti :)’);
disp(eD);
end
I’ve tried this code with my friends Winodws Laptop. We both have just dowloaded Matlab so there is no configuration file for both sides. Error is:
Unrecognized function or variable ‘cec22_test_func’.
Error in testFunction (line 29)
fitness = feval(fhd, x, fNumber);
Error in RSA (line 25)
Ffun(1,i)=testFunction(X(i,:)’, fhd, fNumber);
Error in main (line 21)
[~, bestFitness, ~] = algorithm(cec2022, dimension, maxFE, i);
My friend runs this codes with no issue. I literally have no idea what’s happening…paths;
algorithms = {‘RSA’};
dimension = 20; % (2, 10, 20)
maxFE = 1000; % 1000000
cec2022 = str2func(‘cec22_test_func’);
globalMins = {300, 400, 600, 800, 900, 1800, 2000, 2200, 2300, 2400, 2600, 2700};
experimentNumber = 1; run = 21;
filename = ‘result-‘;
functionsNumber = 12;
global count;
solution = zeros(experimentNumber, functionsNumber, run);
solutionR = zeros(functionsNumber * experimentNumber, run);
for ii = 1 : length(algorithms)
disp(algorithms(ii));
algorithm = str2func(char(algorithms(ii)));
for i = 1 : functionsNumber
disp(i);
for j = 1 : run
[~, bestFitness, ~] = algorithm(cec2022, dimension, maxFE, i);
disp(count);
count = 0;
solution(1, i, j) = bestFitness – globalMins{i};
for k = 1 : experimentNumber
solutionR(k + experimentNumber * (i – 1), j) = solution(k, i, j);
end
end
end
xlswrite(strcat(filename, func2str(algorithm), ‘-d=’, num2str(dimension), ‘.xlsx’), solutionR, 1);
eD = strcat(func2str(algorithm), ‘-Bitti :)’);
disp(eD);
end
I’ve tried this code with my friends Winodws Laptop. We both have just dowloaded Matlab so there is no configuration file for both sides. Error is:
Unrecognized function or variable ‘cec22_test_func’.
Error in testFunction (line 29)
fitness = feval(fhd, x, fNumber);
Error in RSA (line 25)
Ffun(1,i)=testFunction(X(i,:)’, fhd, fNumber);
Error in main (line 21)
[~, bestFitness, ~] = algorithm(cec2022, dimension, maxFE, i);
My friend runs this codes with no issue. I literally have no idea what’s happening… paths;
algorithms = {‘RSA’};
dimension = 20; % (2, 10, 20)
maxFE = 1000; % 1000000
cec2022 = str2func(‘cec22_test_func’);
globalMins = {300, 400, 600, 800, 900, 1800, 2000, 2200, 2300, 2400, 2600, 2700};
experimentNumber = 1; run = 21;
filename = ‘result-‘;
functionsNumber = 12;
global count;
solution = zeros(experimentNumber, functionsNumber, run);
solutionR = zeros(functionsNumber * experimentNumber, run);
for ii = 1 : length(algorithms)
disp(algorithms(ii));
algorithm = str2func(char(algorithms(ii)));
for i = 1 : functionsNumber
disp(i);
for j = 1 : run
[~, bestFitness, ~] = algorithm(cec2022, dimension, maxFE, i);
disp(count);
count = 0;
solution(1, i, j) = bestFitness – globalMins{i};
for k = 1 : experimentNumber
solutionR(k + experimentNumber * (i – 1), j) = solution(k, i, j);
end
end
end
xlswrite(strcat(filename, func2str(algorithm), ‘-d=’, num2str(dimension), ‘.xlsx’), solutionR, 1);
eD = strcat(func2str(algorithm), ‘-Bitti :)’);
disp(eD);
end
I’ve tried this code with my friends Winodws Laptop. We both have just dowloaded Matlab so there is no configuration file for both sides. Error is:
Unrecognized function or variable ‘cec22_test_func’.
Error in testFunction (line 29)
fitness = feval(fhd, x, fNumber);
Error in RSA (line 25)
Ffun(1,i)=testFunction(X(i,:)’, fhd, fNumber);
Error in main (line 21)
[~, bestFitness, ~] = algorithm(cec2022, dimension, maxFE, i);
My friend runs this codes with no issue. I literally have no idea what’s happening… mac, error, apple, silicon, windows MATLAB Answers — New Questions
I am unable to find the minimum value of function f in this optimization problem. The solver always returns 0 for all variables which is not possible. I am unable to correct.
A=[ -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1];
lb=zeros(45,1);
ub=[];
b = [12080409 1298550 1347885 12093180 16779807 9015369 30515991 12545445 11203005 9049854 30442401 16253193 21471318 29855661 8079324 267300000 213840000 588060000];
f = [0.0969 0.1236 0.0485 0.0267 0.0776 0.1164 0.6012 0.24 0.3297 0.1419 0.4388 0.5319 0.8969 0.1503 0.2448 0.2691 0.2909 0.223 0.1769 0.2206 0.0703 0.7661 0.3952 0.5067 0.5745 0.5915 0.6642 1.0206 0.3055 0.4097 0.3079 0.2182 0.2352 0.2618 0.2982 0.3952 0.4024 0.3467 0.0399 0.2618 0.19880 0.1212 1.24 0.1673 0.3103];
x = linprog(f,A,b, [], [], lb, ub)A=[ -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1];
lb=zeros(45,1);
ub=[];
b = [12080409 1298550 1347885 12093180 16779807 9015369 30515991 12545445 11203005 9049854 30442401 16253193 21471318 29855661 8079324 267300000 213840000 588060000];
f = [0.0969 0.1236 0.0485 0.0267 0.0776 0.1164 0.6012 0.24 0.3297 0.1419 0.4388 0.5319 0.8969 0.1503 0.2448 0.2691 0.2909 0.223 0.1769 0.2206 0.0703 0.7661 0.3952 0.5067 0.5745 0.5915 0.6642 1.0206 0.3055 0.4097 0.3079 0.2182 0.2352 0.2618 0.2982 0.3952 0.4024 0.3467 0.0399 0.2618 0.19880 0.1212 1.24 0.1673 0.3103];
x = linprog(f,A,b, [], [], lb, ub) A=[ -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -1
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1];
lb=zeros(45,1);
ub=[];
b = [12080409 1298550 1347885 12093180 16779807 9015369 30515991 12545445 11203005 9049854 30442401 16253193 21471318 29855661 8079324 267300000 213840000 588060000];
f = [0.0969 0.1236 0.0485 0.0267 0.0776 0.1164 0.6012 0.24 0.3297 0.1419 0.4388 0.5319 0.8969 0.1503 0.2448 0.2691 0.2909 0.223 0.1769 0.2206 0.0703 0.7661 0.3952 0.5067 0.5745 0.5915 0.6642 1.0206 0.3055 0.4097 0.3079 0.2182 0.2352 0.2618 0.2982 0.3952 0.4024 0.3467 0.0399 0.2618 0.19880 0.1212 1.24 0.1673 0.3103];
x = linprog(f,A,b, [], [], lb, ub) optimization, matlab MATLAB Answers — New Questions
Fuzzy control problem:(1)input 2 expects a value in range [-1.5 1.5], but has a value of 4.36559e+24;
In ‘EV_Thermal_Management_wendukongzhi_zhileng/Controls/Compressor Control/ÿÿÿÿ/Fuzzy Logic
Controller’, input 2 expects a value in range [-1.5 1.5], but has a value of 4.36559e+24.
取消组合 1025 相似
显示堆栈跟踪
组件:Simulink | 类别:Model 警告
In ‘EV_Thermal_Management_wendukongzhi_zhileng/Controls/Compressor Control/ÿÿÿÿ/Fuzzy Logic
Controller’, no rules fired for Output 1. Defuzzified output value set to its mean range value 0.
取消组合 3075 相似In ‘EV_Thermal_Management_wendukongzhi_zhileng/Controls/Compressor Control/ÿÿÿÿ/Fuzzy Logic
Controller’, input 2 expects a value in range [-1.5 1.5], but has a value of 4.36559e+24.
取消组合 1025 相似
显示堆栈跟踪
组件:Simulink | 类别:Model 警告
In ‘EV_Thermal_Management_wendukongzhi_zhileng/Controls/Compressor Control/ÿÿÿÿ/Fuzzy Logic
Controller’, no rules fired for Output 1. Defuzzified output value set to its mean range value 0.
取消组合 3075 相似 In ‘EV_Thermal_Management_wendukongzhi_zhileng/Controls/Compressor Control/ÿÿÿÿ/Fuzzy Logic
Controller’, input 2 expects a value in range [-1.5 1.5], but has a value of 4.36559e+24.
取消组合 1025 相似
显示堆栈跟踪
组件:Simulink | 类别:Model 警告
In ‘EV_Thermal_Management_wendukongzhi_zhileng/Controls/Compressor Control/ÿÿÿÿ/Fuzzy Logic
Controller’, no rules fired for Output 1. Defuzzified output value set to its mean range value 0.
取消组合 3075 相似 fuzzy control, pid MATLAB Answers — New Questions
How to define the Bold style font weight in PowerPoint?
Hey, I have a rather simple but complex issue related with PowerPoint.
In the branding I’ve been handed, I need to use the Medium font weight for headings and strong characters, along with the Regular font weight for the body text. However, as it *should be* in PowerPoint, it chooses the Bold font weight that I have installed for any text selected with the Bold button/shortcut.
I wish to be able to define my Medium font as the preferred Bold shortcut. Not only it helps me be faster by pressing a single button, but because I have all these presentations and they are all desgigned with Regular and Medium font weights in Pitch.com. When I export them, they turn all my Medium weights to Bold.
I have tried uninstalling the Bold font (that from time to time I need to use indeed) and all weights that are not the Regular and Medium fonts, but PowerPoint still doesn’t read the Medium as the ‘bold’ to select. It turns all my ‘bold’ characters to a faux bold.
I have also tried to build a presentation from scratch in PowerPoint but the need to manually select the font-weight for multiple texts in multiple slides is exhausting.
Hey, I have a rather simple but complex issue related with PowerPoint.In the branding I’ve been handed, I need to use the Medium font weight for headings and strong characters, along with the Regular font weight for the body text. However, as it *should be* in PowerPoint, it chooses the Bold font weight that I have installed for any text selected with the Bold button/shortcut. I wish to be able to define my Medium font as the preferred Bold shortcut. Not only it helps me be faster by pressing a single button, but because I have all these presentations and they are all desgigned with Regular and Medium font weights in Pitch.com. When I export them, they turn all my Medium weights to Bold. I have tried uninstalling the Bold font (that from time to time I need to use indeed) and all weights that are not the Regular and Medium fonts, but PowerPoint still doesn’t read the Medium as the ‘bold’ to select. It turns all my ‘bold’ characters to a faux bold. I have also tried to build a presentation from scratch in PowerPoint but the need to manually select the font-weight for multiple texts in multiple slides is exhausting. Read More
Tech Talks Presents: AI Library Creator Kit Module & CoE Starter Kit | May 16th
Join us on Thursday, May 16th at 8am PT as Mehdi Slaoui Andaloussi, Principal Software Engineer Manager and Grant Archibald, Sr Program Manager present a two-part call: AI Library Creator Kit Module & CoE Starter Kit
AI Library Creator Ki Module:
The AI Library Creator Kit Module is an amazing collection of AI builder prompts and low-code plugins for Copilot Studio, Power Automate and Power Apps makers. The library serves as a resource for Power Platform developers looking to familiarize themselves with prompt engineering, featuring a variety of techniques such as zero shot, few-shot, and more.
CoE Starter Kit: From Reactive Data Collection to Proactive Agent and App Experiences
Discover how the impact of improving Power Platform reporting and inventory and usage collection is changing the direction of the CoE Kit. We’ll shift the conversation from collecting data to what the data means to the organization. Learn how to use the data to help move from default/shared environments. We’ll also explore how to make use of generative AI to build a business case for ideas and measure the impact with expected and actual ROI. Additionally, we’ll discuss personalized learning based on user skills and provide gamification while spotlighting people and solutions making an impact.Don’t miss this opportunity to learn about the roadmap and the next set of features for the CoE Starter Kit. Let’s pivot the discussion from reactive data collection to proactive agent and app experiences. See you there!
We hope you’ll join us!
Call to Action:
Click on the link to save the calendar invite: https://aka.ms/TechTalksInvite
View past recordings (sign in required): https://aka.ms/TechTalksRecording
Get started with the adoption tools here
What should I do if QuickBooks Web Connector fails to connect to my web service?
If QuickBooks Web Connector fails to connect to your web service, follow these steps to troubleshoot and resolve the issue:
Verify Web Service URL: Ensure that the URL specified in the Web Connector configuration is correct and accessible. The URL must be reachable from the machine running QuickBooks Web Connector.
Check Network Connectivity: Confirm that there are no network issues blocking the connection between QuickBooks Web Connector and your web service. Ensure that firewalls, proxies, or other network security settings are not impeding the connection.
Validate Web Service Availability: Ensure your web service is up and running. You can test the web service URL in a browser to check if it responds correctly.
Review QBWC Log Files: Check the QuickBooks Web Connector log files for any error messages that could provide insight into why the connection is failing. These logs can be found in the Web Connector application under “View Log.”
Check Certificate Validity: If your web service uses SSL, ensure that the SSL certificate is valid and correctly installed. Expired or improperly configured certificates can prevent the Web Connector from establishing a secure connection.
Confirm Correct Credentials: Ensure that the credentials (username and password) entered in the Web Connector are correct and match those required by your web service.
Update Web Connector: Make sure that you are using the latest version of QuickBooks Web Connector. Sometimes, simply updating to the newest version can resolve connectivity issues.
Configure Firewall and Security Software: Adjust your firewall and security software settings to allow QuickBooks Web Connector to communicate with the web service. You may need to create specific rules to permit this traffic.
Reinstall Web Connector: As a last resort, consider uninstalling and then reinstalling QuickBooks Web Connector. This can help resolve any underlying software corruption issues.
If these steps do not resolve the problem, contacting QuickBooks Support for further assistance is advisable. You can reach QuickBooks Support at +1-800-845-9666. Their support team can provide more detailed troubleshooting and, if necessary, remote assistance to help resolve the connection issues.
If QuickBooks Web Connector fails to connect to your web service, follow these steps to troubleshoot and resolve the issue:Verify Web Service URL: Ensure that the URL specified in the Web Connector configuration is correct and accessible. The URL must be reachable from the machine running QuickBooks Web Connector.Check Network Connectivity: Confirm that there are no network issues blocking the connection between QuickBooks Web Connector and your web service. Ensure that firewalls, proxies, or other network security settings are not impeding the connection.Validate Web Service Availability: Ensure your web service is up and running. You can test the web service URL in a browser to check if it responds correctly.Review QBWC Log Files: Check the QuickBooks Web Connector log files for any error messages that could provide insight into why the connection is failing. These logs can be found in the Web Connector application under “View Log.”Check Certificate Validity: If your web service uses SSL, ensure that the SSL certificate is valid and correctly installed. Expired or improperly configured certificates can prevent the Web Connector from establishing a secure connection.Confirm Correct Credentials: Ensure that the credentials (username and password) entered in the Web Connector are correct and match those required by your web service.Update Web Connector: Make sure that you are using the latest version of QuickBooks Web Connector. Sometimes, simply updating to the newest version can resolve connectivity issues.Configure Firewall and Security Software: Adjust your firewall and security software settings to allow QuickBooks Web Connector to communicate with the web service. You may need to create specific rules to permit this traffic.Reinstall Web Connector: As a last resort, consider uninstalling and then reinstalling QuickBooks Web Connector. This can help resolve any underlying software corruption issues.If these steps do not resolve the problem, contacting QuickBooks Support for further assistance is advisable. You can reach QuickBooks Support at +1-800-845-9666. Their support team can provide more detailed troubleshooting and, if necessary, remote assistance to help resolve the connection issues. Read More
French language collation not working on Synapse Serverless SQL
I’m struggling to get french characters(é, ç, à, ô, etc…) to show up properly in Synapse Serverless SQL. When I created my database, I used the “French_CI_AS” collation. Below is a screenshot of what it looks like on my end.
What can I do to fix this?
I’m struggling to get french characters(é, ç, à, ô, etc…) to show up properly in Synapse Serverless SQL. When I created my database, I used the “French_CI_AS” collation. Below is a screenshot of what it looks like on my end. What can I do to fix this? Read More
Text will not copy from other programs to word
I have recently encountered a problem with copying and pasting to and from Word. Copying text into Word:Text from other programs (including Firefox, Chrome, TextEdit, Notes, and Excel) will not paste into Microsoft Word. Instead, what pastes when I hit Command+v (or right click and select “Paste”) is the last text that I copied from a Microsoft Word document. Interestingly, pasting without formatting works as expected. Copying from Word into other programs:At some point, I copied the following text in a Microsoft Word document: The recent review of Edwards et al., (DOI: …) Now, whenever I try to copy (some other) text from Microsoft Word and paste it into Google Docs or Google Sheets, what pastes is the above text. If I attempt to paste the text into the body of an email in Gmail, the above text (“The recent review…”) is what appears. Interestingly, if I paste the text into the To: or Subject: lines of the email, pasting works as expected. I can also paste into the url bar in browsers without issue. Again, pasting without formatting is working as expected. Text from other programs (TextEdit, Notes) copies and pastes into Google products as expected. This issue began for me about a week ago. Any advice would be helpful. Edit: I am running Mac OS 13.6.6. My computer has an Intel chip. This issue is present in Google Products on both Firefox 125.0.3 and Chrome 124.0.6367.119. My current Microsoft Word is 16.78.3. Read More
How to modify script to export results to CSV:
How to modify script to export results to CSV:
Get-Mailbox | Where {$null -ne $_.ForwardingSmtpAddress} | FT UserPrincipalName,ForwardingSmtpAddress,DeliverToMailboxAndForward
How to modify script to export results to CSV: Get-Mailbox | Where {$null -ne $_.ForwardingSmtpAddress} | FT UserPrincipalName,ForwardingSmtpAddress,DeliverToMailboxAndForward Read More
Private Channels populated by a security group in Teams
Hey all,
I am working on a project that involves moving out a large amount of semi-official collaboration spaces to a centralized official area.
I have about 30 groups that need a centralized place to collaborate but also have their own private spaces not accessible to other groups. Additionally, the group makeup changes often throughout the year.
I built a sharepoint site that has a Microsoft Team. The Microsoft Team has a public general channel accessible to anyone in my org, while there are several private channels, the idea is that each group has their own private channel but can collaborate in the general channel, add their events to the calendar in the general channel, etc.
I created security groups for every single group and I have segmented out the sharepoint site according to the security groups. However, I have hit a roadblock with the private channel permissions.
I seem unable to add a security group to allow access to a private channel in teams and this is a huge deal breaker.
I need some way to dynamically populate a private channel, it is borderline unfeasible for someone to manage the 30 groups manually in teams throughout the year as each group changes nearly constantly.
Is there anyway that I can make this work? I can add security groups for the team itself, but not private channels.
Hey all,I am working on a project that involves moving out a large amount of semi-official collaboration spaces to a centralized official area. I have about 30 groups that need a centralized place to collaborate but also have their own private spaces not accessible to other groups. Additionally, the group makeup changes often throughout the year.I built a sharepoint site that has a Microsoft Team. The Microsoft Team has a public general channel accessible to anyone in my org, while there are several private channels, the idea is that each group has their own private channel but can collaborate in the general channel, add their events to the calendar in the general channel, etc.I created security groups for every single group and I have segmented out the sharepoint site according to the security groups. However, I have hit a roadblock with the private channel permissions.I seem unable to add a security group to allow access to a private channel in teams and this is a huge deal breaker. I need some way to dynamically populate a private channel, it is borderline unfeasible for someone to manage the 30 groups manually in teams throughout the year as each group changes nearly constantly.Is there anyway that I can make this work? I can add security groups for the team itself, but not private channels. Read More