Learn how to use Windows PowerShell to change the value of an element in an array.
Posted by Rob Knies
On September 4, Junichi Tsujii, Principal Researcher of Microsoft Research's Beijing lab, received the Funai Achievement Award at the Forum on Information Technology (FIT), for his pioneering work on Natural Language Processing, Machine Translation and Text Mining for Biology. Held this year at the University of Tsukuba in Japan, FIT is an annual event organized by the Information Processing Society of Japan and the Institute of Electronics Information and Communication Engineers.
Since 2002, the Funai award has been presented to a distinguished individual in the field of Information Technology who: has achieved excellence in the field, remains active in providing information technology leadership, and has inspired students and young researchers.
Tsujii first learned of this honor late last year, via email.
"I was completely taken by surprise," he says. "I wasn't expecting it at all. And I had to keep the news to myself until the public announcement in June 2014."
Working Parents Day recognizes the hardworking moms and dads who put in long hours on the job and at home. It's not easy to find work-life balance, and when you have a family to take care of, it can seem even more elusive. The origins of the day suggest it's a time for kids to give back: do the dishes, clean up around the house, or cook dinner. Since we can't cook you dinner, we'd like to recognize your efforts with two of the most important lessons for working parents to master.
By Adrienne Hall, General Manager, Trustworthy Computing
Most people are familiar with the concept of an arms race. In the world of cybersecurity, this phrase is also in use. A cybersecurity “arms race” typically refers to escalating responses when one party creates a threat, and then a counter-measure is created to meet the new threat head on, resulting in a new baseline which then requires ever more sophisticated attacks in order to be successful. For better or worse many of the significant technological advancements that shape our modern world have been developed, yet we must also live in a world of constant vigilance. Those technologies that are successful often begin with a focus on functionality, then adoption, and eventually they move on to a maturity phase that commonly includes dealing with unexpected issues that arise from the choices made in previous stages.
As evidenced in past Microsoft cybersecurity reports, one of the most common ways in which a system is compromised by cybercriminal activity results from weak passwords. We’ve published a number of resources that can help guide employees on how to develop strong passwords with resources such as our recent “Security Tips & Talk blog” series: 5 passwords you should never use, and Create stronger passwords and protect them. While creating strong passwords is essential, organized crime is now driving a cyber “arms race” and it’s clear that counter measures organizations have implemented to better protect them are frequently playing catch up. Now more than ever is the time to adopt new counter measures that have become available including multi-factor authentication. Read more >>
When it comes to cloud computing, few issues are more important than your company’s choice in cloud provider. There are many different providers to choose from, and each have different capabilities, philosophies, payment models, security measures, and reputations.