Category: News
Fight fraud across the full identity lifecycle with Transmit Security and Microsoft
In this guest blog post, Ravit Aviv, Director of Technology Alliances at Transmit Security, offers ways businesses can launch a formidable defense against AI-based cyber activity and threat actors and build long-term digital resilience with the help of Transmit Security and Microsoft.
The 2023 Digital Defense Report reveals that Microsoft detected and blocked over 3 million identity attacks and account takeover (ATO) attempts every day. The report also found:
The volume of password attacks increased more than tenfold in 2023, rising from 3 billion per month to over 30 billion, averaging 4,000 password attacks per second.
Cybercriminals rely heavily on one-time passcode (OTP) bots that mimic human behavior.
Every day they saw roughly 6,000 MFA (multifactor authentication) fatigue aka MFA bombing attempts, in which fraudsters try to trick victims into accidentally approving sign-in requests by sending them MFA or passwordless prompts.
The number of token replay attacks has doubled in comparison to the previous year, with an average of 11 detections per 100,000 active users.
This scenario highlights the critical need for businesses to implement a layered defense with more than just strong MFA methods, passkeys and passwordless authentication. These elements are essential (in a variety of forms). But when someone logs in with the correct username, password and OTP, you need to be able to examine their behavior, devices, and other telemetry in real time to determine if it’s truly your customer, a bad actor, or a bot.
Why you need more than strong authentication
In addition to logging in with stolen credentials, fraudsters are able to bypass the login entirely. They’ve long proven capable of infiltrating active user sessions via cookie hijacking, for example. And now with generative AI (GenAI), they’re innovating more advanced tactics faster than ever.
Whether fraudsters simply buy credentials to take over accounts or employ advanced tools like human-imitating bots and GenAI, businesses now require more sophisticated, state-of-the art defenses that are seamlessly integrated. Anything less won’t keep pace with the evolving tactics and will leave significant gaps in security.
As we’re faced with bots that can perform actions such as simulating clicking and mousing patterns, it’s difficult to distinguish between legitimate users and malicious bots. Even advanced prevention tactics like behavioral analytics can be fooled. Ultimately these OTP bots perform ATO fraud by tricking users into providing authentication codes sent via SMS, authentication apps, or email.
Cybercriminals can also bypass MFA by obtaining OTPs through clever social engineering tactics and the use of deepfakes, so easily made with GenAI tools. With a few prompts, GenAI can devise new ways to circumvent established security controls, which allows fraudsters to stay ahead of pre-established rules and fraud detection methods.
Phishing techniques have also become increasingly sophisticated, deceiving even experienced users. With GenAI image creation and translation tools, attackers can create highly convincing fake websites and emails to trick users into sharing their credentials, and traditional email filters are often not enough.
What can be done to prevent attacks beyond the login?
All of these attacks, coupled with MFA fatigue, highlight the limitations of relying solely on MFA and the growing need for more adaptive, AI-driven security measures.
In a blog post titled “Defend against cyber threats with AI solutions from Microsoft,” Tom Burt, Microsoft Corporate VP of Customer Security and Trust, explains, “Artificial Intelligence will be a critical component of successful defense. In the coming years, innovation in AI-powered cyber defense will help reverse the current rising tide of cyberattacks.”
AI-driven fraud detection that’s unified in one solution can leverage context-aware intelligence to spot the most subtle anomalies and correlate that data with other risk and trust signals throughout the customer’s identity journey. Smarter protection is essential to accurately discern if it’s fraud or simply a change in the customer’s typical behavior.
Mitigating fraud in real time requires the ability to unify risk signals into actionable recommendations that can be used to drive automated decisions on how to handle individual requests with identity-security mechanisms to challenge or block suspicious activity immediately.
Transmit Security in Azure Marketplace delivers on the above
Transmit Security is ahead of the curve, leveraging the power of AI and machine learning (ML) to improve identity security and fraud prevention, delivering the speed, agility, and responsiveness to stop today’s advanced threats in real time.
Customers can now build on Microsoft Azure Active Directory B2C by adding Transmit Security Detection and Response.
Access to Transmit Security through the Azure Marketplace improves cost-efficiency by providing leading-edge fraud prevention and identity security using your committed cloud budgets, which streamlines procurement, accelerates time to market, and simplifies vendor management and billing.
How Transmit Security and Azure AD B2C fortify fraud prevention
Transmit Security Detection and Response is designed to tackle the sophisticated threats modern fraudsters deploy, addressing both detection and response seamlessly within a unified, AI-driven solution that leverages context-aware intelligence to assess risk and trust throughout the full customer identity lifecycle.
Seamlessly integrated into Microsoft Azure AD B2C, Transmit Security’s fraud prevention service detects highly deceptive ATO fraud and removes friction from the trusted customer’s path in real time. End-to-end fraud protection throughout the identity lifecycle includes:
Multi-method detection: A state-of-the-art risk engine examines hundreds of telemetry streams to ensure the most accurate results — based on advanced behavioral biometrics, device fingerprinting, bot detection, application and network evaluation, authentication analysis, transaction signing, and other detections, which passively run in the background at all times.
Risk telemetry consolidation with ML and AI: Detection and Response services continually analyze the full context of all that’s happening by collecting and correlating telemetry across the identity lifecycle. ML and AI evaluate data in light of known or suspected fraud patterns, bot behavior and the customer’s typical behavior, devices, and IP addresses as well as the use case and application flows. All anomalies, even subtle deviations, are weighed as part of a holistic, contextual analysis.
Real-time response and feedback loops: ML and AI automatically detect zero-day threats by analyzing a broader range of signals, greatly improving the ability to identify new attack patterns. In parallel, Transmit Security case conclusions and threat researchers continually improve AI models based on cumulative insights and post-detection analytics.
Transparent explanations: Unlike other solutions, which may generate black boxes of complex, unreadable data, Transmit Security offers full transparency with detailed fraud telemetry, allowing users to see the complete basis for each recommendation. With a single, robust service, there’s no need to cross-correlate data from multi-vendor solutions and standardize risk scores.
Proactive phishing protection: Phishing origin detection spots anomalies by analyzing the URL and looking for those subtle variations, like misspellings or hyphens. Detection and Response also uses IP reputation services, behavioral biometrics, and device fingerprinting to determine instantly if the domain is a spoof.
Built-in AI-powered security: Embedded anomaly detection, mobile app and API security, anti-tampering measures, and trend analyses shield the identity infrastructure against attack.
Automated workflows: This streamlines case management, time-intensive and cross-functional tasks to expedite risk response and resolution. Transmit Security also improves data analytics with GenAI and automatically creates new rules based on case conclusions, labeling, threat intelligence, and machine learning.
Resilience and scale: Enterprise-class architecture is built to scale and ensure uptime for hundreds of millions of customers. With active-active multi-cloud global presence, Transmit Security services run simultaneously in multiple CSPs (cloud service providers) to meet the business continuity demands of the world’s most popular brands.
The end result: better outcomes. Detection and Response services evaluate each user action in real time, providing clear recommendations — trust, allow, challenge, or deny — based on comprehensive data analysis. Transmit Security delivers highly accurate risk scores, reducing false positives and false negatives by 90 percent when tested against other solutions.
Accuracy means you can confidently automate fraud protection, invoking step-ups to mitigate risk and remove friction for trusted customers. You’ll dramatically reduce fraud while improving customer engagement and boosting revenue.
Strengthen authentication with phishing-resistant credentials
Organizations can also fortify Microsoft Azure Active Directory B2C with Transmit Security passwordless MFA or passkeys with an added security layer, available in the Azure Marketplace. By authenticating customers based on their true identities, using a fingerprint or facial biometric, you’ll improve security and the customer experience.
Read our other blog in the Microsoft Tech Community to explore how to replace passwords with phishing-resistant credentials. Or view the step-by-step guide on how to configure Transmit Security passwordless MFA with Azure AD B2C. It’s easy to set up secure and smooth password-free experiences across all channels and devices.
The advantages of a combined solution
The integration of Transmit Security and Azure AD B2C offers a comprehensive, adaptable, and effective solution for combating fraud throughout the entire customer identity lifecycle, ensuring businesses can stay ahead of evolving threats.
“Microsoft is thrilled to have Transmit Security as a Solutions Partner for Security,” said Yvonne Muench, Senior Director - Marketplace & ISV Journey at Microsoft. “Transmit Security is committed to helping Microsoft customers leverage the benefits of passwordless authentication via Microsoft Azure Active Directory B2C. Having an experienced and trusted security partner like Transmit Security building on and augmenting native Azure capabilities really helps support and drive the vision of a passwordless future.”
This collaboration fosters a trusted environment for customers and paves the way for a more secure digital future. If you want to leverage the benefits of this unparalleled partnership for fraud prevention, check out the detailed integration guide and learn how easy it is to add a multi-method, holistic detection and response solution to your application. You can also reach out to our experts to request a demo.
Microsoft Tech Community – Latest Blogs –Read More
Learn about Tollring’s Microsoft 365 partner solution in Microsoft AppSource
Microsoft partners like Tollring deliver transact-capable offers, which allow you to purchase directly from AppSource. Learn about this offer below:
Analytics 365 Call Analytics: Tollring’s Analytics 365 for Microsoft Teams Phone helps organizations of all sizes manage communications throughout their call center and customer-facing teams. Get the insight needed to monitor call activity, staffing levels, and performance with Analytics 365. You’ll be able to filter calls, select dashboard views, and create wallboards to keep everyone informed.
Microsoft Tech Community – Latest Blogs –Read More
Correlation of 2D matrix and 3D Matrix
Hi,
I have a 3D matrix/array A and a 2D matrix/array B. I want to correlate index B(i,j) to A(i,j,k) where the element (1,1) of B is equal to element (1,1,k) of A. How do I do this?Hi,
I have a 3D matrix/array A and a 2D matrix/array B. I want to correlate index B(i,j) to A(i,j,k) where the element (1,1) of B is equal to element (1,1,k) of A. How do I do this? Hi,
I have a 3D matrix/array A and a 2D matrix/array B. I want to correlate index B(i,j) to A(i,j,k) where the element (1,1) of B is equal to element (1,1,k) of A. How do I do this? 3d array, matrix indexing MATLAB Answers — New Questions
Unable to find transfer functon using model linearizer
Hello,
I tried to find the transfer function of a system, using the Model Linearizer, by setting the input pertuberation and Output Measurement Points.
After running the model linearizer for a sinestream frequency of 10 to 10000. Using the tfest function the transfer function is estimated.
The obtained transfer function, is wrong and it highly inaccurate.
Any help would be appreciated.
Thank YouHello,
I tried to find the transfer function of a system, using the Model Linearizer, by setting the input pertuberation and Output Measurement Points.
After running the model linearizer for a sinestream frequency of 10 to 10000. Using the tfest function the transfer function is estimated.
The obtained transfer function, is wrong and it highly inaccurate.
Any help would be appreciated.
Thank You Hello,
I tried to find the transfer function of a system, using the Model Linearizer, by setting the input pertuberation and Output Measurement Points.
After running the model linearizer for a sinestream frequency of 10 to 10000. Using the tfest function the transfer function is estimated.
The obtained transfer function, is wrong and it highly inaccurate.
Any help would be appreciated.
Thank You power_electronics_control MATLAB Answers — New Questions
change the color of curve from blue to any color and make it bold
Post Content Post Content matlab MATLAB Answers — New Questions
Trainable Classifiers
Hello,
I am testing out trainable classifiers and need to know how to investigate training failures in detail?
Some errors are vague such as “Failed due to training error” or “Invalidlocationserror” and clicking on review test results does not show details.
Where is log stored? How can we review errors further? Any help is appreciated.
Hello,I am testing out trainable classifiers and need to know how to investigate training failures in detail?Some errors are vague such as “Failed due to training error” or “Invalidlocationserror” and clicking on review test results does not show details. Where is log stored? How can we review errors further? Any help is appreciated. Read More
How can I batch convert PNG to JPG on Windows 11 computer
I am looking for help to batch convert PNG images to JPG format on my Windows 11 computer. I need to convert a large number of PNG files to JPG to make it easier to share and upload to various platforms that do not support PNG or require the JPG format. I’ve explored various online tools, but many of them are either riddled with advertisements, impose file size limits, or don’t support batch conversion. I would appreciate any recommendations for software or methods that can help me efficiently convert PNG images to JPG while maintaining their quality.
I am looking for help to batch convert PNG images to JPG format on my Windows 11 computer. I need to convert a large number of PNG files to JPG to make it easier to share and upload to various platforms that do not support PNG or require the JPG format. I’ve explored various online tools, but many of them are either riddled with advertisements, impose file size limits, or don’t support batch conversion. I would appreciate any recommendations for software or methods that can help me efficiently convert PNG images to JPG while maintaining their quality. Read More
Vlookup to return the value at the same lookup value row
Vlookup returns the first value it matches.
Is there a way for it to return the value on the same row as the lookup value?
Example below
LookUp N23
Column AT Row 20 value is 1.61
Column AT Row 23 value is 1.08
How do I return the value of 1.08 which is in Row 23?
Vlookup returns the first value it matches.Is there a way for it to return the value on the same row as the lookup value?Example belowLookUp N23Column AT Row 20 value is 1.61Column AT Row 23 value is 1.08How do I return the value of 1.08 which is in Row 23? Read More
New Outlook Dictionary – how to remove an added word
Hello, I am using the new Outlook and accidentally added an ill written word into the dictionary. How do I access the dictionary in the new outlook and how does one remove words?
Hello, I am using the new Outlook and accidentally added an ill written word into the dictionary. How do I access the dictionary in the new outlook and how does one remove words? Read More
Importing Sketchup Files into a Word Document
I like to use Sketchup 2021 to generate graphics for my Microsoft 365 Word documents. I have previously done this using the Insert > 3D Models > This Device option, and it has worked fine. Now, instead of the image, I am getting the box below.
Anyone know what I can do to correct this?
I like to use Sketchup 2021 to generate graphics for my Microsoft 365 Word documents. I have previously done this using the Insert > 3D Models > This Device option, and it has worked fine. Now, instead of the image, I am getting the box below. Anyone know what I can do to correct this? Read More
How to fetch Soft Deleted mailboxes with are NOT Inactive?
I’m trying to connect Soft Deleted mailboxes using EWS Managed API and observed following behaviour when deleted:
Has M365 retention policy applied pre deletion -> Removed M365 user account -> Mailbox soft deleted and converted to inactive mailbox.Has no M365 retention policy applied pre deletion -> Removed M365 user account -> Mailbox soft deleted but doesn’t get converted to inactive mailbox.
As per my understanding, mailbox data is retained for 30 days after the account is removed irrespective of the fact that if it is an inactive mailbox or not. I’m able to fetch root folder for Inactive soft deleted mailbox using ExchangeService instance, but for soft deleted mailbox which is NOT inactive, I’m getting error ‘ErrorNonExistentMailbox: The SMTP address has no mailbox associated with it‘.
How can we fetch soft deleted mailbox root which is NOT inactive? In other words how can we fetch soft deleted mailbox which didn’t had any retention policy applied?
Additionally observed that PowerShell ‘Get-Mailbox’ property RecipientSoftDeletedStatus has value ‘1’ for mailbox where IsInactivemailbox is False and ‘9’ where IsInactivemailbox is True. What does RecipientSoftDeletedStatus values indicate?
I’m trying to connect Soft Deleted mailboxes using EWS Managed API and observed following behaviour when deleted:Has M365 retention policy applied pre deletion -> Removed M365 user account -> Mailbox soft deleted and converted to inactive mailbox.Has no M365 retention policy applied pre deletion -> Removed M365 user account -> Mailbox soft deleted but doesn’t get converted to inactive mailbox.As per my understanding, mailbox data is retained for 30 days after the account is removed irrespective of the fact that if it is an inactive mailbox or not. I’m able to fetch root folder for Inactive soft deleted mailbox using ExchangeService instance, but for soft deleted mailbox which is NOT inactive, I’m getting error ‘ErrorNonExistentMailbox: The SMTP address has no mailbox associated with it’. How can we fetch soft deleted mailbox root which is NOT inactive? In other words how can we fetch soft deleted mailbox which didn’t had any retention policy applied? Additionally observed that PowerShell ‘Get-Mailbox’ property RecipientSoftDeletedStatus has value ‘1’ for mailbox where IsInactivemailbox is False and ‘9’ where IsInactivemailbox is True. What does RecipientSoftDeletedStatus values indicate? Read More
New Outlook for Windows not adding automatic sensitivity labels
Good day.
We have recently started testing for implementation automatic sensitivity labels from Purview.
The sensitivity label should be added automatically dependent on certain sensitive information types being found in a file or email.
All the desktop apps for M365 works with the labels automatically being added where required. Only the new version of Outlook does not auto-label.
We tested auto-labelling in Outlook Classic, Outlook Web App, and new Outlook on Windows.
In the classic and web apps the sensitivity label is added and the user is presented with a tooltip stating that the label is added.
In new Outlook nothing happens. We don’t even get a tooltip to state that we should add a sensitivity label. Just nothing.
Tested from different users on different workstations. All are experiencing the same behaviour.
Is there anything we need to change either on the Purview side, the Office Config portal, or on the workstation to make it work as it should?
Good day.We have recently started testing for implementation automatic sensitivity labels from Purview.The sensitivity label should be added automatically dependent on certain sensitive information types being found in a file or email. All the desktop apps for M365 works with the labels automatically being added where required. Only the new version of Outlook does not auto-label. We tested auto-labelling in Outlook Classic, Outlook Web App, and new Outlook on Windows.In the classic and web apps the sensitivity label is added and the user is presented with a tooltip stating that the label is added.In new Outlook nothing happens. We don’t even get a tooltip to state that we should add a sensitivity label. Just nothing. Tested from different users on different workstations. All are experiencing the same behaviour. Is there anything we need to change either on the Purview side, the Office Config portal, or on the workstation to make it work as it should? Read More
Why I can’t plot x = years , y = GDP
Post Content Post Content plot MATLAB Answers — New Questions
How to find respective features from Principal Components
Hello Everyone!
I have a feature matrix of 4378*54. After doing PCA, I get a reduced feature matrix of 4378*29. I have used a threshold variance of 95%.
In summary, 29 principal components explain 95% of variance in my feature matrix.
How can I find the respective features in my feature matrix from the 29 principal components? Ofcourse, these 29 principal components correspond to 29 features in my feature matrix which have 54 features. How can I find those features?
I am using PCA function which gives me coeff, scores, latent and explained.
Secondly, do I have to use same PCA for both training and testing dataset? I have read in an article that I have to store the selected coeff (95% variance) from training dataset and multiply this with my testing dataset which will yield a reduced feature matrix. I have tried it and it works. But how it works, I dont understand.
Your comments will be highly appreciated.Hello Everyone!
I have a feature matrix of 4378*54. After doing PCA, I get a reduced feature matrix of 4378*29. I have used a threshold variance of 95%.
In summary, 29 principal components explain 95% of variance in my feature matrix.
How can I find the respective features in my feature matrix from the 29 principal components? Ofcourse, these 29 principal components correspond to 29 features in my feature matrix which have 54 features. How can I find those features?
I am using PCA function which gives me coeff, scores, latent and explained.
Secondly, do I have to use same PCA for both training and testing dataset? I have read in an article that I have to store the selected coeff (95% variance) from training dataset and multiply this with my testing dataset which will yield a reduced feature matrix. I have tried it and it works. But how it works, I dont understand.
Your comments will be highly appreciated. Hello Everyone!
I have a feature matrix of 4378*54. After doing PCA, I get a reduced feature matrix of 4378*29. I have used a threshold variance of 95%.
In summary, 29 principal components explain 95% of variance in my feature matrix.
How can I find the respective features in my feature matrix from the 29 principal components? Ofcourse, these 29 principal components correspond to 29 features in my feature matrix which have 54 features. How can I find those features?
I am using PCA function which gives me coeff, scores, latent and explained.
Secondly, do I have to use same PCA for both training and testing dataset? I have read in an article that I have to store the selected coeff (95% variance) from training dataset and multiply this with my testing dataset which will yield a reduced feature matrix. I have tried it and it works. But how it works, I dont understand.
Your comments will be highly appreciated. pca, features, machine learning MATLAB Answers — New Questions
De-embed S parameters for 3 Fixtures/ Pads
Hello everyone,
I am a student and have the following problem:
I would like to use the function “deembedsparams” to de-embed my DUT. Unfortunately, i am not using two fixtures or pads as intended for this function, but three. I would therefore have to de-embed all three. Can someone tell me to what extent I can use the function for my problem and what I have to consider. maybe there is a workaround solution like de-embedding each pad iteratively?
I hope someone can help me with my problem.
Many thanks in advance
PatrickHello everyone,
I am a student and have the following problem:
I would like to use the function “deembedsparams” to de-embed my DUT. Unfortunately, i am not using two fixtures or pads as intended for this function, but three. I would therefore have to de-embed all three. Can someone tell me to what extent I can use the function for my problem and what I have to consider. maybe there is a workaround solution like de-embedding each pad iteratively?
I hope someone can help me with my problem.
Many thanks in advance
Patrick Hello everyone,
I am a student and have the following problem:
I would like to use the function “deembedsparams” to de-embed my DUT. Unfortunately, i am not using two fixtures or pads as intended for this function, but three. I would therefore have to de-embed all three. Can someone tell me to what extent I can use the function for my problem and what I have to consider. maybe there is a workaround solution like de-embedding each pad iteratively?
I hope someone can help me with my problem.
Many thanks in advance
Patrick s-parameter, deembedding, deembedsparams function, sparams MATLAB Answers — New Questions
Cannot echo Topics from Simulink in ROS on WSL2
I’m troubling in connecting Simulink and Unreal Engine through ROS on WSL2.
I want to send some messages from Simulink to UE (ROS Integration) using ROS Topics, but the topics from Simulink cannot be subscribed. (Actually the topic itself is subscribed, but no message is coming.)
My environment is as follows:
MATLAB R2024a + ROS Toolbox
Unreal Engine 5.1.1 (+ ROS Integration)
Ubuntu 20.04 on WSL2
ROS Noetic
I have confirmed the ROS communications below:
Simulink to the same Simulink: succes
Simulink to the other Simulink on the same computer: partly success (✔A→B, while ✘B→A. I suspected that the same port cannot be used for both publishing and subscribing, but alternating their roles did not work.)
Simulink to ROS: failed (The topics can be found by rostopic list, but I couldn’t rostopic echo.)
Simulink to UE: failed
UE to ROS: success (only String messages)
UE to Simulink: success (only String messages)
Regarding to the rostopic list, the rosnode info /SimulinkSystem_xxxxx (the node created by Simulink) response says that the connection to the node is failed.
I searched for the similar issues on internet and it may be caused by that the hostname cannot be resolved by ROS.
I have tried to set the environment variables so that they are not "localhost" nor "127.0.0.1", but it did not work. (When doing it, I could not connect to the ROS master.)
Could anyone figure out what is the true problem(s), and how to solve it?
Thank youI’m troubling in connecting Simulink and Unreal Engine through ROS on WSL2.
I want to send some messages from Simulink to UE (ROS Integration) using ROS Topics, but the topics from Simulink cannot be subscribed. (Actually the topic itself is subscribed, but no message is coming.)
My environment is as follows:
MATLAB R2024a + ROS Toolbox
Unreal Engine 5.1.1 (+ ROS Integration)
Ubuntu 20.04 on WSL2
ROS Noetic
I have confirmed the ROS communications below:
Simulink to the same Simulink: succes
Simulink to the other Simulink on the same computer: partly success (✔A→B, while ✘B→A. I suspected that the same port cannot be used for both publishing and subscribing, but alternating their roles did not work.)
Simulink to ROS: failed (The topics can be found by rostopic list, but I couldn’t rostopic echo.)
Simulink to UE: failed
UE to ROS: success (only String messages)
UE to Simulink: success (only String messages)
Regarding to the rostopic list, the rosnode info /SimulinkSystem_xxxxx (the node created by Simulink) response says that the connection to the node is failed.
I searched for the similar issues on internet and it may be caused by that the hostname cannot be resolved by ROS.
I have tried to set the environment variables so that they are not "localhost" nor "127.0.0.1", but it did not work. (When doing it, I could not connect to the ROS master.)
Could anyone figure out what is the true problem(s), and how to solve it?
Thank you I’m troubling in connecting Simulink and Unreal Engine through ROS on WSL2.
I want to send some messages from Simulink to UE (ROS Integration) using ROS Topics, but the topics from Simulink cannot be subscribed. (Actually the topic itself is subscribed, but no message is coming.)
My environment is as follows:
MATLAB R2024a + ROS Toolbox
Unreal Engine 5.1.1 (+ ROS Integration)
Ubuntu 20.04 on WSL2
ROS Noetic
I have confirmed the ROS communications below:
Simulink to the same Simulink: succes
Simulink to the other Simulink on the same computer: partly success (✔A→B, while ✘B→A. I suspected that the same port cannot be used for both publishing and subscribing, but alternating their roles did not work.)
Simulink to ROS: failed (The topics can be found by rostopic list, but I couldn’t rostopic echo.)
Simulink to UE: failed
UE to ROS: success (only String messages)
UE to Simulink: success (only String messages)
Regarding to the rostopic list, the rosnode info /SimulinkSystem_xxxxx (the node created by Simulink) response says that the connection to the node is failed.
I searched for the similar issues on internet and it may be caused by that the hostname cannot be resolved by ROS.
I have tried to set the environment variables so that they are not "localhost" nor "127.0.0.1", but it did not work. (When doing it, I could not connect to the ROS master.)
Could anyone figure out what is the true problem(s), and how to solve it?
Thank you matlab, simulink, ros, wsl2, noetic MATLAB Answers — New Questions
I need a safe & best MP4 to MP3 converter for Windows 11, Any suggestions?
I need some recommendations for a safe and best MP4 to MP3 converter for Windows 11. For my current project, I have a lot of MP4 videos that need to be converted to MP3 format. I have tried several online MP4 to MP3 tools, but they are full of ads, have poor audio quality or seem to be a security risk. For my work, ease of use and maintaining high audio quality during the conversion process is crucial, as well as wanting to be able to convert multiple MP4s to mp3 at once, as I don’t want to convert them one by one!
Thank you very much for your help!
I need some recommendations for a safe and best MP4 to MP3 converter for Windows 11. For my current project, I have a lot of MP4 videos that need to be converted to MP3 format. I have tried several online MP4 to MP3 tools, but they are full of ads, have poor audio quality or seem to be a security risk. For my work, ease of use and maintaining high audio quality during the conversion process is crucial, as well as wanting to be able to convert multiple MP4s to mp3 at once, as I don’t want to convert them one by one! Thank you very much for your help! Read More
Certification and Learning Hub
Hey,
Does Microsoft offer a Learning Hub and certification programs with free vouchers for their partners, similar to Google’s offerings? If so, could someone share the relevant links for more information?”
Cheers!
Hey,Does Microsoft offer a Learning Hub and certification programs with free vouchers for their partners, similar to Google’s offerings? If so, could someone share the relevant links for more information?” Cheers! Read More
Co-Pilot pro (Work) suggested an online document from company’s own SharePoint
Hi I have a quick question (hopefully) about Co-Pilot pro for business.
One of my users was using the chat functionality in WEB to ask it some basic questions about excel functionality.
The response that came back, at the end of the prompt, seemingly found, and suggested a document created by user’s in our tennant and hosted in SharePoint, it was able to understand the authors names too.
This is a really cool feature, but my question is more around how or if, Co-Pilot is able to understand who has permissions to the document that it’s suggesting. For example, could an unsuspecting user bump into a prompt reply suggesting a document that they should not have access to, or is it smart enough to only suggest a document should the user, using co-pilot have access to it?
Can anyone comment on this?
Hi I have a quick question (hopefully) about Co-Pilot pro for business. One of my users was using the chat functionality in WEB to ask it some basic questions about excel functionality. The response that came back, at the end of the prompt, seemingly found, and suggested a document created by user’s in our tennant and hosted in SharePoint, it was able to understand the authors names too. This is a really cool feature, but my question is more around how or if, Co-Pilot is able to understand who has permissions to the document that it’s suggesting. For example, could an unsuspecting user bump into a prompt reply suggesting a document that they should not have access to, or is it smart enough to only suggest a document should the user, using co-pilot have access to it?Can anyone comment on this? Read More
Calculating difference between dates and times
Trying to calculate the difference between planned finish date/time and actual finish date/time.
When the difference is positive the answer is returned in the correct format (line 3) but when negative the answer is to large to show (lines 1 & 2).
Planned Finish TimeActual Finish TimeDiff(10) 7:59 AM(10) 9:00 AM############(10) 9:30 AM(12) 8:30 AM############(12) 10:34 AM(12) 7:00 AM(00) 3:34 AM
How is the fixed to show the negative difference’s in the correct format?
Trying to calculate the difference between planned finish date/time and actual finish date/time. When the difference is positive the answer is returned in the correct format (line 3) but when negative the answer is to large to show (lines 1 & 2). Planned Finish TimeActual Finish TimeDiff(10) 7:59 AM(10) 9:00 AM############(10) 9:30 AM(12) 8:30 AM############(12) 10:34 AM(12) 7:00 AM(00) 3:34 AM How is the fixed to show the negative difference’s in the correct format? Read More