Category: News
FAQ: VM Offer for confidential computing
Q: We are in the process of technical configuration for our Azure Marketplace offerings and we’re encountering a problem. In the ‘Recommended VM Sizes’ section, we cannot select the confidential VMs DCasv5 and DCadsv5 that we use for our products. These do not appear and therefore we cannot limit the users to these types of VMs. This will be problematic in the case where a client decides to install our product on a non-compatible VM. My guess is that Recommended VM size is not the best section to work with. How can we restrict the VM family ?
A: The feature to restrict VM deployments to a particular size is not natively available in VM offers currently. The feature is available in Solution templates. The VM offer can be hidden and customers can deploy using Azure App.
Q: We are in the process of technical configuration for our Azure Marketplace offerings and we’re encountering a problem. In the ‘Recommended VM Sizes’ section, we cannot select the confidential VMs DCasv5 and DCadsv5 that we use for our products. These do not appear and therefore we cannot limit the users to these types of VMs. This will be problematic in the case where a client decides to install our product on a non-compatible VM. My guess is that Recommended VM size is not the best section to work with. How can we restrict the VM family ?
A: The feature to restrict VM deployments to a particular size is not natively available in VM offers currently. The feature is available in Solution templates. The VM offer can be hidden and customers can deploy using Azure App. Read More
Announcement: Monday, June 10, 2024: New Microsoft Cybersecurity Program for Rural Hospitals
Following an announcement from the White House regarding new cybersecurity standards for hospitals and with the support of The American Hospital Association and The National Rural Health Association, Microsoft announced via press release, the new Microsoft Cybersecurity Program for Rural Hospitals.
The program is designed to support the unique cybersecurity needs of rural hospitals across the US and will deliver free and low-cost technology services, along with free training and support.
Live links:
Press release: Microsoft to help rural hospitals defend against rising cybersecurity attacks – Stories
Program information and registration: https://aka.ms/Microsoft_Security_Rural_Hospitals
Social links:
Microsoft On the Issues on LinkedIn, X, and Instagram
Following an announcement from the White House regarding new cybersecurity standards for hospitals and with the support of The American Hospital Association and The National Rural Health Association, Microsoft announced via press release, the new Microsoft Cybersecurity Program for Rural Hospitals.
The program is designed to support the unique cybersecurity needs of rural hospitals across the US and will deliver free and low-cost technology services, along with free training and support.
Live links:
Press release: Microsoft to help rural hospitals defend against rising cybersecurity attacks – Stories
Program information and registration: https://aka.ms/Microsoft_Security_Rural_Hospitals
Social links:
Microsoft On the Issues on LinkedIn, X, and Instagram Read More
Our latest work to improve Azure Functions cold starts and what you can do
We continually work to improve performance and mitigate Azure Functions cold starts – the extra time it takes for a function that hasn’t been used recently to respond to an event. We understand that no matter when your functions were last called, you want fast executions and little lag time.
In this article:
How we measure cold start and the work done to improve it in the Azure Functions platform.
What you can do to optimize your functions to improve your app’s cold start performance.
Provide your feedback on Azure Functions cold start.
How we measure Azure Functions cold start
In measuring Azure Functions performance, we prioritize the cold start of synchronous HTTP triggers in the Consumption and Flex Consumption hosting plans. That means looking at what our platform and Azure Functions host need to do to execute the first HTTP trigger function on a new instance. Then we improve it. We are also working to improve cold start for asynchronous scenarios.
To assess our progress, we run sample HTTP trigger function apps that measure cold start latencies for all supported versions of Azure Functions, in all languages, for both Windows and Linux Consumption. These sample apps are deployed in all Azure regions and subregions where Azure Functions runs. Our test function calls these sample apps every few hours to trigger a true cold start and currently generates nearly 85,000 daily cold start samples. Through this testing infrastructure we observed in past 18 months a reduction on cold start latency by approximately 53 percent across all regions and for all supported languages and platforms.
If any of the tracked metrics start to regress, we’re immediately notified and start investigating. Daily emails, alerts, and historical dashboards tell us the end-to-end cold start latencies across various percentiles. We also perform specific analyses and trigger alerts if our fiftieth percentile, ninety-ninth percentile, or maximum latency numbers regress.
In addition, we collect detailed PerfView profiles of the sample apps deployed in select regions. The breakdown includes full call stacks (user mode and kernel mode) for every millisecond spent during cold start. The profiles reveal CPU usage and call stacks, context switches, disk reads, HTTP calls, memory hard faults, common language runtime (CLR) just-in-time (JIT) compiler, garbage collector (GC), type loads, and many more details about .NET internals. We report all these details in our logging pipelines and receive alerts if metrics regress. And we’re always looking for ways to make improvements based on these profiles.
Performance improvements in the platform
Since launching Azure Functions, we’ve improved performance across the Azure platform that it runs on, in order to achieve the observed reduction in cold starts. These enhancements extended to the shared platform with Azure App Service and the new Legion platform, the operating system, storage, .NET Core, and communication channels.
We aim to optimize for the ninety-ninth–percentile latency. We delve into cold start scenarios at the millisecond level and continually fine-tune the algorithms that allocate capacity. In short, we’re always working to improve Azure Functions cold start. The following areas are our current our focus:
Function app pools. In the internal architecture, we must ensure that the right number of Function app pools are warmed up and ready to handle a cold start for all supported platforms and languages. These pools serve as placeholders in effect. Exactly how many depends on the usage per region—plus enough extra capacity to meet unexpected bursts. We’re always refining our algorithms to balance the pools without increasing costs. Placeholder processes and dependencies stay hot in memory to prevent paging out.
Ninety-ninth–percentile latencies. Although it’s relatively straightforward to optimize cold start scenarios for the fiftieth percentile, we are digging deeper to address ninety-ninth–percentile latencies, particularly when multiple VMs are involved. Each runs different processes and components and is configured with unique disk, network, and memory characteristics. It’s even harder to trace the root causes of potential ninety-ninth–percentile regressions.
Profilers. We use a multitude of specialized profiling tools capable of dissecting cold start scenarios at the millisecond level. We examine detailed call stacks and tracking activities at both the application and operating system levels. The PerfView and Event Tracing for Windows (ETW) providers are great at addressing issues with Windows and .NET-based apps, but we also investigate issues across platforms and languages. We also use Profile Guided Optimization (PGO) to ensure that Functions Host and dependent libraries are fully JIT compiled and ready to minimize the impact of platform code JIT compilation during actual cold start requests.
Histograms. If our platform detects cold starts occurring at regular intervals, we fully prewarm the instance where the function app will run to avoid cold start delays during actual execution.
6 things you can do now to improve cold start in Azure Functions
Here are a few strategies you can follow to further improve cold starts for your apps:
Deploy your function as a .zip (compressed) package. Minimize its size by removing unneeded files and dependencies, such as debug symbols (.pdb files) and unnecessary image files.
For Windows deployment, run your functions from a package file. To do this, set the WEBSITE_RUN_FROM_PACKAGE=1 app setting. If your app uses storage for storing content, deploy Azure Storage in the same region as your Azure Functions app and consider using premium storage for a faster cold start.
When deploying .NET apps, publish with ReadyToRun to avoid additional costs from the JIT compiler.
In the Azure portal, navigate to your function app. Go to Diagnose and solve problems, and review any messages that appear under Risk alerts. Look for issues that may impact cold starts.
If your app uses a Premium or App Service plan, invoke warmup triggers to preload dependencies or to add any custom logic required to connect to external endpoints. This option isn’t supported for apps on Consumption plans.
To help mitigate cold starts, try the always ready instances feature of our newest hosting option for event-driven serverless functions, Flex Consumption.
Final Thoughts
If your Azure Functions app still doesn’t perform as well as you’d like, consider the following:
Share your feedback on Azure Functions cold start to get in touch with the team.
try the always ready instances feature of our newest hosting option for event-driven serverless functions, Flex Consumption.
Note: This article is a modified version of the article originally published on Newsstack.
Microsoft Tech Community – Latest Blogs –Read More
Create zero-thickness surface in a 3D partial differential equation problem
I am struggling to create the geometry that I want to use in the Matlab PDE modeling interface. I want my model to consist of a zero-thickness triangulated sheet embedded in a tetrahedral mesh of a sphere. I need to address the faces or nodes that lie on the sheets in order to prescribe boundary conditions there.
It’s easy to create the outer sphere in the PDE modeling environment:
g1 = multisphere(R)
However I am really struggling to define the zero thickness triangulated sheet geometry inside the sphere.
g2 = geometryFromMesh(mesh,nodes,elements) throws an error if the triangulation described by the input node and element lists does not form a closed boundary. This seems like a limitation of the modeling interface. Any ideas on how to create the geometry within the PDE modeling environment?
Alternatively…
Using a workaround, I created the FE mesh outside the PDE modeling environment. I am able to import this entire mesh into the interface just fine, albiet without any Faces, Edges, or Vertices definitions.
However, it’s apparently not possible to prescribe boundary conditions directly at mesh nodes in the PDE modeling interface – boundary conditions can only be prescribed onto geometry vertices. Is there a way to map mesh nodes to geometry vertices?I am struggling to create the geometry that I want to use in the Matlab PDE modeling interface. I want my model to consist of a zero-thickness triangulated sheet embedded in a tetrahedral mesh of a sphere. I need to address the faces or nodes that lie on the sheets in order to prescribe boundary conditions there.
It’s easy to create the outer sphere in the PDE modeling environment:
g1 = multisphere(R)
However I am really struggling to define the zero thickness triangulated sheet geometry inside the sphere.
g2 = geometryFromMesh(mesh,nodes,elements) throws an error if the triangulation described by the input node and element lists does not form a closed boundary. This seems like a limitation of the modeling interface. Any ideas on how to create the geometry within the PDE modeling environment?
Alternatively…
Using a workaround, I created the FE mesh outside the PDE modeling environment. I am able to import this entire mesh into the interface just fine, albiet without any Faces, Edges, or Vertices definitions.
However, it’s apparently not possible to prescribe boundary conditions directly at mesh nodes in the PDE modeling interface – boundary conditions can only be prescribed onto geometry vertices. Is there a way to map mesh nodes to geometry vertices? I am struggling to create the geometry that I want to use in the Matlab PDE modeling interface. I want my model to consist of a zero-thickness triangulated sheet embedded in a tetrahedral mesh of a sphere. I need to address the faces or nodes that lie on the sheets in order to prescribe boundary conditions there.
It’s easy to create the outer sphere in the PDE modeling environment:
g1 = multisphere(R)
However I am really struggling to define the zero thickness triangulated sheet geometry inside the sphere.
g2 = geometryFromMesh(mesh,nodes,elements) throws an error if the triangulation described by the input node and element lists does not form a closed boundary. This seems like a limitation of the modeling interface. Any ideas on how to create the geometry within the PDE modeling environment?
Alternatively…
Using a workaround, I created the FE mesh outside the PDE modeling environment. I am able to import this entire mesh into the interface just fine, albiet without any Faces, Edges, or Vertices definitions.
However, it’s apparently not possible to prescribe boundary conditions directly at mesh nodes in the PDE modeling interface – boundary conditions can only be prescribed onto geometry vertices. Is there a way to map mesh nodes to geometry vertices? partial differential equations, mesh nodes, importgeometry, geometryfrommesh MATLAB Answers — New Questions
Wrong sum after calculation
Hello!
So I would like to use a calculated field inside my Pivot Table. But somehow the formula is not respected.
I have the following columns:
Stock; Withdraw Rate; Usage
1000; 0,3; x
Somehow instead of displaying 1000*0,3=300 the table shows 700. Which means somehow the result of the formula is being deducted from the source value of 1000.
Does anyone know how to fix that?
Thank you
Hello!So I would like to use a calculated field inside my Pivot Table. But somehow the formula is not respected.I have the following columns: Stock; Withdraw Rate; Usage1000; 0,3; x Somehow instead of displaying 1000*0,3=300 the table shows 700. Which means somehow the result of the formula is being deducted from the source value of 1000.Does anyone know how to fix that? Thank you Read More
integral of the besselj function
how to count the integral of the besselj function from 0 to 4pi?how to count the integral of the besselj function from 0 to 4pi? how to count the integral of the besselj function from 0 to 4pi? besselj, integral, matlab MATLAB Answers — New Questions
I have purchased the Signal Processing Toolbox but still get an error when trying to use a function
I have purchased the Signal Processing Toolbox, but MATLAB still throws a "you need the Signal Processing Toolbox" error when I try to use the square function per the screenshot. I have tried reinstalling MATLAB and restarting the program.I have purchased the Signal Processing Toolbox, but MATLAB still throws a "you need the Signal Processing Toolbox" error when I try to use the square function per the screenshot. I have tried reinstalling MATLAB and restarting the program. I have purchased the Signal Processing Toolbox, but MATLAB still throws a "you need the Signal Processing Toolbox" error when I try to use the square function per the screenshot. I have tried reinstalling MATLAB and restarting the program. signal processing MATLAB Answers — New Questions
One function is greater than other
I would like to determine the range of values for ( z ) where the following inequality holds true:
this is my trying
syms z real
assume(z > exp(1))
% Define the function
f = z – 8.02 * log(z) – (3.359 / 21.233) * log(z) * z;
sol = solve(f > 0, z, ‘ReturnConditions’, true);
vpa(sol.conditions)I would like to determine the range of values for ( z ) where the following inequality holds true:
this is my trying
syms z real
assume(z > exp(1))
% Define the function
f = z – 8.02 * log(z) – (3.359 / 21.233) * log(z) * z;
sol = solve(f > 0, z, ‘ReturnConditions’, true);
vpa(sol.conditions) I would like to determine the range of values for ( z ) where the following inequality holds true:
this is my trying
syms z real
assume(z > exp(1))
% Define the function
f = z – 8.02 * log(z) – (3.359 / 21.233) * log(z) * z;
sol = solve(f > 0, z, ‘ReturnConditions’, true);
vpa(sol.conditions) @staff MATLAB Answers — New Questions
One approval flow across multiple Sharepoint Sites
I have a site structure / document libraries as follow:
https://mysite.sharepoint.com/sites/project1/projectdocuments
https://mysite.sharepoint.com/sites/project2/projectdocuments
https://mysite.sharepoint.com/sites/project3/projectdocuments
https://mysite.sharepoint.com/sites/projectN/projectdocuments
How can I have one approval flow for all libraries?
I have seen several blogs on this subject, but all are 4-5 years old. Any news here?
I have a site structure / document libraries as follow: https://mysite.sharepoint.com/sites/project1/projectdocumentshttps://mysite.sharepoint.com/sites/project2/projectdocumentshttps://mysite.sharepoint.com/sites/project3/projectdocumentshttps://mysite.sharepoint.com/sites/projectN/projectdocuments How can I have one approval flow for all libraries?I have seen several blogs on this subject, but all are 4-5 years old. Any news here? Read More
Calculated Field in Pivot
Hello!
I would like to get some help regarding a Pivot Table error I came across.
So I have the following columns given:
I would like to calculate the DIH column by a calculated field/measure. The formula should be :
– ln(In Stock)/ln(1-Withdraw Rate) = x
– ln(1864)/ln(1-0,15…) = 46
When I type it inside my Pivot Table the results are way different than they should be.
I should get a result of 46 [months] instead I get 2,83.
Now the question is how can I solve this?
Thank you a lot in advance
Hello!I would like to get some help regarding a Pivot Table error I came across.So I have the following columns given: I would like to calculate the DIH column by a calculated field/measure. The formula should be :- ln(In Stock)/ln(1-Withdraw Rate) = x – ln(1864)/ln(1-0,15…) = 46 When I type it inside my Pivot Table the results are way different than they should be.I should get a result of 46 [months] instead I get 2,83.Now the question is how can I solve this?Thank you a lot in advance Read More
Vancouver Power BI and Modern Excel User Group Meet-up
Topic: Tabular Editor for Power BI Users
Session Outline:
First, we’ll learn about some of the newest features and updates in Power BI. Next, we’ll learn about Tabular Editor with Microsoft MVP, Sue Bayes. There is a lot of talk about how as a professional Power BI developer, you should use Tabular Editor. Yet when you open it, it’s daunting. Where do you start, what do these buttons do, how long is it going to take for me to learn this, is it really worth it?
In this session, we will run through the core components of Tabular Editor in normal, non-programming language. We look at how you can utilise this software to save you time in working with Power BI.
Session Objectives:
Understand the Tabular Editor interface and its various elementsLearn how to use Tabular Editor to create and manage Tabular modelsLearn how to use key features of Tabular Editor, including the formula bar, expression editor, and DAX functionsUnderstand the difference between Tabular Editor 2 and 3 including when it’s time to switch.Understand how Tabular Editor 3 can be integrated with Microsoft Analysis Services and Power BI.
Topic: Tabular Editor for Power BI UsersSession Outline:First, we’ll learn about some of the newest features and updates in Power BI. Next, we’ll learn about Tabular Editor with Microsoft MVP, Sue Bayes. There is a lot of talk about how as a professional Power BI developer, you should use Tabular Editor. Yet when you open it, it’s daunting. Where do you start, what do these buttons do, how long is it going to take for me to learn this, is it really worth it?In this session, we will run through the core components of Tabular Editor in normal, non-programming language. We look at how you can utilise this software to save you time in working with Power BI.Session Objectives:Understand the Tabular Editor interface and its various elementsLearn how to use Tabular Editor to create and manage Tabular modelsLearn how to use key features of Tabular Editor, including the formula bar, expression editor, and DAX functionsUnderstand the difference between Tabular Editor 2 and 3 including when it’s time to switch.Understand how Tabular Editor 3 can be integrated with Microsoft Analysis Services and Power BI. Read More
Confusion Regarding Filter Precedence
Here’s the scenario I’m facing (VPP app):
Group A (Required Assignment):
Users: Identical to Group B.
Filter: Include only corporate iPhones.
Purpose: Auto-install the app on corporate-owned iPhones.
Group B (Available Assignment):
Users: Identical to Group A.
Filter: None.
Purpose: Make the app available to all devices (corporate and BYOD) in the Company Portal.
Issue:
BYOD devices are receiving the required install despite the filter.
Filter message: “The app was offered during the last check-in. We couldn’t evaluate the device for matching filters because a conflicting assignment didn’t require filters.”
Filter: (device.model -contains “iPhone”) and (device.deviceOwnership -eq “Corporate”)
Evaluation result: Not evaluated due to a conflicting assignment without filters.
Business Request:
The app should be available to the same list of users.
It should be required (auto-installed) only on corporate devices.
Overlapping groups are used to simplify automation and avoid complicating the process for the Service Desk, which would need to check if devices are BYOD or corporate-owned.
I’ve been looking at:
Filter reports and troubleshooting in Microsoft Intune | Microsoft Learn
Filter reports and troubleshooting in Microsoft Intune | Microsoft Learn
Assign apps to groups in Microsoft Intune | Microsoft Learn
And am admittedly a little smooth-brained. Can anyone explain what’s happening here and how to resolve? Is the “no filter” available group taking precedence over the “include” filter and somehow pushing to all devices?
How can I rectify this? Can I just add a dynamic group to exclude all BYOD devices in the required assignment and leave the rest the same or use an exclude filter for BYOD device in the required assignment? Any help is appreciated.
App Deployment/Packaging Here’s the scenario I’m facing (VPP app):Group A (Required Assignment):Users: Identical to Group B.Filter: Include only corporate iPhones.Purpose: Auto-install the app on corporate-owned iPhones.Group B (Available Assignment):Users: Identical to Group A.Filter: None.Purpose: Make the app available to all devices (corporate and BYOD) in the Company Portal.Issue:BYOD devices are receiving the required install despite the filter.Filter message: “The app was offered during the last check-in. We couldn’t evaluate the device for matching filters because a conflicting assignment didn’t require filters.”Filter: (device.model -contains “iPhone”) and (device.deviceOwnership -eq “Corporate”)Evaluation result: Not evaluated due to a conflicting assignment without filters.Business Request:The app should be available to the same list of users.It should be required (auto-installed) only on corporate devices.Overlapping groups are used to simplify automation and avoid complicating the process for the Service Desk, which would need to check if devices are BYOD or corporate-owned.I’ve been looking at:Filter reports and troubleshooting in Microsoft Intune | Microsoft LearnFilter reports and troubleshooting in Microsoft Intune | Microsoft LearnAssign apps to groups in Microsoft Intune | Microsoft LearnAnd am admittedly a little smooth-brained. Can anyone explain what’s happening here and how to resolve? Is the “no filter” available group taking precedence over the “include” filter and somehow pushing to all devices?How can I rectify this? Can I just add a dynamic group to exclude all BYOD devices in the required assignment and leave the rest the same or use an exclude filter for BYOD device in the required assignment? Any help is appreciated. Read More
Inverse model for feedforward control
Hello,
I want to implement a feedforward control for good trajectory tracking (feedback path for disturbance rejection comes afterwards).
The system model is an electrical RL-circuit in series with a voltage source. (schematics).
I determined the continuous transfer function to be:
The inverse of this is
(I know that this transfer function can not be realized in physical systems since, but I would hope that simulink lets me simulate the ideal system).
If I combine G^-1 and G in simulink, I would expect to obtain ideal trajectory tracking, because G^-1 * G = 1
However the following model only achieves ideal tracking, if I add a factor of 6 at the marked position. (R=3, L – 0.004, solver is fixed step ode4, 1e-4s stepsize)
Why do I need to add a factor of 6 there?Hello,
I want to implement a feedforward control for good trajectory tracking (feedback path for disturbance rejection comes afterwards).
The system model is an electrical RL-circuit in series with a voltage source. (schematics).
I determined the continuous transfer function to be:
The inverse of this is
(I know that this transfer function can not be realized in physical systems since, but I would hope that simulink lets me simulate the ideal system).
If I combine G^-1 and G in simulink, I would expect to obtain ideal trajectory tracking, because G^-1 * G = 1
However the following model only achieves ideal tracking, if I add a factor of 6 at the marked position. (R=3, L – 0.004, solver is fixed step ode4, 1e-4s stepsize)
Why do I need to add a factor of 6 there? Hello,
I want to implement a feedforward control for good trajectory tracking (feedback path for disturbance rejection comes afterwards).
The system model is an electrical RL-circuit in series with a voltage source. (schematics).
I determined the continuous transfer function to be:
The inverse of this is
(I know that this transfer function can not be realized in physical systems since, but I would hope that simulink lets me simulate the ideal system).
If I combine G^-1 and G in simulink, I would expect to obtain ideal trajectory tracking, because G^-1 * G = 1
However the following model only achieves ideal tracking, if I add a factor of 6 at the marked position. (R=3, L – 0.004, solver is fixed step ode4, 1e-4s stepsize)
Why do I need to add a factor of 6 there? simulink, feedforward, control, laplace MATLAB Answers — New Questions
Vectorized Levenshtein distances between arrays of text labels?
I have to compare "N" ID labels (several thousand) to each other in order to determine which are mistypings of each other. The labels have up to 20 characters. Preliminarily, I am considering the calculation of the N(N-1)/2 Levenshtein distances between them and using clustering which labels correspond to the same ID. It is being done in Python, but none of the Levenshtein distance implementations are vectorized. The NxN array of distances is iterated through on an element-by-element basis.
I thought that there might be a vectorized Matlab version of Levenshtein distance, which I could package for deployment and invocation from Python. I found the a few shown in the Annex below, as well as an "editDistance" function available in R2023b. None of these vectorize the calculation of N(N-2)/2 distances. I’m surprised that a vectorized implementation doesn’t exist. Am I missing something obvious?
Annex: Matlab implementations of Levenshtein distance
https://people.math.sc.edu/Burkardt/m_src/levenshtein/levenshtein.html
https://www.mathworks.com/matlabcentral/fileexchange/17585-calculation-of-distance-between-strings
https://blogs.mathworks.com/cleve/2017/08/14/levenshtein-edit-distance-between-stringsI have to compare "N" ID labels (several thousand) to each other in order to determine which are mistypings of each other. The labels have up to 20 characters. Preliminarily, I am considering the calculation of the N(N-1)/2 Levenshtein distances between them and using clustering which labels correspond to the same ID. It is being done in Python, but none of the Levenshtein distance implementations are vectorized. The NxN array of distances is iterated through on an element-by-element basis.
I thought that there might be a vectorized Matlab version of Levenshtein distance, which I could package for deployment and invocation from Python. I found the a few shown in the Annex below, as well as an "editDistance" function available in R2023b. None of these vectorize the calculation of N(N-2)/2 distances. I’m surprised that a vectorized implementation doesn’t exist. Am I missing something obvious?
Annex: Matlab implementations of Levenshtein distance
https://people.math.sc.edu/Burkardt/m_src/levenshtein/levenshtein.html
https://www.mathworks.com/matlabcentral/fileexchange/17585-calculation-of-distance-between-strings
https://blogs.mathworks.com/cleve/2017/08/14/levenshtein-edit-distance-between-strings I have to compare "N" ID labels (several thousand) to each other in order to determine which are mistypings of each other. The labels have up to 20 characters. Preliminarily, I am considering the calculation of the N(N-1)/2 Levenshtein distances between them and using clustering which labels correspond to the same ID. It is being done in Python, but none of the Levenshtein distance implementations are vectorized. The NxN array of distances is iterated through on an element-by-element basis.
I thought that there might be a vectorized Matlab version of Levenshtein distance, which I could package for deployment and invocation from Python. I found the a few shown in the Annex below, as well as an "editDistance" function available in R2023b. None of these vectorize the calculation of N(N-2)/2 distances. I’m surprised that a vectorized implementation doesn’t exist. Am I missing something obvious?
Annex: Matlab implementations of Levenshtein distance
https://people.math.sc.edu/Burkardt/m_src/levenshtein/levenshtein.html
https://www.mathworks.com/matlabcentral/fileexchange/17585-calculation-of-distance-between-strings
https://blogs.mathworks.com/cleve/2017/08/14/levenshtein-edit-distance-between-strings levenshtein-distance, vectorized MATLAB Answers — New Questions
difference between 2 values in a vector
Hello Community.
Asking for your help again to find a solution…..
I have a vector with several data points, I’d like to get the difference between each value that is not equal to CERO.
I’m using "diff" command however this includes the difference betwee values that are equal to CERO, here is an example.
x = [0.2 0.0 0.0 0.0 0.25 0.0 0.0 0.0 0.3 0.0 0.0 0.4 0.0 0.0 0.0 0.1 0.0 0.0 0.0 0.35 ]
I tried this : b = diff(x)
b = -0.20 0.0 0.0 0.25 -0.25 0.0 0.0 0.30 -0.30 0.0 0.40 -0.40 0.0 0.0 0.10 -0.10 0.0 0.0 0.35
it gives me the difference between each data point
What I’m trying to get is the difference between each point that is not equal to cero like this:
b = 0.0 0.0 0.0 0.0 0.05 0.0 0.0 0.0 0.05 0.0 0.0 0.1 0.0 0.0 0.0 -0.3 0.0 0.0 0.0 0.25
I don’t want to eliminate the ceros in between if I do so it will change the length of the vector and I need to keep same lenght to compare Vs other signals.
the number of ceros between each data value is not always the same, could be 3 ceros in between but it could be 2, 4, 6…..
as always I thank you in advance, your feedback will be higly appreciated.Hello Community.
Asking for your help again to find a solution…..
I have a vector with several data points, I’d like to get the difference between each value that is not equal to CERO.
I’m using "diff" command however this includes the difference betwee values that are equal to CERO, here is an example.
x = [0.2 0.0 0.0 0.0 0.25 0.0 0.0 0.0 0.3 0.0 0.0 0.4 0.0 0.0 0.0 0.1 0.0 0.0 0.0 0.35 ]
I tried this : b = diff(x)
b = -0.20 0.0 0.0 0.25 -0.25 0.0 0.0 0.30 -0.30 0.0 0.40 -0.40 0.0 0.0 0.10 -0.10 0.0 0.0 0.35
it gives me the difference between each data point
What I’m trying to get is the difference between each point that is not equal to cero like this:
b = 0.0 0.0 0.0 0.0 0.05 0.0 0.0 0.0 0.05 0.0 0.0 0.1 0.0 0.0 0.0 -0.3 0.0 0.0 0.0 0.25
I don’t want to eliminate the ceros in between if I do so it will change the length of the vector and I need to keep same lenght to compare Vs other signals.
the number of ceros between each data value is not always the same, could be 3 ceros in between but it could be 2, 4, 6…..
as always I thank you in advance, your feedback will be higly appreciated. Hello Community.
Asking for your help again to find a solution…..
I have a vector with several data points, I’d like to get the difference between each value that is not equal to CERO.
I’m using "diff" command however this includes the difference betwee values that are equal to CERO, here is an example.
x = [0.2 0.0 0.0 0.0 0.25 0.0 0.0 0.0 0.3 0.0 0.0 0.4 0.0 0.0 0.0 0.1 0.0 0.0 0.0 0.35 ]
I tried this : b = diff(x)
b = -0.20 0.0 0.0 0.25 -0.25 0.0 0.0 0.30 -0.30 0.0 0.40 -0.40 0.0 0.0 0.10 -0.10 0.0 0.0 0.35
it gives me the difference between each data point
What I’m trying to get is the difference between each point that is not equal to cero like this:
b = 0.0 0.0 0.0 0.0 0.05 0.0 0.0 0.0 0.05 0.0 0.0 0.1 0.0 0.0 0.0 -0.3 0.0 0.0 0.0 0.25
I don’t want to eliminate the ceros in between if I do so it will change the length of the vector and I need to keep same lenght to compare Vs other signals.
the number of ceros between each data value is not always the same, could be 3 ceros in between but it could be 2, 4, 6…..
as always I thank you in advance, your feedback will be higly appreciated. matlab MATLAB Answers — New Questions
Unable to use power query to combine files in folder synced from SharePoint due to system file
I have a library synced locally so that I can analyze portions of the file contents based on a query. Currently there are around 5,000 files in the library, and there will be closer to 10,000 by the end of this week.
I’m unable to use Power Query to combine the files, then edit them, because of a system file. This seems to be a new issue as this is something I’ve done successfully in the past. I’m wondering if there’s a work around. I cannot use SharePoint folder for the data source as there are far too many files on the site, and there’s not an option to filter to only the files in this specific library.
How do I work around this system file issue? If I try to combine & transform or combine & load to, nothing happens. If I try to do either of them, it just returns to this screen.
I have a library synced locally so that I can analyze portions of the file contents based on a query. Currently there are around 5,000 files in the library, and there will be closer to 10,000 by the end of this week.I’m unable to use Power Query to combine the files, then edit them, because of a system file. This seems to be a new issue as this is something I’ve done successfully in the past. I’m wondering if there’s a work around. I cannot use SharePoint folder for the data source as there are far too many files on the site, and there’s not an option to filter to only the files in this specific library. How do I work around this system file issue? If I try to combine & transform or combine & load to, nothing happens. If I try to do either of them, it just returns to this screen. Read More
New Blog | NIST CSF 2.0 – Protect (PR) – Applications for Microsoft 365 (Part 1)
By Shawn Hays
The National Institute of Standards and Technology (NIST) published the first version of its Cybersecurity Framework (CSF) in 2014. Ten years later NIST released the second iteration of CSF, entitled NIST CSF 2.0. Microsoft and its partners have supported organizations in implementing the original CSF guidance, going as far as building and enhancing an assessment in Microsoft Purview Compliance Manager since 2018. This blog and series will look to apply NIST CSF 2.0 to Microsoft 365 and discuss changes from the previous publication.
It is somewhat improper to look at any particular CSF Functions in a vacuum or singular vantage point. NIST CSWP 29 (the primary document) illustrates and describes CSF Functions as “a wheel because all of the Functions relate to one another. For example, an organization will categorize assets under IDENTIFY and take steps to secure those assets under PROTECT. Investments in planning and testing in the GOVERN and IDENTIFY Functions will support timely detection of unexpected events in the DETECT Function, as well as enabling incident response and recovery actions for cybersecurity incidents in the RESPOND and RECOVER Functions. GOVERN is in the center of the wheel because it informs how an organization will implement the other five Functions.”
Read the full post here: NIST CSF 2.0 – Protect (PR) – Applications for Microsoft 365 (Part 1)
By Shawn Hays
The National Institute of Standards and Technology (NIST) published the first version of its Cybersecurity Framework (CSF) in 2014. Ten years later NIST released the second iteration of CSF, entitled NIST CSF 2.0. Microsoft and its partners have supported organizations in implementing the original CSF guidance, going as far as building and enhancing an assessment in Microsoft Purview Compliance Manager since 2018. This blog and series will look to apply NIST CSF 2.0 to Microsoft 365 and discuss changes from the previous publication.
It is somewhat improper to look at any particular CSF Functions in a vacuum or singular vantage point. NIST CSWP 29 (the primary document) illustrates and describes CSF Functions as “a wheel because all of the Functions relate to one another. For example, an organization will categorize assets under IDENTIFY and take steps to secure those assets under PROTECT. Investments in planning and testing in the GOVERN and IDENTIFY Functions will support timely detection of unexpected events in the DETECT Function, as well as enabling incident response and recovery actions for cybersecurity incidents in the RESPOND and RECOVER Functions. GOVERN is in the center of the wheel because it informs how an organization will implement the other five Functions.”
Read the full post here: NIST CSF 2.0 – Protect (PR) – Applications for Microsoft 365 (Part 1) Read More
New Blog | SAP Identity Management to Microsoft Entra ID Migration Guidance Now Available
We’re excited to announce that guidance for SAP Identity Management (IDM) customers planning to migrate their identity management scenarios to Microsoft Entra is now available. In a previous post, we discussed SAP ending maintenance for their identity management solution (SAP IDM) by 2030. We’ve since begun jointly developing documentation to help customers plan a seamless migration to the recommended alternative—Microsoft Entra ID. For many customers, it may be possible to get started immediately, leveraging the subscriptions that they already own with Microsoft 365 suites. Microsoft 365 enterprise suite licenses include Entra ID P1 features that will be the focus of this first round of guidance. In this post, we’ll also outline additional benefits of Microsoft Entra ID and list some key partners who can help you get started.
Continuing collaboration for enterprise security
Microsoft and SAP have a long history of collaborating to keep our customers’ organizations productive and secure—an effort especially important now as more companies have adopted hybrid work arrangements, making it possible to work from office and from home. For example, last year we announced how Microsoft Sentinel is helping organizations bring SOAR threat monitoring capabilities to their SAP environments. We continue to deepen our relationship, and now we’re extending support for SAP customers’ digital transformation and cloud adoption goals with a seamless and secure identity management solution in Microsoft Entra ID.
Read the full post here: SAP Identity Management to Microsoft Entra ID Migration Guidance Now Available
By Irina Nechaeva
We’re excited to announce that guidance for SAP Identity Management (IDM) customers planning to migrate their identity management scenarios to Microsoft Entra is now available. In a previous post, we discussed SAP ending maintenance for their identity management solution (SAP IDM) by 2030. We’ve since begun jointly developing documentation to help customers plan a seamless migration to the recommended alternative—Microsoft Entra ID. For many customers, it may be possible to get started immediately, leveraging the subscriptions that they already own with Microsoft 365 suites. Microsoft 365 enterprise suite licenses include Entra ID P1 features that will be the focus of this first round of guidance. In this post, we’ll also outline additional benefits of Microsoft Entra ID and list some key partners who can help you get started.
Continuing collaboration for enterprise security
Microsoft and SAP have a long history of collaborating to keep our customers’ organizations productive and secure—an effort especially important now as more companies have adopted hybrid work arrangements, making it possible to work from office and from home. For example, last year we announced how Microsoft Sentinel is helping organizations bring SOAR threat monitoring capabilities to their SAP environments. We continue to deepen our relationship, and now we’re extending support for SAP customers’ digital transformation and cloud adoption goals with a seamless and secure identity management solution in Microsoft Entra ID.
Read the full post here: SAP Identity Management to Microsoft Entra ID Migration Guidance Now Available Read More
PARTICIPATE IN THESE CHALLENGES
Ambassador Challenge: Azure essentials- MLSA
Get ready to dive deeper into Azure AI technology. Using AI, you can build solutions, improve your apps, and accelerate business growth. Master the basics of AI and jump-start your career now!https://learn.microsoft.com/en-us/training/challenges?id=d068b11d-4952-4a61-8115-cd674f31ae73&WT.mc_id=cloudskillschallenge_d068b11d-4952-4a61-8115-cd674f31ae73&wt.mc_id=studentamb_291294
Ambassador Challenge: Azure essentials- MLSAGet ready to dive deeper into Azure AI technology. Using AI, you can build solutions, improve your apps, and accelerate business growth. Master the basics of AI and jump-start your career now!https://learn.microsoft.com/en-us/training/challenges?id=d068b11d-4952-4a61-8115-cd674f31ae73&WT.mc_id=cloudskillschallenge_d068b11d-4952-4a61-8115-cd674f31ae73&wt.mc_id=studentamb_291294 https://learn.microsoft.com/en-us/training/challenges?id=d068b11d-4952-4a61-8115-cd674f31ae73&WT.mc_id=cloudskillschallenge_d068b11d-4952-4a61-8115-cd674f31ae73&wt.mc_id=studentamb_291294 Read More
Exchange Online (M365) – create an account that can ONLY see calendar free/busy
Our org is fully using M365 and my boss is looking for me to create an AAD member account that ONLY has access to see organizational users (AAD member) calendar Free/Busy and can do nothing else in M365 (No outlook, SharePoint, OneDrive, access to any apps, etc.). Is there a way to set up such an account? I “think” she might want to have a contractor use this account to see Free/Busy in order to manually notify others of when they can schedule a meeting for certain staff members.
Thank you!
Brian
Our org is fully using M365 and my boss is looking for me to create an AAD member account that ONLY has access to see organizational users (AAD member) calendar Free/Busy and can do nothing else in M365 (No outlook, SharePoint, OneDrive, access to any apps, etc.). Is there a way to set up such an account? I “think” she might want to have a contractor use this account to see Free/Busy in order to manually notify others of when they can schedule a meeting for certain staff members. Thank you!Brian Read More