Notebook Views in Azure Data Studio | Data Exposed
This article is contributed. See the original author and article here.
Resources:
This article is contributed. See the original author and article here.
This article is contributed. See the original author and article here.
Microsoft Viva Topics brings knowledge to workers in the apps they use every day. We’re continuing to build new capabilities for Viva Topics. Our most recent update is integration with Yammer.

Yammer is integrating with and adopting Viva Topics to make community-sourced knowledge easily accessible across an organization and support a consistent experience in Microsoft 365. Among others, this provides the following benefits for an organization:
Users with the appropriate licensing will see topics in Yammer enhanced with Viva Topics experiences, such as topic cards, while unlicensed users can continue to use topics in Yammer the way they are used to. Only Yammer networks in Native Mode networks are eligible for the premium Viva Topics experiences. Learn more about the Yammer Topic API changes in this article.
We’ll continue to expand Microsoft Viva’s capabilities. Keep an eye out for new blog posts or register for our newsletter to stay up to date on the latest feature releases.
This article was originally posted by the FTC. See the original article here.

During Medicare’s Open Enrollment Period (OEP), which begins on October 15 and ends December 7, Medicare beneficiaries can choose the plans that are best for them for 2022. You can get help comparing Medicare plans from your local State Health Insurance Assistance Program (SHIP), available in each U.S. state, territory, and the District of Columbia. Private insurance companies administer, market, and sell Medicare Advantage (MA, Part C) and Medicare Prescription Drug Plans (Part D), so it’s important to understand your rights and some of the limits on marketing. That way you’ll be prepared if an insurance broker or agent tries to enroll you in a Medicare plan that isn’t right for you.
Know your rights
If you request an appointment with an agent to visit or call to talk about your Medicare coverage options, remember you have certain rights and agents must follow the law:
After you pick the plan that’s right for you, be sure you get all the details in writing before you sign up. Take your time to read all information and verify details. For example, before you sign up, reach out to your doctors to ensure they are in that plan’s network.
Report a marketing violation
There are limits on how companies and agents selling Medicare plans can contact you and what they can say. For example:
If you notice one of these marketing violations, please tell your local Senior Medicare Patrol.
Protect your medical information
Scammers might call and pretend to be Medicare representatives or agents in an attempt to steal your Medicare number or other personal information. They can use a fake CallerID name to impersonate Medicare or another organization you know. Don’t trust the name displayed on your phone’s CallerID screen. If anyone calls and asks for your Medicare, Social Security, or bank or credit card information, hang up. A scammer can use your personal information to file false claims, sign you up for a plan to which you didn’t agree, or even steal your identity.
For more information and help reporting Medicare fraud, errors, or abuse, visit smpresource.org or call 1-877-808-2468. To report an impersonator who pretended to be from Medicare, call 1-800-MEDICARE and visit ReportFraud.ftc.gov. If you think someone misused your personal or financial information, report it at IdentityTheft.gov and get started on a recovery plan.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
This article is contributed. See the original author and article here.
The Apache Software Foundation has released a security advisory to address a vulnerability in multiple versions of Tomcat. An attacker could exploit this vulnerability to cause a denial of service condition.
CISA encourages users and administrators to review Apache’s security advisory for CVE-2021-42340 and apply the necessary updates.
This article was originally posted by the FTC. See the original article here.
negative impact on communities of color. And, it confirms the FTC’s commitment to continue this important work.

Law enforcement: The FTC filed more than 25 actions involving alleged conduct that either targeted or disproportionately impacted communities of color. Cases challenged unlawful practices by auto sellers, for-profit schools, money-making opportunities, student debt relief schemes, and more.
Research: FTC research shows that people in communities of color experience fraud and consumer problems in unique ways. For example:
Outreach: Sharing relevant, clear, and in-language consumer protection information through people and groups trusted in communities of color is essential to reaching those communities.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
This article is contributed. See the original author and article here.
CISA, the Federal Bureau of Investigation (FBI), the Environmental Protection Agency (EPA), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) that details ongoing cyber threats to U.S. Water and Wastewater Systems (WWS) Sector. This activity—which includes cyber intrusions leading to ransomware attacks—threatens the ability of WWS facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities. The joint CSA provides extensive mitigations and resources to assist WWS Sector facilities in strengthening operational resilience and cybersecurity practices.
CISA has also released a Cyber Risks & Resources for the Water and Wastewater Systems Sector infographic that details both information technology and operational technology risks the WWS Sector faces and provides select resources.
This article is contributed. See the original author and article here.
Immediate Actions WWS Facilities Can Take Now to Protect Against Malicious Cyber Activity
• Do not click on suspicious links.
• If you use RDP, secure and monitor it.
• Use strong passwords.
• Use multi-factor authentication.
Note: This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Agency (CISA), the Environmental Protection Agency (EPA), and the National Security Agency (NSA) to highlight ongoing malicious cyber activity—by both known and unknown actors—targeting the information technology (IT) and operational technology (OT) networks, systems, and devices of U.S. Water and Wastewater Systems (WWS) Sector facilities. This activity—which includes attempts to compromise system integrity via unauthorized access—threatens the ability of WWS facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities. Note: although cyber threats across critical infrastructure sectors are increasing, this advisory does not intend to indicate greater targeting of the WWS Sector versus others.
To secure WWS facilities—including Department of Defense (DoD) water treatment facilities in the United States and abroad—against the TTPs listed below, CISA, FBI, EPA, and NSA strongly urge organizations to implement the measures described in the Recommended Mitigations section of this advisory.
Click here for a PDF version of this report.
WWS facilities may be vulnerable to the following common tactics, techniques, and procedures (TTPs) used by threat actors to compromise IT and OT networks, systems, and devices.
Cyber intrusions targeting U.S. WWS facilities highlight vulnerabilities associated with the following threats:
WWS Sector cyber intrusions from 2019 to early 2021 include:
The FBI, CISA, EPA, and NSA recommend WWS facilities—including DoD water treatment facilities in the United States and abroad—use a risk-informed analysis to determine the applicability of a range of technical and non-technical mitigations to prevent, detect, and respond to cyber threats.
Personnel responsible for monitoring WWS should check for the following suspicious activities and indicators, which may be indicative of threat actor activity:
Note: The increased use of remote operations due to the COVID-19 pandemic increases the necessity for asset owner-operators to assess the risk associated with enhanced remote access to ensure it falls within acceptable levels.
FBI, CISA, EPA, and NSA would like to thank Dragos as well as the WaterISAC for their contributions to this advisory.
CISA offers a range of no-cost cyber hygiene services—including vulnerability scanning and ransomware readiness assessments—to help critical infrastructure organizations assess, identify, and reduce their exposure to cyber threats. By taking advantage of these services, organizations of any size will receive recommendations on ways to reduce their risk and mitigate attack vectors.
The U.S. Department of State’s Rewards for Justice (RFJ) program offers a reward of up to $10 million for reports of foreign government malicious activity against U.S. critical infrastructure. See the RFJ website for more information and how to report information securely.
The StopRansomware.gov webpage is an interagency resource that provides guidance on ransomware protection, detection, and response. This includes ransomware alerts, reports, and resources from CISA and other federal partners, including:
For additional resources that can assist in preventing and mitigating this activity, see:
The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at www.fbi.gov/contact-us/field-offices, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at CyWatch@fbi.gov. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. If you have any further questions related to this Joint Cybersecurity Advisory, or to request incident response resources or technical assistance related to these threats, contact CISA at CISAServiceDesk@cisa.dhs.gov.
Initial Version: October 14, 2021
This product is provided subject to this Notification and this Privacy & Use policy.
This article is contributed. See the original author and article here.
We’re happy to announce the addition of the Azure Cosmos DB Developer Specialty certification to our portfolio, to be released in mid-November 2021.
This new certification is a key step for developers who are ready to prove their expertise supporting their organization’s business goals with modern cloud apps. IT environments where application infrastructure is dated, rigorous, and specialized often cost developers valuable time and resources. Business-critical modern apps require scale, speed, and guaranteed availability, and they need to store ever-increasing volumes of data—all while delivering real-time customer access. Developers who work with Azure Cosmos DB find the tools and security they need to meet these requirements and more to meet today’s business challenges.
You’re a great candidate for the Azure Cosmos DB Developer Specialty certification if you have subject matter expertise designing, implementing, and monitoring cloud-native applications that store and manage data.
Typical responsibilities for developers in this role include designing and implementing data models and data distribution, loading data into a database created with Azure Cosmos DB, and optimizing and maintaining the solution. These professionals integrate the solution with other Azure services. They also design, implement, and monitor solutions that consider security, availability, resilience, and performance requirements.
Professionals in this role have experience developing apps for Azure and working with Azure Cosmos DB database technologies. They should be proficient at developing applications by using the Core (SQL) API and SDKs, writing efficient queries and creating appropriate index policies, provisioning and managing resources in Azure, and creating server-side objects with JavaScript. They should also be able to interpret JSON, read C# or Java code, and use PowerShell.
Developers interested in earning this new certification need to pass Exam DP-420: Designing and Implementing Cloud-Native Applications Using Microsoft Azure Cosmos DB, which will be available in mid-November 2021. If you’re a skilled Azure developer who has experience with Azure Cosmos DB, we encourage you to participate in the beta. Stay tuned for the announcement.
Even though the exam won’t be released until November 2021, you can start preparing for it now:
Are you ready to take your skills to the next level with Azure Cosmos DB? Get ready for Exam DP-420 (beta) and earn your Azure Cosmos DB Developer Specialty certification. Validate that you have what it takes to unlock business opportunities with modern cloud apps—for you, your team, and your organization.
Related posts
This article is contributed. See the original author and article here.
Juniper Networks has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Juniper Networks security advisories page and apply the necessary updates.
This article is contributed. See the original author and article here.
Microsoft Dynamics 365 Business Central is teaming up with Shopify to help our customers create a better shopping experience. While Shopify provides merchants with an easy-to-use e-commerce solution, Dynamics 365 Business Central offers comprehensive business management across finance, sales, service, and operations teams within a single application. Seamless connection between the two systems will synchronize orders, stock, and customer information to ensure merchants can fulfill orders faster and better serve customers. The joint effort furthers the commitment of Dynamics 365 Business Central to connect data to help businesses adapt faster, work smarter, and perform better.
Connecting Dynamics 365 Business Central with Shopify will help merchants all over the world implement more agile online business processes, while keeping people focused on selling. With connected data from across your online stores and business operations, you can rapidly respond to consumer demands to adjust product pricing and merchandising. With support for multi-tier pricing structures and multiple currencies, companies, and entities, Dynamics 365 Business Central will support multiple Shopify store scenarios with ease.
Eliminating manual processes will not only improve accuracy, but also keep your people focused on taking care of customers. By connecting Shopify and Dynamics 365 Business Central, you will improve visibility into stock, pricing, existing customers and order history, order status, billing, and payments. Better visibility means faster customer inquiry responses, timely returns and refunds, and more accurate order processing.
Enhanced operational efficiency not only saves you time and reduces costs but can also translate into better results and faster decision-making. So, you have the confidence to expand your online presence while minimizing overhead with automatic synchronization between systems for price changes, product updates, and customers. At the end of accounting periods, Dynamics 365 Business Central will help merchants handle their financial reporting and tax reporting as required by local legislation.
Microsoft is committed to creating an open ecosystem to help our customers with finding the right solution to accelerate their digital transformation journey. Joining the Shopify Global ERP Program helps our Dynamics 365 Business Central customers accelerate growth with the ability to sell, ship, and process payments online using a native connector available in early 2022.
Innovation begins with data-fueled insights and more connected operations will allow merchants that use Dynamics 365 Business Central to meet consumer demands. Along with this, our corporate and enterprise customers continue to rely on Microsoft Dynamics 365 Commerce to deliver unified, personalized, and seamless buying experiences across online and offline channels. Now businesses of all sizes can deliver commerce anywhere to offer consumers more choices and better experiences.
The post Microsoft partners with Shopify to expand Dynamics 365 Business Central ecosystem appeared first on Microsoft Dynamics 365 Blog.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
Recent Comments