Skip to content

Commit e3bc084

Browse files
authored
Merge pull request #276388 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 5/26
2 parents 5388497 + 860feb7 commit e3bc084

File tree

27 files changed

+146
-86
lines changed

27 files changed

+146
-86
lines changed

articles/ai-services/.openpublishing.redirection.applied-ai-services.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,5 +240,15 @@
240240
"redirect_url": "/azure/ai-services/content-moderator/term-lists-quickstart-dotnet",
241241
"redirect_document_id": false
242242
},
243+
{
244+
"source_path_from_root": "/articles/ai-services/content-safety/concepts/incident-response.md",
245+
"redirect_url": "/azure/ai-services/content-safety/concepts/custom-categories-rapid",
246+
"redirect_document_id": true
247+
},
248+
{
249+
"source_path_from_root": "/articles/ai-services/content-safety/how-to/incident-response.md",
250+
"redirect_url": "/azure/ai-services/content-safety/how-to/custom-categories-rapid",
251+
"redirect_document_id": true
252+
}
243253
]
244254
}

articles/ai-services/content-safety/concepts/incident-response.md renamed to articles/ai-services/content-safety/concepts/custom-categories-rapid.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Incident response in Azure AI Content Safety"
2+
title: "Custom categories (rapid) in Azure AI Content Safety"
33
titleSuffix: Azure AI services
44
description: Learn about content incidents and how you can use Azure AI Content Safety to handle them on your platform.
55
#services: cognitive-services
@@ -12,15 +12,15 @@ ms.date: 04/11/2024
1212
ms.author: pafarley
1313
---
1414

15-
# Incident response
15+
# Custom categories (rapid)
1616

17-
In content moderation scenarios, incident response is the process of identifying, analyzing, containing, eradicating, and recovering from cyber incidents that involve inappropriate or harmful content on online platforms.
17+
In content moderation scenarios, custom categories (rapid) is the process of identifying, analyzing, containing, eradicating, and recovering from cyber incidents that involve inappropriate or harmful content on online platforms.
1818

1919
An incident may involve a set of emerging content patterns (text, image, or other modalities) that violate Microsoft community guidelines or the customers' own policies and expectations. These incidents need to be mitigated quickly and accurately to avoid potential live site issues or harm to users and communities.
2020

21-
## Incident response API features
21+
## Custom categories (rapid) API features
2222

23-
One way to deal with emerging content incidents is to use [Blocklists](/azure/ai-services/content-safety/how-to/use-blocklist), but that only allows exact text matching and no image matching. The Azure AI Content Safety incident response API offers the following advanced capabilities:
23+
One way to deal with emerging content incidents is to use [Blocklists](/azure/ai-services/content-safety/how-to/use-blocklist), but that only allows exact text matching and no image matching. The Azure AI Content Safety custom categories (rapid) API offers the following advanced capabilities:
2424
- semantic text matching using embedding search with a lightweight classifier
2525
- image matching with a lightweight object-tracking model and embedding search.
2626

@@ -34,11 +34,11 @@ Then, you can include your defined incident in a regular text analysis or image
3434

3535
### Language availability
3636

37-
The text incident response API supports all languages that are supported by Content Safety text moderation. See [Language support](/azure/ai-services/content-safety/language-support).
37+
The text custom categories (rapid) API supports all languages that are supported by Content Safety text moderation. See [Language support](/azure/ai-services/content-safety/language-support).
3838

3939
### Input limitations
4040

41-
See the following table for the input limitations of the incident response API:
41+
See the following table for the input limitations of the custom categories (rapid) API:
4242

4343
| Object | Limitation |
4444
| :------------ | :----------- |
@@ -56,6 +56,6 @@ To use this API, you must create your Azure AI Content Safety resource in one of
5656

5757
## Next steps
5858

59-
Follow the how-to guide to use the Azure AI Content Safety incident response API.
59+
Follow the how-to guide to use the Azure AI Content Safety custom categories (rapid) API.
6060

61-
* [Use the incident response API](../how-to/incident-response.md)
61+
* [Use the custom categories (rapid) API](../how-to/custom-categories-rapid.md)

articles/ai-services/content-safety/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ sections:
2727
2828
- Azure Content Moderator uses binary classification for each content type (such as `profanity` or `adult`), while Azure AI Content Safety uses multiple classes (such as `sexual`, `violent`, `hate`, and `self-harm`) with different severity levels.
2929
- Azure AI Content Safety supports multilingual content moderation in English, German, Japanese, Spanish, French, Italian, Portuguese, and Chinese, while Azure Content Moderator's AI classifiers only support English.
30-
- Azure Content Moderator has a built-in term list and a custom term list feature, while Azure AI Content Safety does not have a built-in term list but relies on advanced language and vision models to detect harmful content. It also provides a custom term list feature for incident response and customization.
30+
- Azure Content Moderator has a built-in term list and a custom term list feature, while Azure AI Content Safety does not have a built-in term list but relies on advanced language and vision models to detect harmful content. It also provides a custom term list feature for customization.
3131
- Azure AI Content Safety has an interactive studio for exploring and testing the service capabilities, while Azure Content Moderator does not.
3232
- question: |
3333
Why should I migrate from Azure Content Moderator to Azure AI Content Safety?

articles/ai-services/content-safety/how-to/incident-response.md renamed to articles/ai-services/content-safety/how-to/custom-categories-rapid.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: "Use the incident response API"
2+
title: "Use the custom categories (rapid) API"
33
titleSuffix: Azure AI services
4-
description: Learn how to use the incident response API to mitigate harmful content incidents quickly.
4+
description: Learn how to use the custom categories (rapid) API to mitigate harmful content incidents quickly.
55
#services: cognitive-services
66
author: PatrickFarley
77
manager: nitinme
@@ -13,9 +13,9 @@ ms.author: pafarley
1313
---
1414

1515

16-
# Use the incident response API
16+
# Use the custom categories (rapid) API
1717

18-
The incident response API lets you quickly respond to emerging harmful content incidents. You can define an incident with a few examples in a specific topic, and the service will start detecting similar content.
18+
The custom categories (rapid) API lets you quickly respond to emerging harmful content incidents. You can define an incident with a few examples in a specific topic, and the service will start detecting similar content.
1919

2020
Follow these steps to define an incident with a few examples of text content and then analyze new text content to see if it matches the incident.
2121

@@ -37,7 +37,7 @@ Follow these steps to define an incident with a few examples of text content and
3737

3838
<!--tbd env vars-->
3939

40-
## Test the text incident response API
40+
## Test the text custom categories (rapid) API
4141

4242
Use the sample code in this section to create a text incident, add samples to the incident, deploy the incident, and then detect text incidents.
4343

@@ -231,7 +231,7 @@ print(response.text)
231231
```
232232
---
233233

234-
## Test the image incident response API
234+
## Test the image custom categories (rapid) API
235235

236236
Use the sample code in this section to create an image incident, add samples to the incident, deploy the incident, and then detect image incidents.
237237

@@ -801,5 +801,5 @@ print(response.text)
801801

802802
## Related content
803803

804-
- [Incident response concepts](../concepts/incident-response.md)
804+
- [Custom categories (rapid) concepts](../concepts/custom-categories-rapid.md)
805805
- [What is Azure AI Content Safety?](../overview.md)

articles/ai-services/content-safety/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ There are different types of analysis available from this service. The following
5050
| Prompt Shields (preview) | Scans text for the risk of a [User input attack](./concepts/jailbreak-detection.md) on a Large Language Model. [Quickstart](./quickstart-jailbreak.md) |
5151
| Groundedness detection (preview) | Detects whether the text responses of large language models (LLMs) are grounded in the source materials provided by the users. [Quickstart](./quickstart-groundedness.md) |
5252
| Protected material text detection (preview) | Scans AI-generated text for known text content (for example, song lyrics, articles, recipes, selected web content). [Quickstart](./quickstart-protected-material.md)|
53-
| Incident response API (preview) | Lets you define [emerging harmful content patterns](./concepts/incident-response.md) and scan text and images for matches. [How-to guide](./how-to/incident-response.md) |
53+
| Custom categories (rapid) API (preview) | Lets you define [emerging harmful content patterns](./concepts/custom-categories-rapid.md) and scan text and images for matches. [How-to guide](./how-to/custom-categories-rapid.md) |
5454

5555
## Content Safety Studio
5656

articles/ai-services/content-safety/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ items:
4747
- name: Use a blocklist
4848
href: how-to/use-blocklist.md
4949
- name: Handle harmful content incidents
50-
href: how-to/incident-response.md
50+
href: how-to/custom-categories-rapid.md
5151
- name: Encryption of data at rest
5252
href: how-to/encrypt-data-at-rest.md
5353
- name: Migrate from public preview to GA
@@ -64,8 +64,8 @@ items:
6464
href: concepts/jailbreak-detection.md
6565
- name: Groundedness detection
6666
href: concepts/groundedness.md
67-
- name: Incident response
68-
href: concepts/incident-response.md
67+
- name: Custom categories (rapid)
68+
href: concepts/custom-categories-rapid.md
6969
- name: Reference
7070
items:
7171
- name: Azure AI Content Safety REST API

articles/ai-services/content-safety/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ Learn what's new in the service. These items might be release notes, videos, blo
1919
## May 2024
2020

2121

22-
### Incident response API
22+
### Custom categories (rapid) API
2323

24-
The incident response API lets you quickly define emerging harmful content patterns and scan text and images for matches. See [Incident response](./concepts/incident-response.md) to learn more.
24+
The custom categories (rapid) API lets you quickly define emerging harmful content patterns and scan text and images for matches. See [Custom categories (rapid)](./concepts/custom-categories-rapid.md) to learn more.
2525

2626
## March 2024
2727

articles/ai-services/document-intelligence/quickstarts/includes/javascript-sdk.md

Lines changed: 21 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Quickstart: Document Intelligence (formerly Form Recognizer) JavaScript SDK (beta) | v3.1 | v3.0"
2+
title: "Quickstart: Document Intelligence (formerly Form Recognizer) JavaScript SDK"
33
titleSuffix: Azure AI services
44
description: Form and document processing, data extraction, and analysis using Document Intelligence JavaScript client library.
55
author: laujan
@@ -73,8 +73,7 @@ In this quickstart, use the following features to analyze and extract data and v
7373
4. Install the `ai-document-intelligence` client library and `azure/identity` npm packages:
7474

7575
```console
76-
npm i @azure-rest/[email protected] @azure/identity
77-
76+
npm i @azure-rest/[email protected] @azure/core-auth
7877
```
7978

8079
Your app's `package.json` file is updated with the dependencies.
@@ -119,7 +118,7 @@ To interact with the Document Intelligence service, you need to create an instan
119118

120119
:::moniker range="doc-intel-3.1.0 || doc-intel-3.0.0"
121120

122-
To interact with the Document Intelligence service, you need to create an instance of the `DocumentAnalysisClient` class. To do so, you create an `AzureKeyCredential` with your `key` from the Azure portal and a `DocumentAnalysisClient` instance with the `AzureKeyCredential` and your Form
121+
To interact with the Document Intelligence service, you need to create an instance of the `DocumentAnalysisClient` class. To do so, you create an `AzureKeyCredential` with your `key` from the Azure portal and a `DocumentAnalysisClient` instance with the `AzureKeyCredential` and your Form
123122
Recognizer `endpoint`.
124123

125124
:::moniker-end
@@ -146,7 +145,10 @@ Extract text, selection marks, text styles, table structures, and bounding regio
146145
:::moniker range="doc-intel-4.0.0"
147146

148147
```javascript
149-
const DocumentIntelligenceClient = require("@azure-rest/ai-document-intelligence");
148+
const DocumentIntelligence = require("@azure-rest/ai-document-intelligence").default,
149+
{ getLongRunningPoller, isUnexpected } = require("@azure-rest/ai-document-intelligence");
150+
151+
const { AzureKeyCredential } = require("@azure/core-auth");
150152

151153
// set `<your-key>` and `<your-endpoint>` variables with the values from the Azure portal.
152154
const key = "<your-key";
@@ -156,7 +158,7 @@ Extract text, selection marks, text styles, table structures, and bounding regio
156158
const formUrl = "https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-layout.pdf"
157159

158160
async function main() {
159-
const client = DocumentIntelligenceClient(endpoint, {key:key},);
161+
const client = DocumentIntelligence(endpoint, new AzureKeyCredential(key:key));
160162

161163

162164
const initialResponse = await client
@@ -168,6 +170,10 @@ Extract text, selection marks, text styles, table structures, and bounding regio
168170
},
169171
});
170172

173+
if (isUnexpected(initialResponse)) {
174+
throw initialResponse.body.error;
175+
}
176+
171177
const poller = await getLongRunningPoller(client, initialResponse);
172178
const analyzeResult = (await poller.pollUntilDone()).body.analyzeResult;
173179

@@ -309,19 +315,21 @@ In this example, we analyze an invoice using the **prebuilt-invoice** model.
309315

310316
```javascript
311317

312-
const DocumentIntelligenceClient = require("@azure-rest/ai-document-intelligence");
318+
const DocumentIntelligence = require("@azure-rest/ai-document-intelligence").default,
319+
{ getLongRunningPoller, isUnexpected } = require("@azure-rest/ai-document-intelligence");
320+
321+
const { AzureKeyCredential } = require("@azure/core-auth");
313322

314323
// set `<your-key>` and `<your-endpoint>` variables with the values from the Azure portal.
315324
const key = "<your-key>";
316325
const endpoint = "<your-endpoint>";
317326

318327
// sample document
319-
invoiceUrl = "https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-invoice.pdf"
328+
const invoiceUrl = "https://raw.githubusercontent.com/Azure-Samples/cognitive-services-REST-api-samples/master/curl/form-recognizer/sample-invoice.pdf"
320329

321330
async function main() {
322331

323-
const client = DocumentIntelligenceClient(endpoint, {key: key},
324-
);
332+
const client = DocumentIntelligence(endpoint, new AzureKeyCredential(key:key));
325333

326334
const initialResponse = await client
327335
.path("/documentModels/{modelId}:analyze", "prebuilt-invoice")
@@ -333,6 +341,9 @@ async function main() {
333341
},
334342
});
335343

344+
if (isUnexpected(initialResponse)) {
345+
throw initialResponse.body.error;
346+
}
336347

337348
const poller = await getLongRunningPoller(client, initialResponse);
338349

articles/aks/intro-aks-automatic.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ ms.author: asabbour
1313

1414
**Applies to:** :heavy_check_mark: AKS Automatic (preview)
1515

16-
In Azure Kubernetes Service (AKS) Automatic, Azure manages your cluster configuration, including your nodes, scaling, security, and other preconfigured settings. Automatic clusters are optimized to run most production workloads, and provision compute resources based on your workload needs. The streamlined configuration follows AKS best practices and recommendations for cluster and workload setup, scalability, and security.
16+
Azure Kubernetes Service (AKS) Automatic offers an experience that makes the most common tasks on Kubernetes fast and frictionless, while preserving the flexibility, extensibility, and consistency of Kubernetes. Azure takes care of your cluster setup, including node management, scaling, security, and preconfigured settings that follow AKS well-architected recommendations. Automatic clusters dynamically allocate compute resources based on your specific workload requirements and are tuned for running production applications.
1717

18-
- **Optimal cluster configuration**: Clusters are preconfigured for optimal production use, suitable for most applications. They offer fully managed node pools that automatically allocate and scale resources based on your workload needs. Pods are bin packed efficiently, to maximize resource utilization.
18+
- **Production ready by default**: Clusters are preconfigured for optimal production use, suitable for most applications. They offer fully managed node pools that automatically allocate and scale resources based on your workload needs. Pods are bin packed efficiently, to maximize resource utilization.
19+
20+
- **Built-in best practices and safeguards**: AKS Automatic clusters have a hardened default configuration, with many cluster, application, and networking security settings enabled by default. AKS automatically patches your nodes and cluster components while adhering to any planned maintenance schedules.
1921

20-
- **Streamlined application deployment**: Go from a container image to a deployed application that adheres to best practices patterns within minutes, with access to the comprehensive capabilities of the Kubernetes API and its rich ecosystem.
21-
22-
- **Default security posture**: AKS Automatic clusters have a hardened default configuration, with many cluster, application, and networking security settings enabled by default. AKS automatically patches your nodes and cluster components while adhering to any planned maintenance schedules.
22+
- **Code to Kubernetes in minutes**: Go from a container image to a deployed application that adheres to best practices patterns within minutes, with access to the comprehensive capabilities of the Kubernetes API and its rich ecosystem.
2323

2424
## AKS Automatic and Standard feature comparison
2525

-2 Bytes
Loading

0 commit comments

Comments
 (0)