並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 16 件 / 16件

新着順 人気順

https account microsoft com services and subscriptionsの検索結果1 - 16 件 / 16件

  • AWS 認定 ソリューションアーキテクト – プロフェッショナル(AWS Certified Solutions Architect – Professional)の学習方法 - NRIネットコムBlog

    小西秀和です。 この記事は「AWS認定全冠を維持し続ける理由と全取得までの学習方法・資格の難易度まとめ」で説明した学習方法を「AWS 認定 ソリューションアーキテクト – プロフェッショナル(AWS Certified Solutions Architect – Professional)」に特化した形で紹介するものです。 重複する内容については省略していますので、併せて元記事も御覧ください。 また、現在投稿済の各AWS認定に特化した記事へのリンクを以下に掲載しましたので興味のあるAWS認定があれば読んでみてください。 ALL SAP DOP SCS ANS MLS SAA DVA SOA DEA MLA AIF CLF 「AWS 認定 ソリューションアーキテクト – プロフェッショナル」とは 「AWS 認定 ソリューションアーキテクト – プロフェッショナル(AWS Certified

      AWS 認定 ソリューションアーキテクト – プロフェッショナル(AWS Certified Solutions Architect – Professional)の学習方法 - NRIネットコムBlog
    • GitHub - modelcontextprotocol/servers: Model Context Protocol Servers

      Official integrations are maintained by companies building production ready MCP servers for their platforms. 21st.dev Magic - Create crafted UI components inspired by the best 21st.dev design engineers. 2slides - An MCP server that provides tools to convert content into slides/PPT/presentation or generate slides/PPT/presentation with user intention. ActionKit by Paragon - Connect to 130+ SaaS inte

        GitHub - modelcontextprotocol/servers: Model Context Protocol Servers
      • Microsoft Entra security operations guide - Microsoft Entra

        Microsoft has a successful and proven approach to Zero Trust security using Defense in Depth principles that use identity as a control plane. Organizations continue to embrace a hybrid workload world for scale, cost savings, and security. Microsoft Entra ID plays a pivotal role in your strategy for identity management. Recently, news surrounding identity and security compromise has increasingly pr

          Microsoft Entra security operations guide - Microsoft Entra
        • The Story of Heroku | Lee Robinson

          The Story of Heroku May 2022 – Lee Robinson Heroku made it easy for any developer to build and run applications in the cloud without managing their own infrastructure. Now 15 years later, it continues to inspire the next generation of developers. Why did Heroku become so popular? What can we learn from their incredible developer experience? How is Heroku shaping the next generation of serverless?

            The Story of Heroku | Lee Robinson
          • Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability | Microsoft Security Blog

            January 10, 2022 recap – The Log4j vulnerabilities represent a complex and high-risk situation for companies across the globe. This open-source component is widely used across many suppliers’ software and services. By nature of Log4j being a component, the vulnerabilities affect not only applications that use vulnerable libraries, but also any services that use these applications, so customers may

              Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability | Microsoft Security Blog
            • DeepSeek FAQ

              An End of Year Mailbag: Fox Feelings, Pistons Hate, Hartenstein Sliding Doors, SGA Meets His Hero, and Lots More It’s Monday, January 27. Why haven’t you written about DeepSeek yet? I did! I wrote about R1 last Tuesday. I totally forgot about that. I take responsibility. I stand by the post, including the two biggest takeaways that I highlighted (emergent chain-of-thought via pure reinforcement le

                DeepSeek FAQ
              • An Interview with OpenAI CEO Sam Altman About Building a Consumer Tech Company

                It’s Trae Day in Washington D.C., The End of An Era in Atlanta, Will AD Move Next? Good morning, This Stratechery interview is technically another installment of the Stratechery Founder series; OpenAI is a startup, which means we don’t have real data about the business. At the same time, OpenAI is clearly one of the defining companies of this era, and potentially historically significant. To that

                  An Interview with OpenAI CEO Sam Altman About Building a Consumer Tech Company
                • MERCURY and DEV-1084: Destructive attack on hybrid environment | Microsoft Security Blog

                  April 2023 update – Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. MERCURY is now tracked as Mango Sandstorm and DEV-1084 is now tracked as Storm-1084. To learn more about the new taxonomy represents the origin, unique traits, and impact of threat actors, to get complete mapping of threat actor names, read this blog: Microsoft s

                    MERCURY and DEV-1084: Destructive attack on hybrid environment | Microsoft Security Blog
                  • The Success of Third-Party Apps on the App Store

                    Support for this study was provided by Apple. The conclusions and opinions expressed are exclusively those of the authors. The Success of Third-Party Apps on the App Store Juliette Caminade, Ph.D. Markus von Wartburg, Ph.D. April 2022 The Success of Third-Party Apps on the App Store 1 In recent years, the role of “big tech” in shaping options for developers, content creators, and users in digital

                    • Microsoft Word - dsdsdsdds

                      The Ultimate Guide: Can You Cancel Netflix on Your TV? (And How to Do It Right) In an age of streamlined digital services, the expectation for convenience is higher than ever. We manage our lives from our smartphones 1-(855)-503-4879 AnD (855$50$4879), order groceries from our tablets, and control our home thermostats with our voices. It's natural, then, to assume that canceling a subscription ser

                      • Technology Trends for 2024

                        This has been a strange year. While we like to talk about how fast technology moves, internet time, and all that, in reality the last major new idea in software architecture was microservices, which dates to roughly 2015. Before that, cloud computing itself took off in roughly 2010 (AWS was founded in 2006); and Agile goes back to 2000 (the Agile Manifesto dates back to 2001, Extreme Programming t

                          Technology Trends for 2024
                        • Copilot - Terms of Use

                          We’ve clarified when these Terms apply to certain Copilot services and experiences.We’ve added terms for Copilot Actions, Copilot Labs, and Shopping experiences.We’ve revised our Code of Conduct to clarify how you can and can’t use Copilot.We’ve rewritten and reorganized our Terms to be clearer and simpler. IF YOU LIVE IN (OR YOUR PRINCIPAL PLACE OF BUSINESS IS IN) THE UNITED STATES, PLEASE READ T

                            Copilot - Terms of Use
                          • カバーで行っているAIの取り組みを紹介|カバー株式会社 公式note

                            こんまっする~!⚔️ カバー株式会社CTO室のIです。カバー株式会社では組織横断的にSREやCCoEのエンジニアをしています。 カバー株式会社のCTO室のミッションの一つに、プロダクト開発チームの代わりに新しい技術の導入や検証を行いそれを組織全体へ還元することがあります。 今回は、社内で検証を行っているLLM/Generative AIを開発へ活用する取り組みの一部をご紹介します。 まず、社内でAI活用に関してヒアリングを行ったところ需要が大きかったユースケースが下記の2つでした。 コード生成 仕様書やコードをデータソースにした仕様の返答が可能なチャットボット コード生成に関しては既に、GitHub Copilot for Businessの導入が進んでいたため検証ではチャットボットサービスを探すこととなりました。 チャットボットといえば名前の上がるのがChatGPTですが、ChatGPT

                              カバーで行っているAIの取り組みを紹介|カバー株式会社 公式note
                            • NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog

                              The Microsoft Threat Intelligence Center (MSTIC) has detected nation-state activity associated with the threat actor tracked as NOBELIUM, attempting to gain access to downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations (referred to as “service providers” for the rest of this blog) that have been granted administrative

                                NOBELIUM targeting delegated administrative privileges to facilitate broader attacks | Microsoft Security Blog
                              • One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens

                                While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. This vulnerability could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments1). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulne

                                • Kubernetes

                                  No results found. Try a different search term, or use our global search. Overview Get started Implementation guides Overview Secure your Internet traffic and SaaS apps ↗ Replace your VPN ↗ Deploy clientless access ↗ Secure Microsoft 365 email with Email security ↗ Holistic AI security with Cloudflare One ↗ Insights Overview Analytics overview Dashboards Overview Access event analytics Gateway anal

                                    Kubernetes
                                  1