並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 26 件 / 26件

新着順 人気順

https account microsoft com devices backupの検索結果1 - 26 件 / 26件

  • Announcing Microsoft Copilot, your everyday AI companion - The Official Microsoft Blog

    All Microsoft Global Microsoft 365 Azure Copilot Windows Surface Xbox Deals Small Business Support Software Windows Apps Outlook OneDrive Microsoft Teams OneNote Microsoft Edge Moving from Skype to Teams PCs & Devices Computers Shop Xbox Accessories VR & mixed reality Certified Refurbished Trade-in for cash Entertainment Xbox Game Pass Ultimate PC Game Pass Xbox games PC games Business Microsoft A

      Announcing Microsoft Copilot, your everyday AI companion - The Official Microsoft Blog
    • GitHub - modelcontextprotocol/servers: Model Context Protocol Servers

      Official integrations are maintained by companies building production ready MCP servers for their platforms. 21st.dev Magic - Create crafted UI components inspired by the best 21st.dev design engineers. 2slides - An MCP server that provides tools to convert content into slides/PPT/presentation or generate slides/PPT/presentation with user intention. ActionKit by Paragon - Connect to 130+ SaaS inte

        GitHub - modelcontextprotocol/servers: Model Context Protocol Servers
      • awesome-scalability

        The Patterns of Scalable, Reliable, and Performant Large-Scale Systems View the Project on GitHub View On GitHub An updated and organized reading list for illustrating the patterns of scalable, reliable, and performant large-scale systems. Concepts are explained in the articles of prominent engineers and credible references. Case studies are taken from battle-tested systems that serve millions to

        • Are Passkeys really the beginning of the end of passwords? I certainly hope not!

          Are Passkeys really the beginning of the end of passwords? I certainly hope not! Published on 2023-11-09. As of late, Passkeys are promoted as the killer of passwords and a lot of companies are now manically transitioning from passwords to Passkeys. I don't think that is a good idea. For decades now, security experts have emphasized the importance of creating strong and unique passwords yet to no

          • 7 Reasons Not to Switch to Windows From macOS

            It has been over two decades since Apple released the first version of its now-iconic operating system, macOS. In that time, it has undergone many changes and improvements, becoming one of the most popular and user-friendly operating systems out there. Whether you're a new macOS user or a veteran who is simply fed up with it, you should consider a few reasons to keep using it before switching to a

              7 Reasons Not to Switch to Windows From macOS
            • How Does Windows 11's New Backup Feature Work?

              The backup options available to you in Windows have evolved with time. Legacy options offered creating a complete copy of the Windows PC or backing up some folders, but the new ones shifted to cloud backup options. However, Microsoft is testing a full-fledged app for creating and managing backups. Instead of manually copying every file or creating a gigantic system image, you can manage backups of

                How Does Windows 11's New Backup Feature Work?
              • Announcing Windows 11 Insider Preview Build 25905

                Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 25905 to the Canary Channel. We are releasing ISOs for this build – they can be downloaded here. Starting with today’s build, Windows Insiders in the Canary Channel will notice that the name of the branch shown in the desktop watermark has changed back to RS_PRERELEASE. As a result of this change, Insiders will notice

                  Announcing Windows 11 Insider Preview Build 25905
                • Annotated history of modern AI and deep neural networks

                  For a while, DanNet enjoyed a monopoly. From 2011 to 2012 it won every contest it entered, winning four of them in a row (15 May 2011, 6 Aug 2011, 1 Mar 2012, 10 Sep 2012).[GPUCNN5] In particular, at IJCNN 2011 in Silicon Valley, DanNet blew away the competition and achieved the first superhuman visual pattern recognition[DAN1] in an international contest. DanNet was also the first deep CNN to win

                    Annotated history of modern AI and deep neural networks
                  • Local-first software: You own your data, in spite of the cloud

                    Cloud apps like Google Docs and Trello are popular because they enable real-time collaboration with colleagues, and they make it easy for us to access our work from all of our devices. However, by centralizing data storage on servers, cloud apps also take away ownership and agency from users. If a service shuts down, the software stops functioning, and data created with that software is lost. In t

                    • Security Best Practices for LLM Applications in Azure

                      Security Best Practices for GenAI Applications (OpenAI) in Azure Introduction GenAI applications are those that use large language models (LLMs) to generate natural language texts or perform natural language understanding tasks. LLMs are powerful tools that can enable various scenarios such as content creation, summarization, translation, question answering, and conversational agents. However, LLM

                        Security Best Practices for LLM Applications in Azure
                      • Cisco Talos shares insights related to recent cyber attack on Cisco

                        Cisco Talos shares insights related to recent cyber attack on Cisco Executive summaryOn May 24, 2022, Cisco became aware of a potential compromise. Since that point, Cisco Security Incident Response (CSIRT) and Cisco Talos have been working to remediate.During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Go

                          Cisco Talos shares insights related to recent cyber attack on Cisco
                        • A Yubico FAQ about passkeys

                          In March, we published a blog called “YubiKeys, passkeys and the future of modern authentication” which took a look at the evolution of authentication from when we first introduced the YubiKey back in 2008, to where the industry is heading with the adoption and adaptation of WebAuthn/FIDO authentication. In recent months, there have been several news cycles about “passkeys.” This has caused some e

                            A Yubico FAQ about passkeys
                          • 6 Ways to Transfer Photos From iPhone to Mac

                            iPhones come with gigabytes of storage space now. It can also deftly handle many image editing tasks you throw it. But there will come a time when you might want to transfer photos from the iPhone to the Mac and edit them on more robust software. Or, clear space on your iPhone by transferring photos in bulk and archiving them on your Mac instead. This article shows you how to transfer photos from

                              6 Ways to Transfer Photos From iPhone to Mac
                            • 7 Things to Do Before Selling Your Old Android Phone

                              The average lifespan of a smartphone is usually about three years. After that, the battery life becomes bothersome and most OEMs stop providing software updates. That's also when most people ditch their old phone to upgrade to a new model. If you're looking to sell your Android phone but are unsure how to go about it, this guide will help you through the whole process. Simply follow the steps belo

                                7 Things to Do Before Selling Your Old Android Phone
                              • Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog

                                Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors. ESXi is a bare-metal hypervisor that is installed directly onto a physical server and provides direct access and control of underlying resources. ESXi hypervisors host virtual machines that may include

                                  Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog
                                • Microsoft warns Windows 11 25H2, 24H2 October update triggers BitLocker recovery on PCs for businesses

                                  Microsoft confirmed an issue that could trigger BitLocker Recovery on Windows 11 25H2, 24H2 and even Windows 10. It means you could be asked to enter your BitLocker recovery key. But if you don’t have the key, you will lose all of your data. However, the BitLocker key is always synced to the Microsoft account (MSA). BitLocker is a security feature turned on by default in Windows 11 24H2 and 25H2.

                                    Microsoft warns Windows 11 25H2, 24H2 October update triggers BitLocker recovery on PCs for businesses
                                  • Expert used ChatGPT-4o to create a replica of his passport in just 5 minutes bypassing KYC

                                    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 41 | Security Affairs newsletter Round 519 by Pierluigi Paganini – INTERNATIONAL EDITION | China admitted its role in Volt Typhoon cyberattacks on U.S. infrastructure | Symbolic Link trick lets attackers bypass FortiGate patches, Fortinet warns | Attackers are exploiting recently disclosed OttoKit WordPress plugin flaw | Laboratory Services Cooperative dat

                                      Expert used ChatGPT-4o to create a replica of his passport in just 5 minutes bypassing KYC
                                    • Passkeys are incompatible with open-source software (was: “Passkey marketing is lying to you”) – Smoking on a Bike

                                      Passkeys are incompatible with open-source software (was: “Passkey marketing is lying to you”) TechAndrew Saturday, 4 January 2025 Update: After reading more of the spec authors’ comments on open-source Passkey implementations, I cannot support this tech. In addition to what I covered at the bottom of this blog post, I found more instances where the spec authors have expressed positions that are i

                                      • GitHub - taishi-i/awesome-ChatGPT-repositories: A curated list of resources dedicated to open source GitHub repositories related to ChatGPT and OpenAI API

                                        awesome-chatgpt-api - Curated list of apps and tools that not only use the new ChatGPT API, but also allow users to configure their own API keys, enabling free and on-demand usage of their own quota. awesome-chatgpt-prompts - This repo includes ChatGPT prompt curation to use ChatGPT better. awesome-chatgpt - Curated list of awesome tools, demos, docs for ChatGPT and GPT-3 awesome-totally-open-chat

                                          GitHub - taishi-i/awesome-ChatGPT-repositories: A curated list of resources dedicated to open source GitHub repositories related to ChatGPT and OpenAI API
                                        • Destructive malware targeting Ukrainian organizations | Microsoft Security Blog

                                          June 2023 update – For more information about Cadet Blizzard’s tooling, victimology, and motivation, read this blog: Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog April 2023 update – Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. DEV-0586 is now tracked as Cadet Blizzard. Microsoft

                                            Destructive malware targeting Ukrainian organizations | Microsoft Security Blog
                                          • xv6: a simple, Unix-like teaching operating system

                                            xv6: a simple, Unix-like teaching operating system Russ Cox Frans Kaashoek Robert Morris September 6, 2021 2 Contents 1 Operating system interfaces 9 1.1 Processes and memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.2 I/O and File descriptors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1.3 Pipes . . . . . . . . . . . . . . . . . . . . . . . . . .

                                            • Introducing Windows Local Administrator Password Solution with Microsoft Entra (Azure AD) | Microsoft Community Hub

                                              Introducing Windows Local Administrator Password Solution with Microsoft Entra (Azure AD) Howdy folks, Today we have some news I know many of you will be excited about! As part of our vision to give you comprehensive security solutions, we’ve joined forces with the Windows and Microsoft Intune teams to release a public preview of Windows Local Administrator Password Solution (LAPS) for Azure AD (w

                                                Introducing Windows Local Administrator Password Solution with Microsoft Entra (Azure AD) | Microsoft Community Hub
                                              • People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection | CISA

                                                The actor has executed WMIC commands [T1047] to create a copy of the ntds.dit file and SYSTEM registry hive using ntdsutil.exe. Each of the following actor commands is a standalone example; multiple examples are provided to show how syntax and file paths may differ per environment. wmic process call create "ntdsutil \"ac i ntds\" ifm \"create full C:\Windows\Temp\pro wmic process call create "cmd.

                                                  People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection | CISA
                                                • Announcing Windows 11 Insider Preview Build 23493

                                                  Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 23493 to the Dev Channel. What’s new in Build 23493 Windows Copilot Preview [UPDATE 7/13] The Windows Copilot Preview is now available to all Windows Insiders in the Dev Channel. Insiders may need to reboot to have it show up. Back in May at the Build conference, we introduced Windows Copilot for Windows 11. In today’s

                                                    Announcing Windows 11 Insider Preview Build 23493
                                                  • GitHub - ComfyUI-Workflow/awesome-comfyui: A collection of awesome custom nodes for ComfyUI

                                                    ComfyUI-Gemini_Flash_2.0_Exp (⭐+172): A ComfyUI custom node that integrates Google's Gemini Flash 2.0 Experimental model, enabling multimodal analysis of text, images, video frames, and audio directly within ComfyUI workflows. ComfyUI-ACE_Plus (⭐+115): Custom nodes for various visual generation and editing tasks using ACE_Plus FFT Model. ComfyUI-Manager (⭐+113): ComfyUI-Manager itself is also a cu

                                                      GitHub - ComfyUI-Workflow/awesome-comfyui: A collection of awesome custom nodes for ComfyUI
                                                    • Azure status history | Microsoft Azure

                                                      Post Incident Review (PIR) – Azure OpenAI – GPT-5.2 availability degradation in 7 regions Watch our 'Azure Incident Retrospective' video about this incident: https://aka.ms/air/8GCS-858 What happened? Between 23:20 UTC on 9 March and 19:32 UTC on 10 March 2026, a platform issue resulted in impact to the Azure OpenAI Service. Impacted customers experienced HTTP 400 and HTTP 429 error responses, spe

                                                      1