-
Posts
27,562 -
Joined
-
Last visited
-
Days Won
73
Content Type
Forums
Blogs
Events
Articles
Resources
Downloads
Gallery
Store
Everything posted by AWS
-
Recovering and Validating Data After Unexpected SQL Server Failovers
AWS posted an article in Tutorials and Guides
In SQL Server environments, including on-premises, Azure SQL Database, or SQL Managed Instance, unexpected failovers can sometimes leave Availability Group roles out of sync. When this happens, the new primary replica might take over while the original primary faces issues, leading to possible data discrepancies if transactions were in progress or uncommitted. To recover or validate any data loss, it’s essential to resync or validate the new primary with the old primary as soon as it’s back online. This ensures any lost transactions are reconciled. If critical data was missed during the failover, it must be recovered and merged to maintain database consistency. This blog outlines the steps to recover or validate any data loss using SQL Server Database Compare Utility. To simulate this situation with the SQL Server Box product, two SQL Server VMs were set up on the same subnet, Always-On HA was turned on for both instances, a simplified WideWorldImportersDW (WWIDW) database was restored and set to full recovery mode. After creating the certificates and logins/users required for Availability Groups (AGs) without domains, an asynchronous commit AG was created (it needed to be asynchronous, since we cannot simulate transaction loss with a synchronous AG). Using a transaction simulator, many transactions per second were performed into the primary database. During this activity, the primary instance was stopped, which created a group of committed transactions that had not been replicated to the secondary. The goal of this post is to recover those missing transactions. After stopping sql1, you need to open the dashboard on sql2, because SSMS can no longer connect to sql1 to update the status: Opening the Failover wizard – you see a warning about data loss: The wizard really wants to make sure you know there may be data loss: Click through to get the results: The dashboard for sql2 has the current cluster status: To capture the state of the new primary, immediately create a database snapshot, ideally before opening it up to new application connections: (In this case we were using sql1 in the transaction simulator and not the sqlistener, so no transactions will be written to sql2). Restart the sql1 instance. On refresh, you will see that the old primary now has a state of Not Synchronizing / In Recovery. Create a database snapshot on the old primary (sql1) before making the old primary the secondary (otherwise, when the old primary synchronizes as a secondary, the missing transactions are lost😞 At this point you can Resume Data Movement to make the old primary a secondary. It takes a minute for the old primary to roll back lost transactions and resynchronize with the new primary and the old primary should now be a synchronizing secondary; We can now use the SQL Server Database Compare (SSDBC) application to check if we lost any transactions between the snapshot on the new primary (sql2 – the source) and the snapshot on the old primary (sql1 – the target). Refer to the SSDBC documentation for how to set it up. In this case we have 313 hash differences (updates) and 423 missing (inserts) rows – note that we have no deletes that were not replicated because of timing of the simulated transaction cascading deletes (deletes stop if we exceed the configured percentage until the inserts/updates catch up): Looking at the SSDBC folder in My Documents – we can see a SQL script file for each table in the database, with numbers in front to indicate the order you should run them in (based on foreign key references). If the database has DRI configured, you may need to combine scripts if the referenced table has an identity column and if you have the identity value capture option turned on. In the same folder are log files which contain more details about the comparison. Opening one of the files, you can see update and insert statements. The update statements are written to try to be as safe as possible by checking (with additional conditions in the where clause) that the column value hasn’t been subsequently changed on the new primary. After running all the change scripts on WWIDW on sql2 and then re-running SSDBC on WWIDW on sql2 (not the snapshot) and the sql1 snapshot – we see that the databases are now the same (note that this will only work on a static new primary); Note that we could also use the tablediff utility or SSDT to generate a differences script. The SSDBC download package contains a PowerShell script to make running the comparison operations across many servers/databases easier by making it Excel workbook driven. You can list your source and target servers and databases in the provided Servers.xlsx workbook and run the BulkDatabaseRecovery.ps1 script. -
In SQL Server environments, including on-premises, Azure SQL Database, or SQL Managed Instance, unexpected failovers can sometimes leave Availability Group roles out of sync. When this happens, the new primary replica might take over while the original primary faces issues, leading to possible data discrepancies if transactions were in progress or uncommitted. To recover or validate any data loss, it’s essential to resync or validate the new primary with the old primary as soon as it’s back online. This ensures any lost transactions are reconciled. If critical data was missed during the failover, it must be recovered and merged to maintain database consistency. This blog outlines the steps to recover or validate any data loss using SQL Server Database Compare Utility. To simulate this situation with the SQL Server Box product, two SQL Server VMs were set up on the same subnet, Always-On HA was turned on for both instances, a simplified WideWorldImportersDW (WWIDW) database was restored and set to full recovery mode. After creating the certificates and logins/users required for Availability Groups (AGs) without domains, an asynchronous commit AG was created (it needed to be asynchronous, since we cannot simulate transaction loss with a synchronous AG). Using a transaction simulator, many transactions per second were performed into the primary database. During this activity, the primary instance was stopped, which created a group of committed transactions that had not been replicated to the secondary. The goal of this post is to recover those missing transactions. After stopping sql1, you need to open the dashboard on sql2, because SSMS can no longer connect to sql1 to update the status: Opening the Failover wizard – you see a warning about data loss: The wizard really wants to make sure you know there may be data loss: Click through to get the results: The dashboard for sql2 has the current cluster status: To capture the state of the new primary, immediately create a database snapshot, ideally before opening it up to new application connections: (In this case we were using sql1 in the transaction simulator and not the sqlistener, so no transactions will be written to sql2). Restart the sql1 instance. On refresh, you will see that the old primary now has a state of Not Synchronizing / In Recovery. Create a database snapshot on the old primary (sql1) before making the old primary the secondary (otherwise, when the old primary synchronizes as a secondary, the missing transactions are lost😞 At this point you can Resume Data Movement to make the old primary a secondary. It takes a minute for the old primary to roll back lost transactions and resynchronize with the new primary and the old primary should now be a synchronizing secondary; We can now use the SQL Server Database Compare (SSDBC) application to check if we lost any transactions between the snapshot on the new primary (sql2 – the source) and the snapshot on the old primary (sql1 – the target). Refer to the SSDBC documentation for how to set it up. In this case we have 313 hash differences (updates) and 423 missing (inserts) rows – note that we have no deletes that were not replicated because of timing of the simulated transaction cascading deletes (deletes stop if we exceed the configured percentage until the inserts/updates catch up): Looking at the SSDBC folder in My Documents – we can see a SQL script file for each table in the database, with numbers in front to indicate the order you should run them in (based on foreign key references). If the database has DRI configured, you may need to combine scripts if the referenced table has an identity column and if you have the identity value capture option turned on. In the same folder are log files which contain more details about the comparison. Opening one of the files, you can see update and insert statements. The update statements are written to try to be as safe as possible by checking (with additional conditions in the where clause) that the column value hasn’t been subsequently changed on the new primary. After running all the change scripts on WWIDW on sql2 and then re-running SSDBC on WWIDW on sql2 (not the snapshot) and the sql1 snapshot – we see that the databases are now the same (note that this will only work on a static new primary); Note that we could also use the tablediff utility or SSDT to generate a differences script. The SSDBC download package contains a PowerShell script to make running the comparison operations across many servers/databases easier by making it Excel workbook driven. You can list your source and target servers and databases in the provided Servers.xlsx workbook and run the BulkDatabaseRecovery.ps1 script. View full article
-
Things are progressing nicely. All data is imported. Caches are being rebuilt. Next step is to upgrade to IPB v5. This is a major upgrade. When done Free PC Help Forum will enter the new era of communities. Please bear with me as I finish up the process.
-
I moved down here 7 years ago. The servers were still in Illinois until a few months ago. We get a couple big storms every year so while I hope we are done we probably aren't.
-
The server for the site is in Florida. Last weekend we had hurricane Debby pass through. While we weren't directly in the path we were close enough that power was out until yesterday afternoon. Battery backup kept the site up for a few hours as it was designed for. After it went dead we had to wait until the power was restored. I apologize for the downtime.
-
Yes it is. That's one of the main things I like too.
- 9 replies
-
- change
- free pc help
-
(and 1 more)
Tagged with:
-
Perfect.
- 9 replies
-
- change
- free pc help
-
(and 1 more)
Tagged with:
-
Try this link. /misc/style?style_id=74
- 9 replies
-
- change
- free pc help
-
(and 1 more)
Tagged with:
-
That looks like the old default style. It's over next to the alert bell. [ATTACH type=full" size="1632x51]61235[/ATTACH]
- 9 replies
-
- change
- free pc help
-
(and 1 more)
Tagged with:
-
Testing a bug in text highlighting.
-
I have removed the old styles replacing them with a new state that has a dark and light variation. You can switch between dark and light by using the cog icon next to your user info top right. More change on the way. If you find any bugs in the new style let me know.
- 9 replies
-
- change
- free pc help
-
(and 1 more)
Tagged with:
-
Here is the monthly newsletter giving details about what is happening in the month of June at Microsoft. Microsoft Defender for Cloud Monthly news June 2024 Edition [attachment=53720:name] This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month. In this edition, we are looking at all the goodness from May 2024. Legend: [attachment=53721:name] Product videos [attachment=53722:name] Webcasts (recordings) [attachment=53723:name] Docs on Microsoft [attachment=53724:name] Blogs on Microsoft [attachment=53725:name] GitHub [attachment=53726:name] External content [attachment=53727:name] Product improvements [attachment=53728:name] Announcements Microsoft Defender for Cloud [attachment=53729:name] Defender for Open-Source Relational Database plan, that now covers RDS resources in AWS, is in public preview. Specifically, this plan extends coverage to AWS to detect anomalous activities and includes the ability to discover sensitive data within your RDS instances. Click here to learn more! [attachment=53730:name] Announcing General Availability for AI security posture management Defender CSPM now provides AI security posture management capabilities that secure enterprise-built, muti or hybrid cloud generative AI applications throughout the entire application lifecycle. [attachment=53731:name] In May, our team published the following blogs we would like to share: End to end container security with unified SOC experience Securing cloud-native apps in the age of AI: DfC sets a new standard DfC extends support to enable increased API security testing visibility Secure AI applications from code to runtime Vulnerability Assessment with Defender for Servers, powered by MDVM Securing your API Management service from day one Accelerate cloud security risk remediation with Microsoft Copilot for Security Best practices to manage and mitigate security recommendations [attachment=53732:name] Defender for Cloud CxE team has worked on updating the MDC Lab on GitHub! Check out updated Module 18: agentless container posture through Defender CSPM. [attachment=53733:name] Discover how other organizations successfully use Microsoft Defender for Cloud to protect their cloud workloads. This month we are featuring Scandinavian Airlines System (SAS) – a Danish state-owned airline and flag carrier of Denmark, Norway, and Sweden – that uses Microsoft security solutions, including Defender for Cloud, to secure their environment. [attachment=53734:name] Watch new episodes of the Defender for Cloud in the Field show to learn about the agentless malware detection. Join our experts in the upcoming webinars to learn what we are doing to secure your workloads running in Azure and other clouds. We greatly value your input on the types of content that enhance your understanding of our security products. Your insights are crucial in guiding the development of our future public content. We aim to deliver material that not only educates but also resonates with your daily security challenges. Whether it’s through in-depth live webinars, real-world case studies, comprehensive best practice guides through blogs, or the latest product updates, we want to ensure our content meets your needs. Please submit your feedback on which of these formats do you find most beneficial, and are there any specific topics you’re interested in https://aka.ms/PublicContentFeedback. Note: If you want to stay current with Defender for Cloud and receive updates in your inbox, please consider subscribing to our monthly newsletter: Microsoft Forms Continue reading...
-
WF&S Tools > Scan Settings and either edit a profile or add one and make the file type TIF and the resolution as high as it will permit. I believe it is limited to 660 dpi.
- 1 reply
-
- 1
-
- four-point markers
- screen size
-
(and 1 more)
Tagged with:
-
There is no way to get a iso since it is no longer supported. If you did get an ISO you would have a hard time getting a license key for it. Good luck.
-
Hello,dear.i have error in 80072EFE in windows update
AWS replied to a topic in Tech Help and Discussions
This is usually caused by having no internet connection while trying to update. Check that you are connected to the internet.- 1 reply
-
- 1
-
- error 80072efe
- microsoft
-
(and 1 more)
Tagged with:
-
To condense things I removed some of lesser used forums with less than 5 posts. I moved the threads to the General Chat forum. The forums I removed are: Forum Games Members Photo Galleries Photo Editing and Restoration Hobbies In the future they could return if usage warrants it.
-
- forums
- inactivity
-
(and 1 more)
Tagged with:
-
Timeline and Information on the Consolidating of Sites
AWS replied to AWS's topic in Announcements and Information
Shouldn't. In days of old that would happen. Now read markers are persistent with new content only and it's set by date of post. If you were a member of the site being imported then when the account is merged you may indeed see new posts that might be older that you didn't read on the other site. Good question though.- 2 replies
-
- freeepchelp.uk
- import
-
(and 1 more)
Tagged with:
-
When I decided to open Free PC Help Forum I had a plan that included eventually consolidating the other tech sites I owned by importing them into here. I am also going to import my 2 off topic sites into the new Off Topic Forum that I opened alongside this one. My idea was to consolidate all sites into 2. One tech site and one off topic site. Now that I have everything back as it was I am going to start the process of importing the data from the other sites. The sites to be imported are: Computer Support Forums - FreePCHelp.uk Microsoft Forums I will keep you updated to what is happening. The site will be shut off during import. I will keep you updated by leaving a note as to why it's closed and what step the import is at. Thanks much for hanging in there with me.
- 2 replies
-
- freeepchelp.uk
- import
-
(and 1 more)
Tagged with:
-
Navigating the Future with Microsoft Copilot: A Guide for Technical Students Introduction Copilot learning hub Copilot is an AI assistant powered by language models, which offers innovative solutions across the Microsoft Cloud. Find what you, a technical professional, need to enhance your productivity, creativity, and data accessibility, and make the most of the enterprise-grade data security and privacy features for your organization. As a technical student, you’re always on the lookout for tools that can enhance your productivity and creativity. Enter Microsoft Copilot, your AI-powered assistant that’s revolutionizing the way we interact with technology. In this blog post, we’ll explore how Copilot can be a game-changer for your learning and development. Understanding Copilot Microsoft Copilot is more than just an AI assistant; it’s a suite of solutions integrated across the Microsoft Cloud. It’s designed to boost your productivity by providing enterprise-grade data security and privacy features. Whether you’re coding, creating content, or analyzing data, Copilot is there to streamline your workflow. Getting Started with Copilot To get started, dive into the wealth of resources available on the official Copilot page. From curated training and documentation to informative videos and playlists, there’s a treasure trove of knowledge waiting for you. Experiences for everyone Experiences for your business Experiences for your industry Experiences for makers Plugins and development experiences Microsoft Copilot Microsoft Copilot for Microsoft 365 Copilot in Windows Copilot for Security Copilot in Azure (preview) Copilot in Dynamics 365 Business Central Copilot in Customer Insights Copilot in Customers Insights - Journeys Copilot in Dynamics 365 Commerce Copilot in Dynamics 365 Customer Service Copilot in Dynamics 365 Field Service Copilot in Dynamics 365 finance and operations apps Copilot in Dynamics 365 Project Operations Copilot in Dynamics 365 Sales Copilot for Finance Copilot for Sales Copilot for Service Copilot templates for store operations Copilot template for personalized shopping (preview) Copilot in Microsoft Fabric and Power BI (preview) Copilot in Power Apps (preview) Copilot in Power Automate Copilot in Power Pages (preview) Plugins for Microsoft Copilot Microsoft Copilot Studio GitHub Copilot GitHub Copilot Completions for Visual Studio Microsoft Azure AI Studio Customizing Your Experience One of the most exciting aspects of Copilot is its flexibility. You can expand and enrich your Copilot experience with plugins, connectors, or message extensions. Even better, you can build a custom AI copilot using Microsoft Cloud technologies to create a personalized conversational AI experience. Empowering Your Education Copilot isn’t just a tool; it’s a partner in your educational journey. It can assist you in implementing cloud infrastructure, solving technical business problems, and maximizing the value of data assets through visualization and reporting tools. The Copilot Challenge Ready to put your skills to the test? Immerse yourself in cutting-edge AI technology and earn a badge by completing one of the unique, AI-focused challenges available until June 21, 2024. These challenges offer interactive events, expert-led sessions, and training assets to help you succeed. Conclusion Microsoft Copilot is more than just an assistant; it’s a catalyst for innovation and productivity. As a technical student, embracing Copilot can help you stay ahead of the curve and unlock a new era of growth. So, what are you waiting for? Let Copilot guide you through the exciting world of AI and cloud technologies. Learn how to use Microsoft Copilot | Microsoft Learn Continue reading...
-
This is the monthly news from Microsoft. This month deals with Microsoft Defender. There is much good information in this article. I hope you get as much out of it as I did. Microsoft Defender XDR Monthly news June 2024 Edition [attachment=53430:name] This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from May 2024. Legend: [attachment=53431:name] Product videos [attachment=53432:name] Webcast (recordings) [attachment=53433:name] Docs on Microsoft [attachment=53434:name] Blogs on Microsoft [attachment=53435:name] GitHub [attachment=53436:name] External [attachment=53437:name] Improvements [attachment=53438:name] Previews / Announcements Unified Security Operations Platform: Microsoft Defender XDR & Microsoft Sentinel [attachment=53439:name] Host Microsoft Defender data locally in Switzerland. We are pleased to announce that local data residency support in Switzerland is now generally available for Defender for Endpoint and Defender for Identity. [attachment=53440:name] Create custom detections that include both Microsoft Sentinel and Defender XDR data. With the Unified Security Operations Platform, you are now able to create a customizable detection to look across both Microsoft Sentinel and Defender XDR data, without requiring any additional ingestion, via Custom detections. You will no longer have to duplicate data across both environments to ensure you are capturing what is necessary. Analytics rules will continue to work on any data ingested into Microsoft Sentinel. Learn more in our documentation. [attachment=53441:name] Advanced hunting query API via Graph API is now available for log analytics data! A new optional parameter "timespan" for the Graph API was added and allows you to query your log analytics data for any lookback time, not only for 30 days. This new parameter is not yet documented, but will get added to this link. [attachment=53442:name] SOC optimization: unlock the power of precision-driven security management. A new experience and API is currently in public preview – Microsoft Sentinel’s SOC Optimization, designed to empower security teams with precision-driven management capabilities. Read the announcement blog, and watch the webinar with a live demo. [attachment=53443:name]SOC optimization - Unified Security Operations Platform [attachment=53444:name] New Ninja show episodes: New Defender XDR Copilot for Security Capabilities: Tune into this episode to learn the latest advancements, now available in the April release of Copilot for Security GA. We dive into the notable enhancements and new features, such as Guided Response for all incident types, comprehensive device and file summaries, end-user communications, and much more.Answering Your Questions: Attack Disruption Explained: Attack Disruption is an automated response feature, designed to contain an ongoing attack quickly and effectively by leveraging high-confidence signals from both Microsoft Defender and non-Microsoft products. This episode addressees the most frequently asked questions about Attack Disruption and shares clarifications on its functionality. Microsoft Security Exposure Management [attachment=53445:name] Respond to trending threats and adopt zero-trust with Exposure Management. This blog post shares updates to Security Initiatives and also gives a heads up about a few updates to attack path analysis. Microsoft Security Experts [attachment=53446:name] A BlackByte Ransomware intrusion case study. This blog details an investigation into a ransomware event. During this intrusion the threat actor progressed through the full attack chain, from initial access through to impact, in less than five days, causing significant business disruption for the victim organization. [attachment=53447:name] Recover an Active Directory Certificate Services (ADCS) platform from compromise. This blog describes comprehensive backup and restore strategies for ensuring swift recovery and restoration of essential certificate services following a cyberattack or data breach. [attachment=53448:name] Hunting for MFA manipulations in Entra ID tenants using KQL. This blog describes how to use Kusto Query Language (KQL) to parse and hunt for MFA modifications in Microsoft Entra audit logs. By the end of this blog, you will have a better understanding of how to track MFA changes in compromised tenants using KQL queries and how to improve your cloud security posture. [attachment=53449:name] Microsoft Defender Experts Services Expanded Coverage Upcoming Preview. The upcoming preview of our Defender Experts services expanded coverage scheduled for June 2024 extends the capabilities to include customers’ cloud estates with servers and virtual machines running in Microsoft Azure and on-premises via Defender for Servers in Microsoft Defender for Cloud. In addition, our coverage will utilize third-party network signals to enhance investigations, create more avenues to generate leads for comprehensive threat hunting, and accelerate response earlier in the attack chain. Microsoft Defender for Endpoint [attachment=53450:name] Simplify triage with the new Alert Timeline. This blog introduces the latest feature to our rich reporting feature set - the alert timeline - a new view that minimizes the time needed for triage and investigation without compromising the quality of analysis. [attachment=53451:name] Offline Security Intelligence Update is now generally available. Organizations can now update security intelligence (also referred to as “signatures”) on Linux endpoints with limited or no exposure to the internet using a local hosting server. Details in this blog. [attachment=53452:name] Update: The Microsoft Defender for Endpoint plug-in for Windows Subsystem for Linux (WSL) is generally available as of 05/23/2024. Details in this blog. [attachment=53453:name] Update: The streamlined device connectivity experience is generally available as of 5/8/2024. Details in this blog. Microsoft Defender for Identity [attachment=53454:name] Easily detect CVE-2024-21427 with Defender for Identity. This blog details the new activity added to the Advanced Hunting experience in the Defender portal which can help you spot potential attempts to exploit this vulnerability. Microsoft Defender for Cloud Apps [attachment=53455:name] App Governance capabilities are now available in GCCH & DoD. App Governance capabilities in Defender for Cloud Apps are now available to opt-in in GCCH& DoD - go ahead and enable it to increase your app protection. [attachment=53456:name] Defender for Cloud Apps now provides new in-browser protection capabilities via Microsoft Edge to enable security teams to seamlessly manage how a user can interact with in-app data based on their risk profile. The in-browser protection removes the need for proxies, improving both security and productivity, based on session policies that are applied directly to the browser. Details in this blog. [attachment=53457:name]A block message from Defender for Cloud Apps to prevent the download of a sensitive file within the Edge browser Microsoft Defender for Office 365 [attachment=53458:name] Automated responses to users via Automated Investigation and Response (AIR) is now generally available. Details in this blog. [attachment=53459:name] Enhanced Response Action Experience from Threat Explorer. You can now take multiple actions at the same time on messages via Threat Explorer. This feature makes it easier and faster for SecOps to deal with email threats by giving you logical grouping of actions, contextual availability of actions, and support for tenant level block URLs and files. Details in this blog. [attachment=53460:name] Email Protection Basics in Microsoft 365 Part Five: Mastering Overrides. This blog is the fifth and final part of the "email protection basics" blog series, and it covers the different overrides, why you may need them, and why it isn’t a good idea to keep them permanently. Microsoft Security Blogs [attachment=53461:name] “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps. Microsoft discovered a high impact vulnerability pattern found in popular Android applications that a malicious app can leverage along with an advanced & previously to compromise vulnerable apps on the same device, potentially leading to account credentials, tokens, sensitive data. [attachment=53462:name] Threat actors misusing Quick Assist in social engineering attacks leading to ransomware. Microsoft Threat Intelligence has observed Storm-1811 misusing the client management tool Quick Assist to target users in social engineering attacks that led to malware like Qakbot followed by Black Basta ransomware deployment. [attachment=53463:name] Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks. Moonstone Sleet is observed to set up fake companies and job opportunities to engage with potential targets, employ trojanized versions of legitimate tools, create a malicious game, and deliver a new custom ransomware. Continue reading...
-
We continue to expand the Microsoft AppSource ecosystem. For this volume, 54 new offers successfully met the onboarding criteria and went live. See details of the new offers below: [HEADING=2]Get it now in our marketplace[/HEADING] [attachment=53295:name] CCH SureAddress for CCH SureTax: This offer from Wolters Kluwer validates addresses individually or in bulk for Microsoft Dynamics 365. CCH SureAddress validates the following: company information page, location page/list, customer page/list, vendor page/list, ship-to address page/list, order address page/list, bank account page/list, contact page/list, responsibility center page/list, and job page/list. Available in English for the United States and Canada. [attachment=53296:name] Hive Streaming Silent Test: This offer from Hive Streaming allows for flawless execution of live video events while reducing bandwidth load and ensuring high-quality video for all employees. Prerequisites include suitable applications for script distribution and online participation. Supported systems include Microsoft Windows and MacOS, with supported browsers including Microsoft Edge, Google Chrome, and Firefox. [attachment=53297:name] Nextuple OMS Studio: Nextuple OMS Studio is a modular, microservice-based platform that enhances legacy order management systems by offering advanced inventory and promising, order orchestration, and store fulfillment capabilities. The platform offers multiple deployment and ownership options, package and bespoke implementations, and consulting/services for business and tech strategy. [attachment=53298:name] Proventeq Content Productivity Suite - Copilot Edition: This offer from Proventeq helps organizations transition to an intelligent workplace with AI-powered tools for content understanding, classification, and automation. It includes a copilot accelerator for security and compliance readiness, graph connectors, copilot plugins, and custom generative AI solutions. The suite supports popular enterprise content management systems and facilitates migration projects. [attachment=53299:name] Reminders by Udyamo: Reminders by Udyamo is a task management and team collaboration tool for Microsoft Teams. It offers seamless integration, customizable reminders, an intuitive interface, enhanced collaboration, and centralized management. It's a valuable tool for managing reminders efficiently and fostering better coordination among team members. [attachment=53300:name] Fluentis Standard ERP: This offer from Fluentis is a comprehensive solution for small- and medium-sized enterprises, covering all main application areas from administration to logistics management. It includes modules for finance, treasury, controlling, purchase, sales, and logistics. The system offers automation and speed in communication with banks and accounting for transactions, and helps increase productivity and efficiency by optimizing storage and goods flows. [attachment=53301:name] TRaaS Plugins: From Numonix, this Microsoft Teams recording as a service (TRaaS) plugin for the Recorder Panel Base Cost plan allows for secure recording and muting functionality for compliance regulation. It can be used for calls that are being recorded automatically or recorded on-demand. Muting is triggered when using the native Teams app, maintaining total integrity of the recording. [HEADING=2]Go further with workshops, proofs of concept, and implementations[/HEADING] [attachment=53302:name] BCN Power BI Managed Services: This offer from BCN Group features flexible options to support, develop, and improve Microsoft Power BI environments. BCN provides ongoing support, dedicated developer time, and a set number of developers assigned to the account. BCN's certified Power BI developers work with customers to provide strategy support, unlimited development time within business hours, and development of reports and dashboards. [attachment=53303:name] Enterprise Analytics with Microsoft Fabric: 1-Week Workshop: Ventagium Data Consulting's Analytics Roadmap Workshop helps organizations become data-driven by integrating disparate data sources, establishing an analytics strategy, identifying prioritized capabilities and solutions, and assessing the initial top priority capability and its related solutions with a definition of potential benefits, success criteria, deliverables, and implementation. [attachment=53304:name] Microsoft 365 Copilot - Extensibility Solutions: Microsoft 365 Copilot offers extensibility solutions for developers to customize the Copilot experience within Microsoft 365. Noventiq provides services to enhance the Copilot experience, including assessment, use case identification, implementation, and verification and transition. Noventiq's expertise in generative AI and large language models can improve Copilot's capabilities. [attachment=53305:name] Microsoft 365 Optimization: Microsoft 365 offers advanced device management, security, and online services for productivity, collaboration, and communication. However, unoptimized environments can lead to licensing, administrative, security, mailbox, and governance risks. This offer from Wanstor helps ensure proper licensing, user management, security measures, and governance policies to avoid these risks. [attachment=53306:name] Microsoft Copilot: 5-Day Workshop: Maximize your Microsoft 365 investment with Axians Digital Solutions' tailored consulting services for Microsoft Copilot. Our team assesses readiness, identifies use cases, provides training, establishes best practices, monitors and evaluates security and compliance, and helps optimize documentation and knowledge sharing. [attachment=53307:name] Microsoft Copilot for Security Rapid Onboarding Program: 4-Week Implementation: Tech One Global Philippines offers a rapid onboarding program for Microsoft Copilot for Security. Its process includes assessment, planning, implementation, testing, training, and continuous monitoring. The program provides customized solutions, expert guidance, and ongoing support to enhance an organization's security posture. [attachment=53308:name] Microsoft Teams Calling: 6-Week Implementation: This offer from Global Computing and Telecoms outlines a six-week plan for successful adoption of Microsoft Teams in an organization. It includes assessing network readiness, defining adoption goals, targeted communication, creating use cases, and engaging champions. The focus is on driving adoption through tangible use cases and peer recommendations. [attachment=53309:name] Windows 365 Proof of Concept: Microsoft Windows 365 is a cloud-based desktop and application platform that allows employees to work from anywhere while keeping the same desktop experience. Wanstor provides a solution to help organizations overcome the challenges of traditional IT management and embrace the benefits of Windows 365, including simplified onboarding, enhanced security, scalability, predictable costs, and automated patch management. [HEADING=2]Contact our partners[/HEADING] 180ops - Revenue Intelligence SaaS for B2B Enterprises 9Ways IX-FE ADS Data Exchange 01 ai-omatic - Digital Maintenance Assistant for Machines (SaaS Solution) AL Foundation App IT ARBENTIA fApptory AskAny - AI for Retails Automatic Import of F&O PDF Orders Biomass Solution Connector 365 E-Documents Validator FaceMatch Global Campus Grant Management Knowledge Management with AI LegalDesk for Outlook Levridge for Agriculture Localization Argentina for Dynamics 365 Business Central m+m Ext. Text Module with Production Order Job Overview Managed Detection and Response Services Powered by Sentinel and AIsaac MentorCloud Microsoft Copilot for Security Readiness Assessment: 4-Week Assessment Microsoft Copilot Readiness Minuba Connector Nextome PI Conteksto Power Insight Embedded Production Instructions Protrak Low-Code Application Platform Rezzy Showell for Dynamics Skysnag Protect Speechify AI Studio TPG ProjectPowerPack TruNorth Dynamics Power Platform Discovery VAX Transfer 365 App Verbamatic Workforce Optimization XpensePro Canvas App YoungWilliams Priya This content was generated by Microsoft Azure OpenAI and then revised by human editors. Continue reading...
-
FPCHF is mostly back. Still have to tidy up a few things.
-
Try these steps to see if it fixes the issue. Post back if that doesn't help.