Showing 8941–8952 of 18767 results
Implement Retrieval Augmented Generation (RAG) with Azure Databricks
Retrieval Augmented Generation (RAG) is an advanced technique in natural language processing that enhances the capabilities of generative models by integrating external information retrieval mechanisms. When you use both generative models and retrieval systems, RAG dynamically fetches relevant information from external data sources to augment the generation process, leading to more accurate and contextually relevant outputs.
Implement Retrieval Augmented Generation (RAG) with Azure OpenAI Service
Azure OpenAI on your data allows developers to implement RAG with supported AI chat models to reference specific sources of data to ground the response.
Implement role-based security in finance and operations apps
Finance and operations apps use role-based security to assign access to components in the system. A user who is assigned to a security role has access to the set of privileges that is associated with that role.
Implement row-level security
Row-level security (RLS) allows you to create a single or a set of reports that targets data for a specific user. In this module, you'll learn how to implement RLS by using either a static or dynamic method and how Microsoft Power BI simplifies testing RLS in Power BI Desktop and Power BI service.
Implement SaaSification techniques in Business Central
Do you want to learn about how to build your user interface using SaaSification techniques? Learn about properly building a good user interface and first trial experience for the users of your application.
Implement scale and high availability with Windows Server VM
You'll learn how to implement scaling for virtual machine scale sets and load-balanced VMs. You'll also learn how to implement Azure Site Recovery.
Implement security for Microsoft Teams
Learn about different security capabilities for Microsoft Teams, including Conditional Access, multifactor authentication, Safe Attachments, Safe Links, and Defender for Cloud Apps.
Implement security in Azure Cosmos DB for NoSQL
We will learn the different security models that Azure Cosmos DB uses.
Implement security through a pipeline using Azure DevOps
This learning path helps you prepare for the Implement security through a pipeline assessment using Azure DevOps. Learn how to configure and secure Azure Pipelines. You'll also get opportunities to practice hands-on skills. These skills include configuring secure access to pipeline resources, configuring, and validating permissions, configuring a project and repository structure, extending a pipeline, configuring pipelines to use variables and parameters securely, and managing identity for projects, pipelines, and agents.
Implement sensitivity labels
This module examines the process for implementing sensitivity labels, including applying proper administrative permissions, determining a deployment strategy, creating, configuring, and publishing labels, and removing and deleting labels.
Implement shared access signatures
Learn how to use shared access signatures to authorize access to storage resources.
Implement SSL Offload for Citrix ADC
In this course, you will learn how a Citrix ADC can use the power of SSL to securely deliver applications to your audience with the use of the SSL offload feature.