<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>New library articles in SAS Support Communities</title>
    <link>https://communities.sas.com/</link>
    <description>SAS Support Communities</description>
    <pubDate>Mon, 29 Apr 2024 00:55:17 GMT</pubDate>
    <dc:creator>Community</dc:creator>
    <dc:date>2024-04-29T00:55:17Z</dc:date>
    <item>
      <title>Advanced configuration of a Shock in SAS Risk Factor Manager</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Advanced-configuration-of-a-Shock-in-SAS-Risk-Factor-Manager/ta-p/925887</link>
      <description>&lt;P&gt;Advanced configuration of a Shock in SAS Risk Factor Manager&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 20:33:07 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Advanced-configuration-of-a-Shock-in-SAS-Risk-Factor-Manager/ta-p/925887</guid>
      <dc:creator>MihaiViju</dc:creator>
      <dc:date>2024-04-25T20:33:07Z</dc:date>
    </item>
    <item>
      <title>Wavelet Analysis using SAS/IML: Thresholding the Detail Coefficients to Remove High-Frequency Noise</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Wavelet-Analysis-using-SAS-IML-Thresholding-the-Detail/ta-p/925884</link>
      <description>&lt;P&gt;Recently in the SAS Community Library: SAS'&amp;nbsp;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/191988"&gt;@AriZitin&lt;/a&gt;&amp;nbsp;shows you&amp;nbsp;&lt;SPAN&gt;how wavelets can be used to remove unwanted high-frequency noise from digital signals.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 15:18:39 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Wavelet-Analysis-using-SAS-IML-Thresholding-the-Detail/ta-p/925884</guid>
      <dc:creator>AriZitin</dc:creator>
      <dc:date>2024-04-26T15:18:39Z</dc:date>
    </item>
    <item>
      <title>Don’t Listen to Ron White. Cluster Profiling is Right!</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Don-t-Listen-to-Ron-White-Cluster-Profiling-is-Right/ta-p/925875</link>
      <description>&lt;P&gt;Don’t Listen to Ron White. Cluster Profiling is Right!&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 19:56:48 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Don-t-Listen-to-Ron-White-Cluster-Profiling-is-Right/ta-p/925875</guid>
      <dc:creator>MarcHuber</dc:creator>
      <dc:date>2024-04-25T19:56:48Z</dc:date>
    </item>
    <item>
      <title>SAS Viya at SAS Innovate - What’s New in Data &amp; AI</title>
      <link>https://communities.sas.com/t5/SAS-Viya-Release-Updates/SAS-Viya-at-SAS-Innovate-What-s-New-in-Data-amp-AI/ta-p/925669</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN28143_766589651" target="_self"&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maxresdefault" style="width: 999px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/95843i9E8A281C823FA50C/image-size/large?v=v2&amp;amp;px=999" role="button" title="maxresdefault" alt="maxresdefault" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Want to know what’s new in SAS Viya? In this SAS Viya Release Highlights Show, we’re packing our bags and heading to Las Vegas to showcase the latest SAS Viya announcements. We’ll be covering what’s new when it comes to SAS Viya Workbench, generative AI, copilots and even dive into topics like quantum computing. You’ll hear from SAS experts about how SAS is investing in these exciting technology areas.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 24 Apr 2024 21:22:12 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Viya-Release-Updates/SAS-Viya-at-SAS-Innovate-What-s-New-in-Data-amp-AI/ta-p/925669</guid>
      <dc:creator>thiago</dc:creator>
      <dc:date>2024-04-24T21:22:12Z</dc:date>
    </item>
    <item>
      <title>Maximize Coding and Data Freedom with SAS, Python and Databricks</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Maximize-Coding-and-Data-Freedom-with-SAS-Python-and-Databricks/ta-p/925503</link>
      <description>&lt;P&gt;Freedom of choice is now more important than ever when you want to get the most out of your data and AI specialists. Boasting compatibility with 80+ data sources, including widely adopted open data standards and formats such as Parquet and ORC, the possibilities for data access are virtually limitless with SAS Viya. Check out this blog to look into how this freedom also extends to coding language with SAS Viya - in particular Python.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 08:49:18 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Maximize-Coding-and-Data-Freedom-with-SAS-Python-and-Databricks/ta-p/925503</guid>
      <dc:creator>larsarne</dc:creator>
      <dc:date>2024-04-24T08:49:18Z</dc:date>
    </item>
    <item>
      <title>Why Do I Need SAS Intelligent Decisioning and SAS Model Manager to Achieve Analytics Success?</title>
      <link>https://communities.sas.com/t5/Ask-the-Expert/Why-Do-I-Need-SAS-Intelligent-Decisioning-and-SAS-Model-Manager/ta-p/925389</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;STRONG&gt;Watch this Ask the Expert session to learn how &lt;SPAN&gt;the integration between these SAS solutions helps MLOps engineers, data scientists and business users improve analytics success by working together&lt;/SPAN&gt;.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24687_1605429396" target="_blank" rel="nofollow noopener noreferrer noreferrer noreferrer noreferrer"&gt;&lt;SPAN class="cta-button-article"&gt;Watch the Webinar&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will learn about:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How SAS® Viya® supports enterprise team collaboration to efficiently build AI and analytics systems.&lt;/LI&gt;
&lt;LI&gt;Core functionality of SAS Model Manager for MLOps engineers, including registration, testing, governance, monitoring and integration with solutions such as SAS Intelligent Decisioning.&lt;/LI&gt;
&lt;LI&gt;Core functionality of SAS Intelligent Decisioning for decision analysts, including rule building, ML/AL implementation, code support, orchestration and deployment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The questions from the Q&amp;amp;A segment held at the end of the webinar are listed below and the slides from the webinar are attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q&amp;amp;A&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;After model decay is detected, what are the next steps?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We didn't dive too deep into model decay in this example, but when we develop our machine learning models, they are just representations of a pattern that they detect in the world around us at a specific time point. Our world is ever changing, new things appear all the time, things phase out. So, when our models are trained to work with a specific pattern at a single point in time, it becomes less effective at prediction when that pattern is no longer useful. This is a process called model decay.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Within our SAS model management tool, we have capabilities for setting thresholds for sending tasks or notifications whenever your model decay doesn't meet that threshold, so that users can come in and decide what's next. Do they retrain their models in SAS Model Studio? Do they select a challenger model that looks like it's still performing as well as the champion or better? We do support performance monitoring for multiple models so you can share those challenger models side-by-side those champions. You can quickly see it's time to replace my production model with a challenger or decide to retire the project to build new models. There are a few different options that are available, but we do help with letting individuals know when it is time to address model decay. From there, we can replace production models when we go to deploy; there's a toggle to replace the model or replacing the model with the same name. Or we can just let Crystal know that it's time to swap out that model, as you've seen in the demonstration. We can even very quickly share our models. There's a share button, so we can even share it over teams if I want to speed things along.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What else can I do to ensure my decision flows leverage Responsible and Trustworthy AI best practices?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;There are a few things that we can do to better make sure that our decisions fall into that responsible and trustworthy AI category. First, when we are using models within our decisions, we want to make sure that we're working with the data scientists or whoever is developing and maintaining those models. Because a large part of how our decisions depend on the outputs those models. So, we need to make sure that our models are up to date. If there needs to be retraining, retrain the models before our models get stale. In addition, we also want our decisions to be transparent and be able to explain how a decision was made. With SAS intelligent decisioning, there's a few ways we can do this. When we publish decisions, navigate to the Deployments tab to manage the different deployed decisions that we have. We can understand where they've been deployed to, who's deployed them, and the date of publishing. Also, with this, we can get a better understanding of how the decision is running and what it is using to make decisions by easily generating a report that helps us create better transparent decisions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We can also track decisions with decision path analysis and rule-fired analysis. We can also track decisions with decision path analysis and rule-fired analysis and the output decision variables. With this data we can do analysis to better understand how decisions are made and ensure&amp;nbsp; that we are making responsible decisions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;While developing category models and churn models, do you actually code or is it done by SAS Viya itself?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;What's nice about SAS Viya is that it's almost like a choose your own adventure when it comes to how you develop your models. It can be yes code, no code, low code, or somewhere in between. For this particular example, these models that we use were developed using a tool called SAS Model Studio, which is a GUI (Graphical User Interface) based approach where you don't have to do any coding yourself. You can drag and drop nodes into a pipeline, you can use automated machine learning to develop that pipeline for you. You don't actually have to code at all to build out these models we used today. But that doesn't mean you can't code. Users can also code in SAS and Python or R to develop their models. We have a few different options for those users. It is nice and flexible so you can start to bring together skill sets across your organization, whether they can code and enjoy it and just want to stick with that method, or if they prefer to iterate very quickly using a drag and drop tool. There is a variety of different options for how these models can be developed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How can I learn more?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Sophia: &lt;SPAN&gt;Besides joining us at SAS Innovate, both Model Manager and Intelligent Decisioning are very active on SAS communities. I post under the SAS Model Manager label whenever we have new features, and many of our experts in the community post interesting use cases they come across, and interesting problems they've solved. So, it's definitely worthwhile to subscribe to the SAS Model Manager label on SAS Communities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Crystal: SAS Communities is always a good one for Model Manager or SAS Intelligent Decisioning. We have some blogs on the sas.com page and then also in SAS Communities. I also suggest taking a look at the previous because we have a lot of good tutorials or how to videos that show you how we move throughout either SAS Model Manager and SAS Intelligent Decisioning. The previous webinars can be especially helpful if you are new to either of these solutions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SAS Model Manager Communities Link: &lt;A href="https://communities.sas.com/t5/SAS-Communities-Library/tkb-p/library/label-name/sas%20model%20manager" target="_blank"&gt;SAS Communities: SAS Model Manager&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;SAS Intelligent Decisioning Communities Link: &lt;A href="https://communities.sas.com/t5/Decisioning/bd-p/decisioning" target="_blank"&gt;SAS Communities: Decisioning&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;SAS Ask the Expert Webinars: &lt;A href="https://communities.sas.com/t5/Ask-the-Expert/tkb-p/askexpert/label-name/customer%20intelligence" target="_blank"&gt;Ask the Expert - SAS Support Communities&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Did you use logistic regression to develop the model?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In this example, the category model is a rules-based text model, and the churn model is a gradient boosting model, but logistic regression models and many other machine learning models are supported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Recommended Resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_1501824202" data-cke-saved-href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_1501824202" target="_blank"&gt;Essential Functions of SAS Intelligent Decisioning&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_838344079" data-cke-saved-href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_838344079" target="_blank"&gt;Manage Models in SAS Viya Training&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_616477129" data-cke-saved-href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_616477129" target="_blank"&gt;SAS Intelligent Decisioning Homepage&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_484998507" data-cke-saved-href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_484998507" target="_blank"&gt;SAS Model Manager Homepage&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_266193342" data-cke-saved-href="https://www.sas.com/gms/redirect.jsp?detail=PLN24693_266193342" target="_blank"&gt;SAS Viya Homepage&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Please see additional resources in the attached slide deck.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Want more tips? Be sure to subscribe to the&amp;nbsp;&lt;A href="http://communities.sas.com/askexpert" target="_blank"&gt;Ask the Expert board&lt;/A&gt;&amp;nbsp;to receive follow up Q&amp;amp;A, slides and recordings from other SAS Ask the Expert webinars.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 23 Apr 2024 14:27:49 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Ask-the-Expert/Why-Do-I-Need-SAS-Intelligent-Decisioning-and-SAS-Model-Manager/ta-p/925389</guid>
      <dc:creator>Crystal_Baker</dc:creator>
      <dc:date>2024-04-23T14:27:49Z</dc:date>
    </item>
    <item>
      <title>Email Authentication Mechanisms - an Introduction</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Email-Authentication-Mechanisms-an-Introduction/ta-p/925333</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H1&gt;Email Authentication Mechanisms – an Introduction:&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Email authentication is a set of techniques and protocols designed to verify the legitimacy of an email message and to prevent email fraud, such as phishing and spoofing. The goal is to ensure that the sender of an email is who they claim to be and that the content of the email has not been tampered with during transit. Email authentication helps in building trust between senders and recipients, reduces the likelihood of spam and phishing attacks, and improves overall email security. Several key authentication mechanisms are commonly used in email:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;SPF (Sender Policy Framework):&lt;/STRONG&gt; SPF is a framework that allows domain owners to specify which mail servers are authorized to send emails on behalf of their domain. This is achieved by publishing SPF records in the DNS (Domain Name System). Receiving mail servers can then check the SPF records to verify that an incoming email is sent from an authorized server.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DKIM (DomainKeys Identified Mail):&lt;/STRONG&gt; DKIM is a method for associating a domain name with an email message, allowing a person, role, or organization to claim some responsibility for the message. It involves the use of cryptographic signatures that are added to the email headers. The receiving mail server can verify the signature using the public key published in the DNS.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DMARC (Domain-based Message Authentication, Reporting, and Conformance):&lt;/STRONG&gt; DMARC builds on SPF and DKIM by providing a way for domain owners to set policies for how their emails should be handled if they fail authentication checks. DMARC also includes reporting features that allow domain owners to receive feedback on email authentication failures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;BIMI (Brand Indicators for Message Identification):&lt;/STRONG&gt; BIMI is a relatively newer standard that enables organizations to display their brand logos next to authenticated emails in the recipient's inbox. It relies on the combination of DMARC and a verified logo file that is referenced in the DNS.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By implementing these authentication mechanisms, email senders can demonstrate the legitimacy of their messages, and recipients can have greater confidence that the emails they receive are not forged or manipulated. Additionally, DMARC policies help prevent attackers from abusing a brand's domain for malicious purposes. Overall, email authentication is a crucial aspect of modern email security and is widely used to combat various forms of email fraud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;SPF:&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;Sender Policy Framework (SPF) is an email authentication method designed to detect forged sender addresses during the delivery of the email. It is part of the broader set of technologies aimed at preventing email spoofing and phishing. SPF allows the owner of a domain to specify which mail servers are authorized to send emails on behalf of that domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;How SPF works:&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;DNS Records:&lt;/STRONG&gt; The domain owner publishes SPF information in the Domain Name System (DNS). SPF records are TXT records that contain information about the authorized mail servers for that domain.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Receiving Mail Server Checks SPF Record:&lt;/STRONG&gt; When an email is received, the receiving mail server can check the SPF record of the sender's domain by querying the DNS for the SPF TXT record.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Validation:&lt;/STRONG&gt; The receiving mail server compares the IP address of the sending server against the list of authorized IP addresses specified in the SPF record. If the IP address matches one of the authorized servers, the email passes the SPF check.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Handling Failures:&lt;/STRONG&gt; If the SPF check fails, the receiving mail server can take various actions based on the SPF policy specified by the domain owner. This might include marking the email as suspicious, moving it to the spam folder, or even rejecting it outright.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SPF records use a simple syntax to specify which IP addresses are allowed to send emails on behalf of a domain. For example, a basic SPF record might look like this:&lt;/P&gt;
&lt;P&gt;In this example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;v=spf1&lt;/STRONG&gt; indicates the SPF version.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;ip4:192.168.1.1&lt;/STRONG&gt; allows the specific IP address 192.168.1.1 to send emails.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;include:spf.example.com&lt;/STRONG&gt; includes the SPF record of another domain (spf.example.com) in the check.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;-all&lt;/STRONG&gt; signifies a strict policy, indicating that if the IP address is not listed in the SPF record, the email should be treated as unauthorized.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SPF is just one component of email authentication. Other techniques like DKIM (DomainKeys Identified Mail) and DMARC (Domain-based Message Authentication, Reporting, and Conformance) are often used in conjunction with SPF to enhance email security. These mechanisms collectively help in reducing spam, phishing, and email spoofing.&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dietmarb_0-1713858014796.png" style="width: 400px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/95765i0FF9FE4D6ACE3D76/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dietmarb_0-1713858014796.png" alt="dietmarb_0-1713858014796.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;DKIM&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;DKIM functions as a cryptographic authentication method. It allows email receivers to verify that an email claiming to have come from a specific domain was indeed authorized by the owner of that domain. This verification process occurs by validating the cryptographic signature included with the email.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How DKIM works:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Message Signing&lt;/STRONG&gt;: When an email is sent, the sending mail server adds a unique DKIM signature header to the message. This signature is created using a private cryptographic key associated with the sending domain.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Public Key Retrieval&lt;/STRONG&gt;: The receiving mail server, upon receiving the email, retrieves the public key from the DNS records of the sender's domain.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Signature Verification&lt;/STRONG&gt;: Using the public key, the receiving server verifies the DKIM signature attached to the email. If the signature is valid and the message has not been altered in transit, the email is deemed authentic.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Benefits of DKIM&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced Email Deliverability&lt;/STRONG&gt;: DKIM-signed emails are less likely to be marked as spam or phishing attempts by email filters, thus improving deliverability rates.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mitigation of Spoofing and Phishing&lt;/STRONG&gt;: By verifying the authenticity of the sender, DKIM helps in reducing the risk of email spoofing and phishing attacks.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Builds Trust with Recipients&lt;/STRONG&gt;: Implementing DKIM instills confidence in recipients that the emails they receive are indeed from legitimate senders, fostering trust and credibility.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliance Requirements&lt;/STRONG&gt;: DKIM compliance is often a prerequisite for adhering to various industry regulations and standards, such as GDPR (General Data Protection Regulation) and HIPAA (Health Insurance Portability and Accountability Act).&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dietmarb_1-1713858014798.png" style="width: 400px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/95766iC7FD865C690CD04A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dietmarb_1-1713858014798.png" alt="dietmarb_1-1713858014798.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;DMARC&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;DMARC, which stands for Domain-based Message Authentication, Reporting, and Conformance, is an email authentication protocol and reporting system designed to combat email phishing and fraud. DMARC builds on the existing email authentication mechanisms SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) by providing a way for domain owners to specify how email failures should be handled and by offering reporting capabilities.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key components of DMARC:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Authentication Mechanisms:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;SPF (Sender Policy Framework):&lt;/STRONG&gt; Verifies that the sending mail server is authorized by the domain owner.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DKIM (DomainKeys Identified Mail):&lt;/STRONG&gt; Ensures that the email content has not been tampered with and is signed by the private key associated with the sending domain.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;DMARC Policies:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Domain owners publish DMARC policies in their DNS records. These policies instruct receiving mail servers on how to handle emails that fail SPF and/or DKIM checks.&lt;/LI&gt;
&lt;LI&gt;DMARC policies include:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;p=none (Monitoring Mode):&lt;/STRONG&gt; The domain owner is in "monitoring" mode, and no specific action is taken when authentication fails. However, detailed reports are generated and sent to the domain owner.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;p=quarantine:&lt;/STRONG&gt; The email should be treated with suspicion. Receiving mail servers may choose to deliver the email to the recipient's spam or quarantine folder.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;p=reject:&lt;/STRONG&gt; The email has failed authentication, and the receiving mail server should reject it outright. The strictest setting.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Reporting&lt;/STRONG&gt;&lt;STRONG&gt;:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;DMARC provides detailed reports (DMARC reports or aggregate reports) to domain owners about email authentication activity. These reports include information on emails that passed or failed authentication, including the sending IP addresses, SPF results, DKIM results, and more.&lt;/LI&gt;
&lt;LI&gt;These reports enable domain owners to monitor and analyze email authentication activity, identify potential issues, and take corrective actions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DMARC helps prevent email spoofing and phishing attacks by providing a mechanism for domain owners to assert control over their domains and protect their brand reputation. It also allows them to receive valuable feedback on email authentication failures, helping to improve the overall security of their email infrastructure. Many large email providers and organizations have adopted DMARC as part of their email security strategy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dietmarb_2-1713858014800.png" style="width: 400px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/95764i0D5602076A2EFF00/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dietmarb_2-1713858014800.png" alt="dietmarb_2-1713858014800.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;BIMI&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;BIMI, which stands for Brand Indicators for Message Identification, is an email authentication standard that aims to enhance email security and brand visibility. BIMI allows organizations to display their brand logos next to authenticated emails in the recipient's inbox. This visual indicator helps users quickly recognize legitimate emails from trusted senders and builds trust in the email communication.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Key components of BIMI:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;DMARC Authentication:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;BIMI relies on the DMARC (Domain-based Message Authentication, Reporting, and Conformance) protocol for email authentication. DMARC helps ensure that the sender's domain is legitimate and prevents email spoofing and phishing attacks.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Verified Mark Certificates (VMC):&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;To participate in BIMI, organizations need to obtain a Verified Mark Certificate (VMC). A VMC is a digital certificate that confirms the association between the sender's domain, the brand logo, and the DMARC authentication. It acts as a proof of authenticity for the brand logo.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;DNS Records:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;BIMI information is published in the DNS (Domain Name System) records of the sender's domain. This includes the location of the brand logo and the associated VMC.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Display of Brand Logo:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;When an email from a BIMI-enabled sender passes DMARC authentication, and the recipient's email client supports BIMI, the brand logo is displayed next to the email in the recipient's inbox. This provides a visual confirmation of the sender's authenticity.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;P&gt;The benefits of BIMI include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Brand Trust:&lt;/STRONG&gt; The presence of a recognizable brand logo next to an email can enhance trust and help users distinguish legitimate emails from potential phishing attempts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improved Email Deliverability:&lt;/STRONG&gt; BIMI is an additional incentive for organizations to implement DMARC authentication. Email providers may prioritize the delivery of authenticated emails, contributing to better deliverability rates.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Reduced Phishing Risks:&lt;/STRONG&gt; By visually verifying the authenticity of the sender, BIMI helps users identify phishing attempts more easily, reducing the risk of falling victim to fraudulent emails.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BIMI is an emerging standard, and its adoption is gradually increasing. As more organizations implement DMARC and obtain VMCs, BIMI has the potential to become a valuable tool in the fight against email fraud while providing a better user experience in email communication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 23 Apr 2024 09:10:39 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Email-Authentication-Mechanisms-an-Introduction/ta-p/925333</guid>
      <dc:creator>DietmarBurgfeld</dc:creator>
      <dc:date>2024-04-23T09:10:39Z</dc:date>
    </item>
    <item>
      <title>Comparing Alerting Capabilities of Alertmanager with Grafana</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Comparing-Alerting-Capabilities-of-Alertmanager-with-Grafana/ta-p/925286</link>
      <description>&lt;P&gt;&lt;A href="https://sww.sas.com/blogs/wp/gate/99197/comparing-alerting-capabilities-of-alertmanager-with-grafana/ssaajf/2024/04/02" data-auth="NotApplicable" data-linkindex="0" data-ogsc=""&gt;Comparing Alerting Capabilities of Alertmanager with Grafana&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 20:12:55 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Comparing-Alerting-Capabilities-of-Alertmanager-with-Grafana/ta-p/925286</guid>
      <dc:creator>AjmalFarzam</dc:creator>
      <dc:date>2024-04-22T20:12:55Z</dc:date>
    </item>
    <item>
      <title>Auditing user sessions in Viya 3.5 (update)</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Auditing-user-sessions-in-Viya-3-5-update/ta-p/925284</link>
      <description>&lt;P&gt;Auditing user sessions in Viya 3.5 (update)&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 20:10:25 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Auditing-user-sessions-in-Viya-3-5-update/ta-p/925284</guid>
      <dc:creator>AjmalFarzam</dc:creator>
      <dc:date>2024-04-22T20:10:25Z</dc:date>
    </item>
    <item>
      <title>Solving Linear Regression Models via Mathematical Programming: Ordinary Least Squares</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Solving-Linear-Regression-Models-via-Mathematical-Programming/ta-p/925233</link>
      <description>&lt;P&gt;Solving Linear Regression Models via Mathematical Programming: Ordinary Least Squares&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 13:58:53 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Solving-Linear-Regression-Models-via-Mathematical-Programming/ta-p/925233</guid>
      <dc:creator>ChanceTGardener</dc:creator>
      <dc:date>2024-04-22T13:58:53Z</dc:date>
    </item>
    <item>
      <title>Efficiently Modeling Interval Targets Using Bayesian Additive Regression Trees -Part 2</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Efficiently-Modeling-Interval-Targets-Using-Bayesian-Additive/ta-p/925207</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Efficiently Modeling Interval Targets Using Bayesian Additive Regression Trees -Part 2&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 09:36:38 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Efficiently-Modeling-Interval-Targets-Using-Bayesian-Additive/ta-p/925207</guid>
      <dc:creator>smanoj</dc:creator>
      <dc:date>2024-04-22T09:36:38Z</dc:date>
    </item>
    <item>
      <title>SAS Viya CLI container image in Azure DevOps (March 2024 Update)</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/SAS-Viya-CLI-container-image-in-Azure-DevOps-March-2024-Update/ta-p/925200</link>
      <description>&lt;P&gt;SAS Viya CLI container image in Azure DevOps (March 2024 Update)&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 08:33:35 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/SAS-Viya-CLI-container-image-in-Azure-DevOps-March-2024-Update/ta-p/925200</guid>
      <dc:creator>DavidEstreich</dc:creator>
      <dc:date>2024-04-22T08:33:35Z</dc:date>
    </item>
    <item>
      <title>SAS Visual Investigator:  It's Not JUST for Fraud</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/SAS-Visual-Investigator-It-s-Not-JUST-for-Fraud/ta-p/924895</link>
      <description>&lt;P&gt;Recently in the SAS Community Library: SAS'&amp;nbsp;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/14520"&gt;@BethEbersole&lt;/a&gt;&amp;nbsp;reveals 4 steps to stop money laundering, solve law-enforcement cases, find missing children and more with SAS Visual Investigator.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 15:04:36 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/SAS-Visual-Investigator-It-s-Not-JUST-for-Fraud/ta-p/924895</guid>
      <dc:creator>BethEbersole</dc:creator>
      <dc:date>2024-04-26T15:04:36Z</dc:date>
    </item>
    <item>
      <title>An Overview of Tripwires in SAS Law Enforcement Intelligence</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/An-Overview-of-Tripwires-in-SAS-Law-Enforcement-Intelligence/ta-p/924849</link>
      <description>&lt;P&gt;An Overview of Tripwires in SAS Law Enforcement Intelligence&lt;/P&gt;
&lt;P&gt;Everyone knows that in today’s world, we can use technology to our advantage in our everyday lives. Let’s say you need a last-minute birthday gift for your spouse. You go online, order, click and pay. Then you anxiously keep your phone next to you waiting for that ‘ding’ sound that you have a notification. DING! You can see the order has been processed. DING! The order has been packed. DING! A shipment label has been created. DING! Your package has been received by the shipping service. DING! The shipment is on its way. DING! The shipment is out for delivery. Technology is helping you keep a close eye on that package. You might even frantically check your location app and home cameras to see where your spouse is. You get the point. Since you are having it delivered to the house you want to get to the gift before your spouse does. DING! A cat walked into the view of your doorbell camera. UGH. It’s not what you need so you ignore it.&amp;nbsp;DING! It finally happens...&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2024 13:54:42 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/An-Overview-of-Tripwires-in-SAS-Law-Enforcement-Intelligence/ta-p/924849</guid>
      <dc:creator>RhondaWilliams</dc:creator>
      <dc:date>2024-04-19T13:54:42Z</dc:date>
    </item>
    <item>
      <title>Warning: Risk of Serious Harm!</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Warning-Risk-of-Serious-Harm/ta-p/924844</link>
      <description>&lt;P&gt;Warning: Risk of Serious Harm!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hindsight is 20/20. Haven’t we all heard that phrase before? I know I have. That’s something I said myself just a few years ago. It was November, the sun was starting to set, and the water was freezing cold. While exploring the shoreline in Myrtle Beach, South Carolina, with my family, I had fallen a little behind. At some point, I hurried on in an attempt to catch up. I was fully dressed in every-day clothes and had no plans of getting in the water. Every step I took was meticulously calculated to avoid getting wet. In fact, I was quite cautious as I was very aware that&amp;nbsp;I had my shiny brand-new cellphone in my pocket because I had been capturing precious moments of my family together.&amp;nbsp;Then it happened. No warning...&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2024 13:55:29 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Warning-Risk-of-Serious-Harm/ta-p/924844</guid>
      <dc:creator>RhondaWilliams</dc:creator>
      <dc:date>2024-04-19T13:55:29Z</dc:date>
    </item>
    <item>
      <title>SAS Innovate - SAS Studio Git Integration Links</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/SAS-Innovate-SAS-Studio-Git-Integration-Links/ta-p/924777</link>
      <description>&lt;P&gt;If you attended the SAS Innovate session on SAS Studio's Git integration capabilities, you may be interested in the links that were shown.&amp;nbsp; Here they are.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 02:00:46 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/SAS-Innovate-SAS-Studio-Git-Integration-Links/ta-p/924777</guid>
      <dc:creator>StephenFoerster</dc:creator>
      <dc:date>2024-04-18T02:00:46Z</dc:date>
    </item>
    <item>
      <title>Data to Databricks? No need to recode - get your existing SAS jobs to SAS Viya in the cloud!</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Data-to-Databricks-No-need-to-recode-get-your-existing-SAS-jobs/ta-p/924639</link>
      <description>&lt;P&gt;&lt;SPAN&gt;What if you could make your valuable and business-critical SAS Data Integration jobs work with Databricks in the cloud in a fraction of the time it would take to recode the jobs in another language or system? You can! Read this post to see how.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 14:57:48 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Data-to-Databricks-No-need-to-recode-get-your-existing-SAS-jobs/ta-p/924639</guid>
      <dc:creator>larsarne</dc:creator>
      <dc:date>2024-04-24T14:57:48Z</dc:date>
    </item>
    <item>
      <title>Exploring the Exciting World of AI: Insights from TRANSFORM in Berlin</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/Exploring-the-Exciting-World-of-AI-Insights-from-TRANSFORM-in/ta-p/923392</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Design ohne Titel (3).png" style="width: 999px;"&gt;&lt;img src="https://communities.sas.com/t5/image/serverpage/image-id/95409iFA53BD0C7DAD77D6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Design ohne Titel (3).png" alt="Design ohne Titel (3).png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Last month, I ventured into the heart of Berlin to attend TRANSFORM—an event dedicated to unravelling the mysteries of digital transformation, with a special focus on the remarkable world of artificial intelligence (AI). Let me take you through the journey, where innovation met inspiration at every turn.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TRANSFORM wasn't just any gathering; it was a buzzing hub of executives, decision-makers, and digital experts from various industries, all coming together to explore the ever-evolving landscape of technology-driven business revolution. Amidst the discussions and showcases, one theme stood out: the transformative power of AI.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;At TRANSFORM, we heard how AI isn't just a far-off idea anymore; it's already changing how businesses operate worldwide. Companies are using AI to do things like analyze data faster than ever before, create chatbots that help customers, and even predict trends in different industries like healthcare and finance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But here's the thing: while everyone talks about how important it is to change with the times, not many are actually doing it. Many people are still cautious and waiting to see what happens next. &lt;FONT face="arial,helvetica,sans-serif" color="#808080"&gt;But the truth is, the time to transform is now!&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Even though our company, SAS, wasn't on the big stage at TRANSFORM, we're still a big player in the AI world. We're recognized as leaders by Forrester Magazine, and we're helping hundreds of businesses use AI to make better decisions and serve their customers better.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When I came back from the event, I found an &lt;A href="https://reprints2.forrester.com/#/assets/2/202/RES180527/report" target="_self"&gt;article by Forrester&lt;/A&gt; that emphasized our role in shaping the future of AI. It was reassuring to see that our efforts were recognized, even we did get a spotlight on the event.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT face="arial black,avant garde" color="#003366"&gt;&lt;SPAN&gt;My wrap up&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;AI is changing the world, and we're part of that change. We might not be the ones standing on stage at big events, but that doesn't mean we're not making a difference. Whether we're recognized or not, our work is vital in shaping the future of technology and business.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As we move forward, let's remember that the journey into the future of AI is exciting and full of possibilities. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.sas.com/tr_tr/offers/ci360.geo.html" target="_self"&gt;&lt;SPAN&gt;We're in the game&lt;/SPAN&gt; &lt;SPAN&gt;and we're here to stay.&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 18 Apr 2024 09:53:54 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/Exploring-the-Exciting-World-of-AI-Insights-from-TRANSFORM-in/ta-p/923392</guid>
      <dc:creator>SarahMueller</dc:creator>
      <dc:date>2024-04-18T09:53:54Z</dc:date>
    </item>
    <item>
      <title>How Do I Clean My Data Using SAS Programming? Q&amp;A, Slides, and On-Demand Recording</title>
      <link>https://communities.sas.com/t5/Ask-the-Expert/How-Do-I-Clean-My-Data-Using-SAS-Programming-Q-amp-A-Slides-and/ta-p/924610</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;STRONG&gt;Watch this Ask the Expert session to learn programming tips and tricks for cleaning your data using SAS programming.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24351_1392389221" target="_blank" rel="nofollow noopener noreferrer noreferrer noreferrer noreferrer"&gt;&lt;SPAN class="cta-button-article"&gt;Watch the Webinar&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will learn about:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Issues to consider when cleaning character and numeric data.&lt;/LI&gt;
&lt;LI&gt;Using basic SAS procedures to clean data, such as PROC FREQ, PROC MEANS, PROC UNIVARIATE and PROC PRINT.&lt;/LI&gt;
&lt;LI&gt;Advanced techniques for cleaning data, including downloadable macros.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The questions from the Q&amp;amp;A segment held at the end of the webinar are listed below and the slides from the webinar are attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q&amp;amp;A&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Does data cleaning include the temporary files created by SAS?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I think of data cleaning as the process used to investigate values in permanent datasets. You often will create temporary files in that process and will inspect those as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How do you normalize observations that include street address?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;There is a great chapter in Ron Cody’s book about this. See Chapter 3 on Standardizing Data in &lt;A href="https://www.amazon.com/Codys-Cleaning-Techniques-Using-Third/dp/1629607967?ref_=ast_sto_dp" target="_blank"&gt;Cody’s Data Cleaning Techniques Using SAS&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I often run a proc contents before cleaning steps.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I assumed existing knowledge of the dataset variables in the webinar demonstrations. I agree- a necessary first step when cleaning an unfamiliar dataset is to run PROC CONTENTS to understand the variable names, types, and any formats.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I see Gender has a record with "f" lowercase!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, exactly. Expected values of Gender in the demonstration dataset are “M” or “F”. The lowercase “f” is a data error that should be addressed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why is there a space in "Patient " and "patient number " etc.?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;SAS is writing the PUT statement text exactly as printed within the quotation marks. There is a space after “Patient” and “patient number” so that there will be a space between the text and the printed variable value that comes next in the sentence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please recommend additionally helpful SAS certification for a clinical trial programmer using SAS 9.4, other than "certification of SAS Certified Professional using SAS 9.4”, and please recommend the study material and books for SAS clinical trial programmers.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;SAS released a new version of the &lt;A href="https://www.sas.com/en_us/certification/credentials/foundation-tools/clinical-trials-programming.html" target="_blank"&gt;Clinical Trials Programmer Professional certification&lt;/A&gt; in 2023. The &lt;A href="https://www.sas.com/en_us/certification/training-exam-preparation.html#d71e7c78-6041-4a75-8226-f900833aa12c" target="_blank"&gt;practice materials&lt;/A&gt; for this exam list several excellent resources for SAS clinical trial programmers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can notdigit function check numbers like 9.83 or there is separate function for that?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Note that the &lt;A href="https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/lefunctionsref/p1m0n4833qyto5n1e793r44uuozv.htm" target="_blank"&gt;NOTDIGIT function&lt;/A&gt; is applied to a character variable only. It cannot be applied to a numeric variable. If you applied the NOTDIGIT function to the character string “9.83”, it would return the position of the decimal, which is 2. I assume from your question, that you would like a function to return zero for a string that includes only numbers or a decimal point.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Switch to the &lt;A href="https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/lefunctionsref/n1mdh2gvd5potjn14jipysvzn4o7.htm" target="_blank"&gt;FINDC function&lt;/A&gt; in this case. By default, this searches a character string for the first position of any character in a provided list of characters. When you add the “K” modifier, you can search for the first position of a character that is NOT in the list of characters provided. The expression &amp;nbsp;FINDC(“9.83”, “0123456789.”, “K”) looks for the position of the first character that is not a number or decimal point. Since “9.83” contains only numbers and a decimal point, the expression returns 0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why does $Gender_Check format not work for missing records in proc freq? How do we make it work?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The formatted value “Missing” in the $Gender_Check format is not printed, since the default behavior of PROC FREQ is to exclude missing values from the table. To include missing values in the table, add the MISSING option to the TABLES statement. For example: TABLES GENDER / MISSING.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can you use ODS to change the output destination for the file print statement to someplace other than the results viewer?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You can send the output from the FILE PRINT statement to ODS destinations by including the appropriate &lt;A href="https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/odsug/p12kuaym0e53mpn1o818euwkk7pk.htm" target="_blank"&gt;ODS statements&lt;/A&gt; around the DATA _NULL_ step. For example- adding &lt;A href="https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/odsug/p1vvsv8ucnjzjnn1wq5wrlp74mdb.htm" target="_blank"&gt;ODS RTF and ODS RTF CLOSE&lt;/A&gt; around the DATA _NULL_ step will send the output to a Microsoft Word file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Is there a reference document with these commands that can be accessed by webinar participants?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Demonstrations in this webinar were taken from the book &lt;A href="https://www.amazon.com/Codys-Cleaning-Techniques-Using-Third/dp/1629607967?ref_=ast_sto_dp" target="_blank"&gt;Cody’s Data Cleaning Techniques Using SAS&lt;/A&gt; by Ron Cody. The author’s &lt;A href="https://support.sas.com/en/books/authors/ron-cody.html" target="_blank"&gt;SAS Press web page&lt;/A&gt; includes a link to download all the code in the book for free.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can you ask SAS to run the top 10 (or other n) highest and lowest values in proc univariate, instead of top/lowest 5?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, you can use the &lt;A href="https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/procstat/procstat_univariate_syntax01.htm" target="_blank"&gt;NEXTROBS option on the PROC UNIVARATE statement&lt;/A&gt; to customize the number of extreme values printed. This is covered later in the webinar.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Also, please recommend SAS study materials and books that cover CDISC standard integration.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The best search for SAS Press books is now on &lt;A href="https://sasinstitute.redshelf.com/" target="_blank"&gt;Redshelf&lt;/A&gt;. I recommend you put CDISC into the “Search for Titles” field. The newest book I recommend is &lt;A href="https://sasinstitute.redshelf.com/app/ecom/book/2158457/an-introduction-to-creating-standardized-clinical-trial-data-with-sas-2158457-9781955977975-todd-case-yuting-tian" target="_blank"&gt;An Introduction to Creating Standardized Clinical Trial Data with SAS by Case and Tian&lt;/A&gt;. Another favorite of mine is &lt;A href="https://sasinstitute.redshelf.com/app/ecom/book/1878344/implementing-cdisc-using-sas-1878344-9781642952414-chris-holland-jack-shostak" target="_blank"&gt;Implementing CDISC Using SAS by Holland and Shostak&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;It is a question related to the output result for Gender variable. Can we show the results in order for invalid values to be shown first and the missing values appear next, etc.; OR is this shown based on the patient ID number ascending?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In places where the code uses a PUT statement within a DATA step, notes about invalid data are printed to the screen in the order that observations are processed in the input dataset. You could sort the input dataset by patient number or another variable to customize the order of the output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;When using a conditional 2nd set statement - does that Concatenate the 2nd DS brought in or interleave it w/the 1st DS?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;See the response to the next question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What does "set Tmp" do in the statement if &lt;EM&gt;_n_&lt;/EM&gt;=1 then set Tmp?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In this example, we applied two SET statements. The first read in the PATIENTS dataset via the statement: SET PATIENTS. The second SET statement conditionally read in the TMP dataset via the statement: IF _N_=1 THEN SET TMP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The automatic variable _N_ counts the observation number in a SAS dataset. On the first iteration of the DATA step, _N_ is set to 1, so the condition IF _N_=1 is true, and the TMP dataset is read with the second SET statement. The dataset TMP has one observation and two variables. The values of these two variables are brought into the program data vector (memory used in DATA step processing). On the next iteration of the DATA step, _N_=2, so the condition IF _N_=1 is false, and the TMP dataset is not read in again. The data values from the TMP dataset are retained and not set back to missing, since no additional rows are read. Because of this, the data values in the TMP dataset are retained for all observations in the dataset. The variables coming in from the TMP dataset have the same value for all observations, so are constants.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;My programmers claim the techniques being used here (e.g., Proc Print) are 'old fashioned'. What do you think?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I think printing a dataset to look at it will never be old fashioned- ha! Certainly, many advanced programming techniques were not covered, for example, PROC SQL and more sophisticated statistical techniques. This webinar also assumes the programmer does want to look at individual observations in a dataset. Automated data cleaning techniques that do not require visual inspection are also available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For someone that is completely new to SAS, will the book be good for beginners?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For someone completely new to SAS, I recommend &lt;A href="https://www.amazon.com/Learning-SAS-Example-Programmers-Second-ebook/dp/B07FN2WTHT/ref=sr_1_1?crid=17BRK5I7DYXGF&amp;amp;dib=eyJ2IjoiMSJ9.w1_6HhL2BM2QryBIOM0OgtQCHMJHEuxH7ssMwIup0mm9NWxQFiwalaL-lxk9yLgTudUkOxuUxi23mZX3NKY6QrcbBK5Ch5CZUWvksomAX3NbLjSJRpfkslJ2dUUzZ6alis5VBHOyGelrkRhittOlYoJ9mXOMoL-sXWZe1q0U_3loOcj_f2zdUwljqgNG5GJz8PypCdqZTko7CJikrIE_P0p0OJobKJUgbblx3mN_pcg.cp56ZZHWdEerj0ni871sRGwYFBdc3Lz1cQWS4cK5cIQ&amp;amp;dib_tag=se&amp;amp;keywords=learning+sas+by+example&amp;amp;qid=1712849224&amp;amp;s=digital-text&amp;amp;sprefix=learning+sas+by+example%2Cdigital-text%2C73&amp;amp;sr=1-1" target="_blank"&gt;Learning SAS by Example: A Programmer’s Guide, by Ron Cody&lt;/A&gt;. This book goes through the basics of SAS programming syntax, which is not covered in Ron Cody’s book Data Cleaning Techniques Using SAS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;If I have 2 million rows, can I still use these procedures to clean the data in SAS?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Mostly likely, no. These techniques assume the programmer has enough time to inspect individual observations in a dataset and has a desire to edit individual data values if errors are found. For large datasets, neither of these is usually true. Data cleaning is often automated when analyzing large datasets, which is to say that dataset-wide rules are applied without looking at the data. For example, you might collapse small categories of a categorical variable into one category, truncate outliers, and replace missing data with the variable’s mean or median, all without looking at individual observations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Many times, I feel I forget functions and can't remember them all. Also, I can see many new keywords used here. How to remember them all and use at work?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I too don’t remember many function names. I often consult the &lt;A href="https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/lefunctionsref/n01f5qrjoh9h4hn1olbdpb5pr2td.htm" target="_blank"&gt;list of functions in the SAS documentation&lt;/A&gt; or use Google to find documentation for a particular SAS procedure when I cannot remember the statement syntax. Make sure to use the &lt;A href="https://support.sas.com/en/documentation.html" target="_blank"&gt;SAS documentation&lt;/A&gt;! Much of the SAS documentation can also be output as a PDF document, which you can then download and search. Look for the PDF link in the upper right of many SAS documentation pages.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why did you not cross the formatted values with the original variable to see which values fell into which category?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We applied a format to tabulate values of variable so it could take only three possible values – Valid, Missing, or Error. You could cross-tabulate these formatted values by the original unformatted variable to see which values of the original variable were the errors. The FREQ procedure does allow you to cross-tabulate a variable by itself (for example, TABLES GENDER*GENDER), but its FORMAT statement does not allow you to apply a format to only one of the two variable references. In order to cross-tabulate formatted and unformatted versions of a variable, you would need to create a new variable with the formatted values, then cross-tabulate it with the original unformatted variable. Creating a new variable was beyond the scope of this example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Recommended Resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24361_72374593" target="_blank"&gt;Cody’s Data Cleaning Techniques Using SAS on RedShelf&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24361_877335415" target="_blank"&gt;Cody’s Data Cleaning Techniques Using SAS on Amazon&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24361_1493585360" target="_blank"&gt;Ron Cody SAS Author Page&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.sas.com/gms/redirect.jsp?detail=PLN24361_1080121084" target="_blank"&gt;SAS OnDemand for Academics Software for Students, Educators, and Independent Learners&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Please see additional resources in the attached slide deck.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Want more tips? Be sure to subscribe to the&amp;nbsp;&lt;A href="http://communities.sas.com/askexpert" target="_blank"&gt;Ask the Expert board&lt;/A&gt;&amp;nbsp;to receive follow up Q&amp;amp;A, slides and recordings from other SAS Ask the Expert webinars.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 16 Apr 2024 20:50:06 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Ask-the-Expert/How-Do-I-Clean-My-Data-Using-SAS-Programming-Q-amp-A-Slides-and/ta-p/924610</guid>
      <dc:creator>JackieJ_SAS</dc:creator>
      <dc:date>2024-04-16T20:50:06Z</dc:date>
    </item>
    <item>
      <title>How to understand Chaos Theory Part 2: Using Logistic Map to visualize a Bifurcation</title>
      <link>https://communities.sas.com/t5/SAS-Communities-Library/How-to-understand-Chaos-Theory-Part-2-Using-Logistic-Map-to/ta-p/924600</link>
      <description>&lt;P&gt;How to understand Chaos Theory Part 2: Using Logistic Map to visualize a Bifurcation&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2024 13:38:48 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Communities-Library/How-to-understand-Chaos-Theory-Part-2-Using-Logistic-Map-to/ta-p/924600</guid>
      <dc:creator>DeeMckoy</dc:creator>
      <dc:date>2024-04-19T13:38:48Z</dc:date>
    </item>
  </channel>
</rss>

