Sr. Content Developer at Microsoft, working remotely in PA, TechBash conference organizer, former Microsoft MVP, Husband, Dad and Geek.
151528 stories
·
33 followers

F# Weekly #15, 2026 – Akkling, FSharp.Data and RANSAC auto-tune

1 Share

Welcome to F# Weekly,

A roundup of F# content from this past week:

Microsoft News

I love that FSharp.Data is being worked on again #fsharp github.com/fsprojects/F…

Jon Sagara (@jonsagara.com) 2026-04-07T15:00:35.292Z

Videos

Blogs

bonfire.mavnn.eu/pub/objects…So this is very much a work in progress (see me having to quote the post to add the hashtags…), but meet `fediverss` – a simple F# program that puts your static blog rss in the fediverse. #activitypub #fsharp #blog

Michael Newton (@mavnn.bonfire.mavnn.eu.ap.brid.gy) 2026-04-10T12:19:17.506Z

Highlighted projects

  • Neftedollar/FsMcp — Idiomatic F# toolkit for building Model Context Protocol (MCP) servers and clients with type safety and computation expressions
  • MagnusOpera/FScript — Functional language interpreter inspired by F#/ML, with type inference and LSP support
  • michaelglass/Falco.UnionRoutes — Type-safe routing with discriminated unions for the Falco web framework
  • Neftedollar/ll-lang — Statically typed functional language designed for LLM code generation with token-efficient syntax
  • jmeyerhoefer/Testify — F# testing library with a deeply embedded DSL for quotation-based assertions and property-style checks

New Releases

Grab the #pxlclock VS Code extension ("PXL Clock), code your own pixogram in #csharp, and ping me here: I'll record it on the real hardware and post the video.Who makes the coolest one?VS Code: marketplace.visualstudio.com/items?itemName=pxlclock.pxl-clock#pxlclock #csharp #fsharp

SchlenkR (@schlenkr.bsky.social) 2026-04-05T17:33:08.495Z

That’s all for now. Have a great week.

If you want to help keep F# Weekly going, click here to jazz me with Coffee!

Buy Me A Coffee





Read the whole story
alvinashcraft
16 seconds ago
reply
Pennsylvania, USA
Share this story
Delete

IoTCT Webcast Episode 308 - "The FAFO Pandemic" (When Agentic AI Goes Wrong!)

1 Share
From: Iot Coffee Talk
Duration: 1:12:54
Views: 2

Welcome to IoT Coffee Talk, where hype comes to die a terrible death. We have a fireside chat about all things #IoT over a cup of coffee or two with some of the industry's leading business minds, thought leaders and technologists in a totally unscripted, organic format.

This week Pete, Debbie, and Leonard jump on Web3 for a discussion about:

🎶 🎙️ BAD KARAOKE! 🎸 🥁 "She Sells Sanctuary", The Cult
🐣 The shortest episode that was not.
🐣 The AI smoke and noise. Is AI too big to fail?
🐣 What is more important to most of us? AI or the price of gas?
🐣 The inconvenient truth about The Great GenAI Gamble.
🐣 Pete has a brain fart.
🐣 Our progressive desensitization to AI slop.
🐣 Will GenAI reality and value land at the edge?
🐣 Should Leonard get a facelift?
🐣 Why AI models will never be perfect, and the problem with believing they are.
🐣 Why giving credence to LLMs give validation to mediocrity and the misguided mean.
🐣 What happens when you scale out agentic AI FAFO,... globally?
🐣 The trust crisis that is here,.... you just don't know it,.... yet.
🐣 Filling the gaps in safe agentic AI and GenAI in general.
🐣 Why safe GenAI and safe agentic AI is a great brand investment and bet.
🐣 Why computing in the future will not be AI.
🐣 Why putting all your corporate stuff in a uber LLM is the worst thing you could do.
🐣 Going from AI isolation to compartmentalization.
🐣 GenAI victimization at massive scale.

It's a great episode. Grab an extraordinarily expensive latte at your local coffee shop and check out the whole thing. You will get all you need to survive another week in the world of IoT and greater tech!

Tune in! Like! Share! Comment and share your thoughts on IoT Coffee Talk, the greatest weekly assembly of Onalytica and CBT tech and IoT influencers on the planet!!

If you are interested in sponsoring an episode, please contact Stephanie Atkinson at Elevate Communities. Just make a minimally required donation to www.elevatecommunities.org and you can jump on and hang with the gang and amplify your brand on one of the top IoT/Tech podcasts in the known metaverse!!!

Take IoT Coffee Talk on the road with you on your favorite podcast platform. Go to IoT Coffee Talk on Buzzsprout, like, subscribe, and share: https://lnkd.in/gyuhNZ62

Read the whole story
alvinashcraft
11 hours ago
reply
Pennsylvania, USA
Share this story
Delete

Power Platform Monitor Alerts Are Now Generally Available

1 Share

We are excited to announce that Power Platform Monitor alerts are now generally available! Since entering public preview in August 2025, many organizations have created alert rules to stay on top of app, agent and flow health. Reliability is critical when alerts are used to detect and respond to issues in production. Today, Monitor alerts meet the reliability and maturity standards required for general availability, following sustained investments to improve quality and simplify onboarding.

This image shows the new Monitor overview page, which has become more alerts-centric. It has visuals describing the state of your triggered custom alerts in addition to triggered predefined alerts that are authored by Microsoft.

What are Monitor Alerts?

Monitor alerts allow tenant and environment administrators to proactively monitor the operational health of their Power Platform resources and receive notifications when health metrics fall below thresholds they define. Instead of learning about problems from end users, admins can identify and address issues before they cause disruption. This reduces downtime and improves reliability across the organization.

What’s New with GA

Predefined alerts — protection with zero configuration

The biggest addition we’ve added is predefined alerts: a set of configured, Microsoft-authored alerts that are enabled by default for every tenant. These alerts automatically surface high-use canvas apps, model-driven apps, agents, desktop flows and cloud flows whose health has dropped below recommended baseline thresholds — with no setup required.

For example, predefined alerts will flag when:

  • The availability of high-use canvas apps drops below 90%
  • The availability of high-use model-driven apps drops below 90%
  • High-use cloud flows are experiencing success rate degradation

Predefined alerts give admins an immediate signal on what matters most in their tenant, even before they’ve configured a single custom alert rule. Items can trigger these alerts regardless if they’re in a managed environment, and predefined alerts will encourage users to create their own alert rules to monitor these items against their own custom thresholds.

This image shows the triggered alert experience for a predefined alert. In this image, it specifically shows the cloud flow predefined alert, with two cloud flows that triggered it. These cloud flows aren't in a Managed Environment.

Redesigned Monitor overview page

We redesigned the Monitor overview page to be alerts-centric. When you land in Monitor, you now get an at-a-glance view of active alert conditions and resource health across your environments — making it faster to identify what needs attention and act on it.

Code app alerts

Custom alert rules now support alerting on your code apps in addition to canvas and model-driven apps. This gives admins deeper visibility into code app performance and the ability to catch performance degradation before it affects users’ day-to-day experience.

Work queue alerts (public preview)

Admins can now configure alerts for Power Automate work queues in Monitor, enabling proactive monitoring of work queue health alongside apps, flows and agents. This capability is launching in public preview alongside alerts GA.

How Monitor Alerts Work

Admins define threshold-based rules on Monitor metrics. For example, this can look like receiving an alert when a cloud flow’s success rate drops below a custom threshold, or when a canvas app’s availability falls below an acceptable level.

Monitor alerts evaluate alert rules daily after aggregating new metric data for your environments. When a metric breaches a threshold, admins receive an email notification with a direct link to the details that triggered the alert.

You can scope alert rules to an environment or individual item, configure multiple recipients per rule (including security groups), and manage all active rules and review triggered alert history from the Alert Rules view in Monitor.

This image shows the alert configuration panel in Monitor, where admins can create their own custom alert rule to proactively monitor the resources they care about against health thresholds they define.
This image shows the alert rule list in Monitor, where admins can manage their rules, like turning them on/off or editing or deleting them.

What’s Supported

ProductResource
Power AppsCode apps
Power AppsCanvas apps
Power AppsModel-driven apps
Power AutomateCloud flows
Power AutomateDesktop flows
Power AutomateWork queues (public preview)
Copilot StudioAgents

We’re excited for you to improve the operational health of your apps, agents and automations in Power Platform. Learn more about Monitor and how to create alerts here.

The post Power Platform Monitor Alerts Are Now Generally Available appeared first on Microsoft Power Platform Blog.

Read the whole story
alvinashcraft
11 hours ago
reply
Pennsylvania, USA
Share this story
Delete

Understanding Defender AV Scans

1 Share

Microsoft Defender Antivirus Defender is intended to operate silently in the background, without requiring any active attention from the user. Because Defender is included for free as a component of Windows, it doesn’t need to nag or otherwise bother the user for attention in an attempt to “prove its value”, unlike some antivirus products that require subscription fees.

The default mode for Defender is called “Real-time Protection” (RTP) and in that mode, Defender will automatically scan files for malicious content as they are opened and closed. This means that, even if you did have a malicious file on your PC, the instant it tries to load, the threat is blocked.

If you use the Windows Security App’s toggle to turn RTP off, it will turn itself back on whenever you reboot, or after a variable interval (controlled by various factors including management policies and signature updates).

Given the default real-time scanning behavior, you may wonder why the File Explorer’s legacy context menu offers a “Scan with Microsoft Defender…” menu item. Note that this is the Legacy Context menu, shown when Shift+RightClicking on a file. The Default context menu shown by a regular right-click does not offer the Scan command.

Confusion around this command is especially common because, in most cases, the item doesn’t seem to do anything: the Windows Security app just opens to the “Virus & threat protection” page:

The scan you’ve asked for typically executes so quickly, that you have to look closely to realize that your requested scan actually completed– see the text “1 file scanned” at the bottom.

🤔 So, in a world of Real-time Protection, why does this command exist at all? Is there ever a need to use it?

The one scenario where the “Scan” menu item does more than nothing is the case of archive files (Zip, 7z, CAB, etc). Defender doesn’t scan these files on open/close for a few reasons (performance: decompressing data can take a long time, functionality: a password may be needed to decompress).

However, if a user actually tries to use a file from within an archive, that file is extracted and scanned at that time:

If you wanted to scan the contents of an unencrypted archive without actually extracting it, the Scan with Microsoft Defender… menu item will do just that and recognize the threat inside the archive:

Therefore, the only meaningful use of the “Scan” option in Defender is to scan an archive file that you plan to give someone else to open on a different computer, although it’s extremely likely that their device would also be running Defender and would also scan any files extracted from the archive.

Unfortunately, there’s lots of bad/outdated advice out there about the need for manual AV scanning, but I’m happy to see that both Microsoft Copilot and Google Gemini understand the very limited usefulness of this command. I was also happy to see Gemini offered the following:

Pro Tip: If you ever suspect a file is malicious but Defender insists that it’s clean, try uploading it to VirusTotal (an awesome service I’ve blogged about before). VirusTotal will scan the file using over 70 different antivirus engines simultaneously to give you a second (and 3rd,4th,5th,6th,7th…) opinion.

Other Scans

You may’ve noticed other options on the Scan options page, including “Quick scan”, “Full scan”, “Custom scan”, and “offline scan”.

  • Quick Scan scans a small set of locations where malware commonly tries to hide, including startup locations.
  • Full scan is self-explanatory: it scans all of your files on your disks.
  • Custom scan is self-explanatory: it scans the location you choose. The menu item discussed above kicks off a custom-scan for a single file or folder.

All of these scans are basically redundant in a world of RTP: files are scanned on access, so manual scans are not required for protection. The final option, Microsoft Defender Antivirus (offline scan) is different than the others. This scan is a special one that reboots your system and begins a scan before Windows boots. This scan type can find certain types of malware that might otherwise try to hide from Defender. Note that you may be prompted for your BitLocker recovery key:

tl;dr: Don’t worry, we’ve got your back.

-Eric



Read the whole story
alvinashcraft
18 hours ago
reply
Pennsylvania, USA
Share this story
Delete

Anthropic’s Mythos Dilemma, Violence Against AI, Tokenmaxxing at Meta

1 Share

Ranjan Roy from Margins is back for our weekly discussion of the latest tech news. We cover: 1) Anthropic's new Mythos preview 2) Is Mythos marketing or a legit breakthrough? 3) The Mythos sandwich guy story 4) OpenAI and Anthropic's brewing 1st party vs. API conflict of interest 5) The Meta-Harness 6) Violence against AI on the rise 7) Maine is going to pass a data center moratorium 8) Was Medvi really a $1.8 billion two person startup? 9) Tokenmaxxing is all the rage

---

Enjoying Big Technology Podcast? Please rate us five stars ⭐⭐⭐⭐⭐ in your podcast app of choice.

Want a discount for Big Technology on Substack + Discord? Here’s 25% off for the first year: https://www.bigtechnology.com/subscribe?coupon=0843016b

Learn more about your ad choices. Visit megaphone.fm/adchoices





Download audio: https://pdst.fm/e/tracking.swap.fm/track/t7yC0rGPUqahTF4et8YD/pscrb.fm/rss/p/traffic.megaphone.fm/AMPP8933066130.mp3?updated=1775855961
Read the whole story
alvinashcraft
18 hours ago
reply
Pennsylvania, USA
Share this story
Delete

RNR 359 - The AI Apocalypse? The past, present, and future of software

1 Share

Todd Werth, Infinite Red's co-founder and 30-year software veteran, joins Robin to talk AI and where it's taking our industry. Also, Claude built a Flappy Bird clone with Todd's face on it, and we're not sorry.

 

Connect With Us!

 

This episode is brought to you by Infinite Red!

Infinite Red is an expert React Native consultancy located in the USA. With over a decade of React Native experience and deep roots in the React Native community (hosts of Chain React and the React Native Newsletter, core React Native contributors, creators of Ignite and Reactotron, and much, much more), Infinite Red is the best choice for helping you build and deploy your next React Native app.





Download audio: https://cdn.simplecast.com/media/audio/transcoded/1208ee61-9c16-43c1-bc4c-ca790717f4a8/2de31959-5831-476e-8c89-02a2a32885ef/episodes/audio/group/70ed7f94-e573-49b9-93f5-9c005fafe1aa/group-item/0f4eb479-beb0-4cb3-94e3-159d155e0b6f/128_default_tc.mp3?aid=rss_feed&feed=hEI_f9Dx
Read the whole story
alvinashcraft
18 hours ago
reply
Pennsylvania, USA
Share this story
Delete
Next Page of Stories