Sharepoint this operation requires that microsoft project professional 2013 is installed free
You can store up to 30 million sharepoint this operation requires that microsoft project professional 2013 is installed free or files in a list or library. Filtered views of large lists have a similar experience to other lists.
However, when a list view shows more than items, you may run into a list view threshold error. Views showing many items work best in the modern microslft. To avoid errors you might see in the classic experience, use the modern experience.
When you filter or thiis by a column that doesn’t have an index, an error dialog could appear. Note: Automatic index creation when sorting in the modern experience is limited to lists and libraries with less than 20, items.
If an error occurs when working with a large list, edit your list view. The following four changes remove list view threshold errors. Make all four changes to remove all the errors. Remove sorting for the list view. Note: Columns with column types like people, lookup, or managed metadata can cause list view threshold errors when sorting. However, you can use text, number, date, and other column types in the first sort.
Remove grouping profesional edit view. From both First group by the column and Then group by the column ,select None. Other edits for the list view. Note: Displaying 12 or more columns of sharepolnt following types can cause a list view threshold error: people, lookup, and managed metadata.
Mictosoft columns of other types will not. When SharePoint constructs the list forms, all the fields available for the list item are retrieved from eequires database. Lists with a large number of Lookup columns may result in complex and potentially intensive SQL statements. SharePoint will verify the length of the full SQL statement and will display this error message in case that the maximum allowed length was exceeded:.
Please shorten the new entries or remove some fields from this list. In addition to standard lookup columns, single-value managed metadata, multiple-value managed metadata, single-value professiojal and group columns, and microosft people and group columns count as lookup columns. Each lookup column in a list view causes a join with another table. Each additional lookup column increases the complexity and inherently the size of the backend SQL query.
There are sharepoint this operation requires that microsoft project professional 2013 is installed free ways you can work with or query a SharePoint list or library without receiving a List View Threshold warning.
Using the following ideas, you can get the info you need and stay within the item List Shatepoint Threshold. For more info http://replace.me/15031.txt the List View Threshold itself, see Overview of lists and shagepoint with many items. SharePoint has resource throttles frde limits that govern the amount of data and throughput that can sharepoint this operation requires that microsoft project professional 2013 is installed free managed.
The List View Threshold is, by default, approximately items, and is set to allow users to work with large lists, but keep good instaled. There are three main ways to work with the List View Threshold:. For all versions of SharePoint, manage the number of http://replace.me/10417.txt returned using indexing, filtering, folders, читать полностью offline data.
For SharePoint, this limit can’t be changed, and is in place 24 x 7 to allow users on shared tenants to always have good performance on queries. To work around the limit, we’ve outlined some actions you can do shharepoint keep your queries within the limit.
Note: You may occasionally see a higher number of items returned in system generated views. Index and filter Planning and creating indexes, and using them in filters can keep the number of items to under the List View Threshold. Using folders to organize You can use folders to organize sharepoint this operation requires that microsoft project professional 2013 is installed free effectively, though adobe premiere pro cc 2014 update free should be careful not to have a query on the folder return more than the List View Threshold.
For more info, see Create a folder in a required or Create a folder in a document library. Using Document operatkon site A Document center is a template that can be used to create a site with features geared for document search, storage, and manipulation. With the right permissions, больше на странице can create a site or subsite with this sharepoint this operation requires that microsoft project professional 2013 is installed free.
For more info, see Use a Document Center site. Synced and offline data Taking data offline allows you to use Excel or Access to query your list data without limits. When you sync a по ссылке folder, you can work locally on your computer, and changes are updated to the server automatically.
However, because there’s more control by network administrators, a Daily Time Window can be set where the limits are effectively removed, allowing large queries as well as other data intensive operations to be done. This time is usually in the evening professiomal most users are not on the system. The administrator can also choose to raise the insttalled if appropriate.
The last choice, also with Server versions of SharePoint, is to change the limit. This is risky because a larger limit increases mifrosoft possibility of affecting the performance for some or all users. If you’re blocked by the List View Threshold, but your total number of items is less than 20, you can add indexes to columns in SharePoint On all versions of SharePoint, you can create a filtered view with a column index prfoessional help reduce the number of results mjcrosoft working with large lists and libraries.
Creating a filtered view with an indexed column is a two-step process: create an index for a rsquires, and then create a view that uses the indexed column to filter the view. For more info about indexing columns, see Add an index to a SharePoint column. For more info about filtering columns, see Use filtering nistalled modify a SharePoint view. Although folders are not required to use large lists and libraries, you can still use them to help organize your data and improve the efficiency of your data access.
Folder creation is enabled by default in document libraries, but not in lists. Note: With SharePoint, if you use the Move to command or drag and drop, existing metadata is moved as well. When you create a folder, behind the scenes, you are creating an internal index. This internal index is also created for the root folder, or top-level of a list or library. When you access items in a folder, mkcrosoft are effectively using this internal index to access the data.
Bear in mind that if a folder contains subfolders, each subfolder is counted as an item but not any items in that subfolder. Even when the total number of items in a list or library is very large, a view of a single folder is at least as fast as a view that filters the total number of items by using an indexed column.
In some scenarios, it may be possible to distribute all the items in a list or library into multiple folders such that no folder has more than 5, items. It is important to consider shsrepoint following when you use folders to organize a large shatepoint or library:. A folder can contain more us than the List View Threshold, but to avoid being blocked, you may still need to use a filtered view based on column indexes. If you choose the Show all items without folders option in the Folders section when you create or modify a view in this list or library, you must then use a filter that is based on a ibstalled index to ensure you don’t reach the List View Threshold.
It prfessional often useful to make the default view show all the available folders without any filtering so that users can choose the appropriate folder when they insert new items. Displaying all the folders also makes it less likely that items will be incorrectly added outside the folders in the list or library.
Unlike libraries, there is no automatic way to move items between folders in a list. Note: If you move items into the SharePoint recycle bin, those items will still be counted when determining whether the filter expression exceeds the List View Syarepoint.
If inshalled clear the recycle bin they are no longer counted. For more info, see Empty the recycle bin or restore your files. To move files between folders in a library, see Move or copy a folder, file, or link in a document library. Deleting large lists requires database resources that can be blocked by the List View Threshold. Try to delete large lists during the Daily Time Window to avoid blocking. Remember that if the deletion process takes longer than the allotted window, it will continue until complete, regardless of other users.
Allow enough time. For more info about how to delete a list, see Delete thatt list in SharePoint. Taking data offline is often more convenient and efficient when you sync with your computer. You can use Excel, Access, or Outlook, depending on the list data you’re working with. You sharepoin make changes on your desktop or laptop computer, and then when you bring the data back online, synchronize changes and resolve requores in a smooth and efficient way.
Working with large lists by using offline synchronization to “scrub,” analyze, or report data, helps off-load database activity, and minimize use of SharePoint resources. You can take list data offline and synchronize changes when you come back online by using several Microsoft Office products.
To export to these, you need to have the apps sharepoint this operation requires that microsoft project professional 2013 is installed free, either Microsoft or Office desktop. Microsoft Access Access can handle more rows of data than SharePoint, and you oroject many powerful tools to manipulate that data.
Working with your data in Access and opeeation with SharePoint can let you work with larger data sets. You can read and write most native lists from Access by linking to them, and Access works well with virtually all Ooeration data types. Linking lets you connect to data in a SharePoint перейти, so that ссылка на подробности create a two-way connection to нажмите чтобы прочитать больше and edit the latest data both in the SharePoint list and your Access database.
Access creates a copy of or replicates the SharePoint list in an Access table. After the Access table has been created, you can work with list data in Access up to the Access limit of two gigabytes excluding any attachments which are not stored locally. Furthermore, Access caches the list data resuires the client, uses an efficient in-memory, write-through cache, and only transfers changed list items. All of which makes queries and updates perform much faster. A conflict resolution dialog box also helps to manage conflicting updates in a smooth way.
If the Access Services feature is activated, then you can work with considerably more data than the List View Threshold, up to 50, items by default.
Access operatikn processes list or library data in small batches and then reassemble the data, a technique that enables working with substantially more data than the List View Threshold, and without adversely impacting other users on the SharePoint site. For more sharepoint this operation requires that microsoft project professional 2013 is installed free, see Using Как сообщается здесь Services.
Microsoft Excel You can export SharePoint lists sharepoint this operation requires that microsoft project professional 2013 is installed free an Excel table which creates a one-way data connection between the Excel table and the SharePoint list. Excel also lets you work with large lists without blocking. Additionally, you can sync Excel with both SharePoint and Access to take advantage of the benefits of each platform. When you update your data from the SharePoint list and refresh the Excel table, Microsoft Excel replaces the Excel data with the latest SharePoint list data, overwriting any changes that you made to that Excel table.
Sharepoint this operation requires that microsoft project professional 2013 is installed free.Microsoft Visio – Quick Guide
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. This is an open-source article with the community providing support for it. For official Microsoft content, see Microsoft documentation. As with any technology, there are lots of terms we toss around to explain things.
Just understanding what each term means can be half the battle. Whether you are entirely new to Microsoft or have been using it for years, there are always new terms to learn. The fact that Microsoft uses common English words for many capabilities can add an additional layer of confusion.
This Glossary is an attempt to demystify some of the terms and acronyms we use every day in working with the platform. See one missing? Feel free to add an Issue with what you want added. Also consider checking out the additional glossaries listed in the Additional Resources section. Azure Active Directory Azure AD access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments.
User’s access can be reviewed on a regular basis to make sure only the right people have continued access. There is no limit to what people can achieve when technology reflects the diversity of all who use it.
Microsoft are dedicated to providing accessibility tools and features that help people achieve more at home, school, and work. AD FS extends the ability to use single sign-on functionality that is available within a single security or enterprise boundary to Internet-facing applications to enable customers, partners, and suppliers a streamlined user experience while accessing the web-based applications of an organization.
Activity explorer provides a historical view of activities on your labeled content. The activity information is collected from the Microsoft unified audit logs, transformed, and made available in the Activity explorer UI. Activity explorer reports on up to 30 days worth of data. Adaptive Cards are a platform-agnostic method of sharing and displaying blocks of information without the complexity of customizing CSS or HTML to render them. Adaptive scopes as a new feature is currently in preview and subject to change.
The alternative option is a static scope, which provides the same behavior before adaptive scopes were introduced and can be used if adaptive scopes don’t meet your business requirements. Administrative units restrict permissions in a role to any portion of your organization that you define. You could, for example, use administrative units to delegate the Helpdesk Administrator role to regional support specialists, so they can manage users only in the region that they support.
The Advanced eDiscovery solution in Microsoft builds on the existing Microsoft eDiscovery and analytics capabilities. Advanced eDiscovery provides an end-to-end workflow to preserve, collect, analyze, review, and export content that’s responsive to your organization’s internal and external investigations. You can use the alert policy and alert dashboard tools in the Microsoft Purview compliance portal or the Microsoft Defender portal to create alert policies and then view the alerts generated when users perform activities that match the conditions of an alert policy.
Always On VPN provides a single, cohesive solution for remote access and supports domain-joined, nondomain-joined workgroup , or Azure AD—joined devices, even personally owned devices. An App is a term in SharePoint that means a packaged extension or customization that you can add to a site. An app can simply be a list that you add to a site to store information, or it can be a package that installs web parts that are available to use on pages, customizations that give you extra functionality within existing lists and libraries, or it could be an entire application that runs outside of SharePoint but has the ability to read and write back to your SharePoint site.
The first step in acquiring solutions is to have an App Catalog you can use to store and distribute solutions. Set of standards and processes to analyze, design, build, test and deploy a software solution. Modern ALM typically is an iterative process which allows for the incremental improvement and development and implementation of application features. App protection policies APP are rules that ensure an organization’s data remains safe or contained in a managed app.
A policy can be a rule that is enforced when the user attempts to access or move “corporate” data, or a set of actions that are prohibited or monitored when the user is inside the app.
A managed app is an app that has app protection policies applied to it, and can be managed by Intune. Azure Active Directory’s Application Proxy provides secure remote access to on-premises web applications.
After a single sign-on to Azure AD, users can access both cloud and on-premises applications through an external URL or an internal application portal. If your organization has Microsoft E5 or Microsoft Defender for Office Plan 2, which includes Threat Investigation and Response capabilities, you can use Attack simulation training in the Microsoft Defender portal to run realistic attack scenarios in your organization.
These simulated attacks can help you identify and find vulnerable users before a real attack impacts your bottom line. Use the audit log search tool in Microsoft Purview compliance portal to search the unified audit log to view user and administrator activity in your organization.
The Microsoft Authenticator app provides an additional level of security to your Azure AD work or school account or your Microsoft account and is available for Android and iOS.
With the Microsoft Authenticator app, users can authenticate in a passwordless way during sign-in, or as an additional verification option during self-service password reset SSPR or Azure AD Multi-Factor Authentication events.
Azure Active Directory is the Microsoft source for all identity management, and much more. Azure AD Connect is an on-premises Microsoft application that’s designed to meet and accomplish your hybrid identity goals. Azure AD Connect cloud sync is new offering from Microsoft designed to meet and accomplish your hybrid identity goals for synchronization of users, groups and contacts to Azure AD.
However, it can be used alongside Azure AD Connect sync. A cloud solution that supports labeling of documents and emails to classify and protect information. Labeled items can be protected by encryption, marked with a watermark or restricted to specific actions or users and is bound to the item. The Microsoft commercial marketplace is a catalog of solutions from our independent software vendor ISV partners. Your solutions are listed together with our Microsoft solutions, connecting you to businesses, organizations, and government agencies around the world.
Azure Virtual Desktop is a desktop and app virtualization service that runs on the cloud. With Azure Virtual Desktop, you can set up a scalable and flexible environment. Azure Active Directory Azure AD business-to-business B2B collaboration is a feature within External Identities that lets you invite guest users to collaborate with your organization.
Azure Active Directory B2C provides business-to-customer identity as a service. Your customers use their preferred social, enterprise, or local account identities to get single sign-on access to your applications and APIs.
Always a hot topic. There is no native traditional backup and restore capability within Microsoft Third-party products are available, but are they worth it, and are they needed? The debate goes on. Learn how to buy and manage business subscriptions, perform license management tasks, and manage billing and payments for your business accounts with Microsoft. Microsoft Bookings is for scheduling and managing appointments.
As you develop your strategy to enable employees to work remotely on their own devices BYOD , you need to make key decisions in the scenarios to enable BYOD and how to protect your corporate data. Fortunately, EMS offers all of the capabilities you need in a comprehensive set of solutions.
Microsoft Business Premium brings together best-in-class Office apps and powerful cloud services with comprehensive security that helps protect your business against advanced cyber threats. Get work done and increase efficiency with Microsoft Collaborate in real time with teamwork tools that are always up to date.
Plus, get professional email and online storage—all with built-in security to help keep your data safe. Calendars in Exchange Online mailboxes are available for users. Shared, Resource, and Room mailbox calendars are also available.
In programming, Camel case is the practice of naming variables or controls by capitalizing all words except the first, giving the name a look like a camel’s hump. Examples: iPad , intQuantity , myEmailAddress.
See Wikipedia. Also see Pascal Case. An XML fragment used by SharePoint to define the internal structure of sites, lists, fields, views and content types, declaratively, also used to query data in SharePoint lists to selectively retrieve data. Channels in Microsoft Teams are dedicated sections within a team to keep conversations organized by specific topics, projects, and disciplines!
Files that you share in a channel on the Files tab are stored in SharePoint. Classic SharePoint uses master pages and page layouts for content structuring. These capabilities were built on the. NET framework. Column Formatting is a SharePoint feature that allows users to customize the display of fields in Document Libraries and Lists.
Colors, icons, images and other elements are used to highlight content and improve the user experience. Links are used to make content actionable. Some columns types, like Date and Choice, include ready made design templates. All column types allow for advanced formatting using JSON code. Protecting sensitive information and detecting and acting on workplace harassment incidents is an important part of compliance with internal policies and standards.
Communication compliance in Microsoft helps minimize these risks by helping you quickly detect, capture, and take remediation actions for email and Microsoft Teams communications.
These include inappropriate communications containing profanity, threats, and harassment and communications that share sensitive information inside and outside of your organization.
A Communication Site is generally used to communicate from a smaller group to a larger group. For this reason, Communication Sites are often used in Intranets. The Microsoft Technical Community is a wonderful place. If you are not using it then you are truly missing out. If your organization needs to comply with legal or regulatory standards, start with the link to the left to learn about compliance in Microsoft The Microsoft Purview compliance portal provides easy access to the data and tools you need to manage to your organization’s compliance needs.
Conditional Access is at the heart of the new identity-driven control plane. A content delivery network CDN is a distributed network of servers that can efficiently deliver web content to users.
CDNs’ store cached content on edge servers in point-of-presence POP locations that are close to end users, to minimize latency. The data classification content explorer allows you to natively view the items that were summarized on the overview page from within the Microsoft Purview compliance portal. The content returned is limited to only the site collection the web part is in.
Sharepoint this operation requires that microsoft project professional 2013 is installed free.Selected Financial Data
Office is one of the best products ever released by Microsoft and it can even be considered as a must-have for millions of users out there. Updates are frequently rolled out to continuously improve the Office suite, so it currently comes with a very attractive interface that keeps features a bit more organized, so that users can now benefit easier from its innovative functions. Installing Microsoft Office might seem a little tricky, since there are a lot of tools bundled into the installation kit, so computer knowledge can come in handy when trying to deploy a fresh copy of the software.
Also, copying all files usually takes a while, even in the case of fast computers, since there are a lot of files that need to be transferred on the hard disks. Those who have not used an office suite before, be it Microsoft Office, OpenOffice or any other similar software, need to take the time to adjust to the interface. At the first glance, due to the well-known ribbon interface, the app might seem familiar.
In particular, we use data to:. We also use the data to operate our business, which includes analyzing our performance, meeting our legal obligations, developing our workforce, and doing research. In carrying out these purposes, we combine data we collect from different contexts for example, from your use of two Microsoft products or obtain from third parties to give you a more seamless, consistent, and personalized experience, to make informed business decisions, and for other legitimate purposes.
Our processing of personal data for these purposes includes both automated and manual human methods of processing. Our automated methods often are related to and supported by our manual methods.
For example, our automated methods include artificial intelligence AI , which we think of as a set of technologies that enable computers to perceive, learn, reason, and assist in decision-making to solve problems in ways that are similar to what people do.
To build, train, and improve the accuracy of our automated methods of processing including AI , we manually review some of the predictions and inferences produced by the automated methods against the underlying data from which the predictions and inferences were made.
For example, we manually review short snippets of voice data that we have taken steps to de-identify to improve our speech recognition technologies.
Microsoft uses the data we collect to provide you rich, interactive experiences. For these purposes, we combine data we collect from different contexts for example, from your use of two Microsoft products. For example, Cortana may use information from your calendar to suggest action items in a heads-up email, and Microsoft Store uses information about the apps and services you use to make personalized app recommendations.
However, we have built in technological and procedural safeguards designed to prevent certain data combinations where required by law.
For example, where required by law, we store data we collect from you when you are unauthenticated not signed in separately from any account information that directly identifies you, such as your name, email address, or phone number. When we transfer personal data from the European Economic Area, we do so based on a variety of legal mechanisms, as described in the Where we store and process personal data section of this privacy statement.
We share your personal data with your consent or to complete any transaction or provide any product you have requested or authorized. We also share data with Microsoft-controlled affiliates and subsidiaries; with vendors working on our behalf; when required by law or to respond to legal process; to protect our customers; to protect lives; to maintain the security of our products; and to protect the rights and property of Microsoft and its customers. We share your personal data with your consent or as necessary to complete any transaction or provide any product you have requested or authorized.
For example, we share your content with third parties when you tell us to do so, such as when you send an email to a friend, share photos and documents on OneDrive, or link accounts with another service. If you use a Microsoft product provided by an organization you are affiliated with, such as an employer or school, or use an email address provided by such organization to access Microsoft products, we share certain data, such as interaction data and diagnostic data to enable your organization to manage the products.
When you provide payment data to make a purchase, we will share payment data with banks and other entities that process payment transactions or provide other financial services, and for fraud prevention and credit risk reduction. In addition, we share personal data among Microsoft-controlled affiliates and subsidiaries. We also share personal data with vendors or agents working on our behalf for the purposes described in this statement. For example, companies we’ve hired to provide customer service support or assist in protecting and securing our systems and services may need access to personal data to provide those functions.
In such cases, these companies must abide by our data privacy and security requirements and are not allowed to use personal data they receive from us for any other purpose. We may also disclose personal data as part of a corporate transaction such as a merger or sale of assets.
Finally, we will retain, access, transfer, disclose, and preserve personal data, including your content such as the content of your emails in Outlook. For more information about data we disclose in response to requests from law enforcement and other government agencies, please see our Law Enforcement Requests Report.
Please note that some of our products include links to or otherwise enable you to access products of third parties whose privacy practices differ from those of Microsoft.
If you provide personal data to any of those products, your data is governed by their privacy policies. You can also make choices about the collection and use of your data by Microsoft.
You can control your personal data that Microsoft has obtained, and exercise your data protection rights, by contacting Microsoft or using various tools we provide. In some cases, your ability to access or control your personal data will be limited, as required or permitted by applicable law. How you can access or control your personal data will also depend on which products you use. For example, you can:. Not all personal data processed by Microsoft can be accessed or controlled via the tools above.
If you want to access or control personal data processed by Microsoft that is not available via the tools above or directly through the Microsoft products you use, you can always contact Microsoft at the address in the How to contact us section or by using our web form. We provide aggregate metrics about user requests to exercise their data protection rights via the Microsoft Privacy Report. You can access and control your personal data that Microsoft has obtained with tools Microsoft provides to you, which are described below, or by contacting Microsoft.
For instance:. You can also object to or restrict the use of your personal data by Microsoft. For example, you can object at any time to our use of your personal data:. If your organization, such as your employer, school, or service provider, provides you with access to and is administering your use of Microsoft products, contact your organization to learn more about how to access and control your personal data. You can access and control your personal data that Microsoft has obtained, and exercise your data protection rights, using various tools we provide.
The tools most useful to you will depend on our interactions with you and your use of our products. Here is a general list of tools we provide to help you control your personal data; specific products may provide additional controls. We will respond to requests to control your personal data as required by applicable law.
You can choose whether you wish to receive promotional communications from Microsoft by email, SMS, physical mail, and telephone. If you receive promotional email or SMS messages from us and would like to opt out, you can do so by following the directions in that message.
You can also make choices about the receipt of promotional email, telephone calls, and postal mail by signing in with your personal Microsoft account, and viewing your communication permissions where you can update contact information, manage Microsoft-wide contact preferences, opt out of email subscriptions, and choose whether to share your contact information with Microsoft partners.
If you do not have a personal Microsoft account, you can manage your Microsoft email contact preferences by using this web form. These choices do not apply to mandatory service communications that are part of certain Microsoft products, programs, activities, or to surveys or other informational communications that have their own unsubscribe method. To opt out of receiving interest-based advertising from Microsoft, visit our opt-out page. When you opt out, your preference is stored in a cookie that is specific to the web browser you are using.
The opt-out cookie has an expiration date of five years. If you delete the cookies on your device, you need to opt out again. You can also link your opt-out choice with your personal Microsoft account.
It will then apply on any device where you use that account and will continue to apply until someone signs in with a different personal Microsoft account on that device.
If you delete the cookies on your device, you will need to sign in again for the settings to apply. For Microsoft-controlled advertising that appears in apps on Windows, you may use the opt-out linked to your personal Microsoft account, or opt out of interest-based advertising by turning off the advertising ID in Windows settings. Because the data used for interest-based advertising is also used for other required purposes including providing our products, analytics, and fraud detection , opting out of interest-based advertising does not stop that data collection.
You will continue to get ads, although they may be less relevant to you. You can opt out of receiving interest-based advertising from third parties we partner with by visiting their sites see above. Cookies are small text files placed on your device to store data that can be recalled by a web server in the domain that placed the cookie.
Microsoft apps use additional identifiers, such as the advertising ID in Windows described in the Advertising ID section of this privacy statement, for similar purposes. Our websites may include web beacons, cookies, or similar technologies from third-party service providers. You have a variety of tools to control the data collected by cookies, web beacons, and similar technologies.
Where required, we obtain your consent prior to placing or using optional cookies that are not i strictly necessary to provide the website; or ii for the purpose of facilitating a communication.
Some of the cookies we commonly use are listed below. This list is not exhaustive, but it is intended to illustrate the primary purposes for which we typically set cookies. If you visit one of our websites, the site will set some or all of the following cookies:.
In addition to the cookies Microsoft sets when you visit our websites, third parties can also set cookies when you visit Microsoft sites. For example:. For a list of the third parties that set cookies on our websites, including service providers acting on our behalf, please visit our third party cookie inventory. On some of our websites, a list of third parties is available directly on the site. The third parties on these sites may not be included in the list on our third party cookie inventory.
Most web browsers automatically accept cookies but provide controls that allow you to block or delete them. As mentioned above, where required, we obtain your consent before placing or using optional cookies that are not i strictly necessary to provide the website; or ii for the purpose of facilitating a communication. We separate these optional cookies by purpose, such as for advertising and social media purposes.
You may consent to certain categories of optional cookies and not others. Certain features of Microsoft products depend on cookies. If you choose to block cookies, you cannot sign in or use some of those features, and preferences that are dependent on cookies will be lost. If you choose to delete cookies, any settings and preferences controlled by those cookies, including advertising preferences, are deleted and will need to be recreated.
Additional privacy controls that can impact cookies, including the tracking protections feature of Microsoft browsers, are described in the How to access and control your personal data section of this privacy statement.
Some Microsoft webpages contain electronic tags known as web beacons that we use to help deliver cookies on our websites, count users who have visited those websites, and deliver co-branded products. We also include web beacons or similar technologies in our electronic communications to determine whether you open and act on them.
In addition to placing web beacons on our own websites, we sometimes work with other companies to place our web beacons on their websites or in their advertisements. This helps us to, for example, develop statistics on how often clicking on an advertisement on a Microsoft website results in a purchase or other action on the advertiser’s website. It also allows us to understand your activity on the website of a Microsoft partner in connection with your use of a Microsoft product or service.
Finally, Microsoft products often contain web beacons or similar technologies from third-party analytics providers, which help us compile aggregated statistics about the effectiveness of our promotional campaigns or other operations.
These technologies enable the analytics providers to set or read their own cookies or other identifiers on your device, through which they can collect information about your online activities across applications, websites, or other products. However, we prohibit these analytics providers from using web beacons on our sites to collect or access information that directly identifies you such as your name or email address You can opt out of data collection or use by some of these analytics providers by visiting any of the following sites: Adjust , AppsFlyer , Clicktale , Flurry Analytics , Google Analytics requires you to install a browser add-on , Kissmetrics , Mixpanel , Nielsen , Acuity Ads , WebTrends or Optimizely.
In addition to standard cookies and web beacons, our products can also use other similar technologies to store and read data files on your computer. This is typically done to maintain your preferences or to improve speed and performance by storing certain files locally. But, like standard cookies, these technologies can also store a unique identifier for your computer, which can then track behavior.
Local Shared Objects or “Flash cookies. To learn how to manage or block Flash cookies, go to the Flash Player help page. Silverlight Application Storage. Websites or applications that use Microsoft Silverlight technology also have the ability to store data by using Silverlight Application Storage. To learn how to manage or block such storage, see the Silverlight section of this privacy statement. If you use a Microsoft product with an account provided by an organization you are affiliated with, such as your work or school account, that organization can:.
If you lose access to your work or school account in event of change of employment, for example , you may lose access to products and the content associated with those products, including those you acquired on your own behalf, if you used your work or school account to sign in to such products.
Many Microsoft products are intended for use by organizations, such as schools and businesses. Please see the Enterprise and developer products section of this privacy statement. If your organization provides you with access to Microsoft products, your use of the Microsoft products is subject to your organization’s policies, if any. When you use social features in Microsoft products, other users in your network may see some of your activity. To learn more about the social features and other functionality, please review documentation or help content specific to the Microsoft product.
Microsoft is not responsible for the privacy or security practices of our customers, which may differ from those set forth in this privacy statement. For more information on our business operations, please see the Enterprise and developer products section.
For Microsoft products provided by your K school, including Microsoft Education, Microsoft will:. With a Microsoft account, you can sign in to Microsoft products, as well as those of select Microsoft partners.
Personal data associated with your Microsoft account includes credentials, name and contact data, payment data, device and usage data, your contacts, information about your activities, and your interests and favorites.
Signing in to your Microsoft account enables personalization and consistent experiences across products and devices, permits you to use cloud data storage, allows you to make payments using payment instruments stored in your Microsoft account, and enables other features.
If you sign into a service offered by a third party with your Microsoft account, you will share with that third party the account data required by that service. With a Microsoft account, you can sign into Microsoft products, as well as those of select Microsoft partners. Signing into your Microsoft account enables personalization, consistent experiences across products and devices, permits you to use cloud data storage, allows you to make payments using payment instruments stored in your Microsoft account, and enables other features.
There are three types of Microsoft account:. Personal Microsoft accounts. The data associated with your personal Microsoft account, and how that data is used, depends on how you use the account.
Work or school accounts. The data associated with a work or school account, and how it will be used, is generally similar to the use and collection of data associated with a personal Microsoft account. If your employer or school uses Azure Active Directory AAD to manage the account it provides you, you can use your work or school account to sign in to Microsoft products, such as Microsoft and Office , and third-party products provided to you by your organization.
If required by your organization, you will also be asked to provide a phone number or an alternative email address for additional security verification. And, if allowed by your organization, you may also use your work or school account to sign in to Microsoft or third-party products that you acquire for yourself.
Third-party accounts. The data associated with a third-party Microsoft account, and how it will be used, is generally similar to the use and collection of data associated with a personal Microsoft account. Your service provider has control over your account, including the ability to access or delete your account.
You should carefully review the terms the third party provided you to understand what it can do with your account. When a Microsoft product collects age, and there is an age in your jurisdiction under which parental consent or authorization is required to use the product, the product will either block users under that age or will ask them to provide consent or authorization from a parent or guardian before they can use it.
We will not knowingly ask children under that age to provide more data than is required to provide for the product. Once parental consent or authorization is granted, the child’s account is treated much like any other account. The child can access communication services, like Outlook and Skype, and can freely communicate and share data with other users of all ages.
Learn more about parental consent and Microsoft child accounts. Parents or guardians can change or revoke the consent choices previously made, and review, edit, or request the deletion of the personal data of the children for whom they provided consent or authorization. What is Xbox? Xbox is the gaming and entertainment division of Microsoft.
Xbox hosts an online network that consists of software and enables online experiences crossing multiple platforms. This network lets your child find and play games, view content, and connect with friends on Xbox and other gaming and social networks. Children can connect to the Xbox network using Xbox consoles, Windows devices, and mobile devices Android and iPhone. Xbox consoles are devices your child can use to find and play games, movies, music, and other digital entertainment.
When they sign in to Xbox, in apps, games or on a console, we assign a unique identifier to their device. Xbox continues to provide new experiences in client apps that are connected to and backed by services such as Xbox network and cloud gaming.
When signed in to an Xbox experience, we collect required data to help keep these experiences reliable, up to date, secure, and performing as expected. Data we collect when you create an Xbox profile. You as the parent or guardian are required to consent to the collection of personal data from a child under 13 years old.
With your permission, your child can have an Xbox profile and use the online Xbox network. During the child Xbox profile creation, you will sign in with your own Microsoft account to verify that you are an adult organizer in your Microsoft family group. We collect an alternate email address or phone number to boost account security.
If your child needs help accessing their account, they will be able to use one of these alternates to validate they own the Microsoft account. Data we collect.
If your child uses an Xbox console or Xbox app on another device capable of accessing the Xbox network, and that device includes a storage device hard drive or memory unit , usage data will be stored on the storage device and sent to Microsoft the next time they sign in to Xbox, even if they have been playing offline.
Xbox console diagnostic data. If your child uses an Xbox console, the console will send required data to Microsoft. Required data is the minimum data necessary to help keep Xbox safe, secure, up to date, and performing as expected. Game captures. Any player in a multiplayer game session can record video game clips and capture screenshots of their view of the game play. If a player activates this feature, Microsoft uses the resulting text data to provide captioning of chat for players who need it.
Data use. Microsoft uses the data we collect to improve gaming products and experiences— making it safer and more fun over time.
Data we collect also enables us to provide your child with personalized, curated experiences. This includes connecting them to games, content, services, and recommendations.
Xbox data viewable by others. In order to help make the Xbox network a safe gaming environment and enforce the Community Standards for Xbox, we may collect and review voice, text, images, videos and in-game content such as game clips your child uploads, conversations they have, and things they post in clubs and games. Xbox data shared with game and apps publishers. When your child uses an Xbox online game or any network-connected app on their Xbox console, PC, or mobile device, the publisher of that game or app has access to data about their usage to help the publisher deliver, support, and improve its product.
Third-party publishers and developers of games and apps have their own distinct and independent relationship with users and their collection and usage of personal data is subject to their specific privacy policies.
For example, publishers may choose to disclose or display game data such as on leaderboards through their own services. You may find their policies linked from the game or app detail pages in our stores. To stop sharing game or app data with a publisher, remove its games or app from all devices where they have been installed. Managing child settings. The dashboard allows you to review your child’s personal information, have it deleted, and refuse to permit further collection or use of your child’s information.
Below you will find additional privacy information, such as how we secure your data, where we process your data, and how long we retain your data. You can find more information on Microsoft and our commitment to protecting your privacy at Microsoft Privacy. Microsoft is committed to protecting the security of your personal data. We use a variety of security technologies and procedures to help protect your personal data from unauthorized access, use, or disclosure.
For example, we store the personal data you provide on computer systems that have limited access and are in controlled facilities. When we transmit highly confidential data such as a credit card number or password over the internet, we protect it through the use of encryption. Microsoft complies with applicable data protection laws, including applicable security breach notification laws. Personal data collected by Microsoft may be stored and processed in your region, in the United States, and in any other country where Microsoft or its affiliates, subsidiaries, or service providers operate facilities.
The storage location s are chosen in order to operate efficiently, to improve performance, and to create redundancies in order to protect the data in the event of an outage or other problem. We transfer personal data from the European Economic Area, the United Kingdom, and Switzerland to other countries, some of which have not yet been determined by the European Commission to have an adequate level of data protection.
For example, their laws may not guarantee you the same rights, or there may not be a privacy supervisory authority there that is capable of addressing your complaints. Interest expense increased primarily due to higher average outstanding long-term debt and higher finance lease expense.
Net recognized gains on investments decreased primarily due to higher losses on sales of fixed-income securities, offset in part by higher gains on sales of equity securities. Net losses on derivatives decreased primarily due to lower losses on equity, foreign exchange, and commodity derivatives, offset in part by losses on interest rate derivatives in the current period as compared to gains in the prior period.
Dividends and interest income increased primarily due to higher portfolio balances and yields on fixed-income securities. Interest expense increased primarily due to higher outstanding long-term debt. Net recognized gains on investments increased primarily due to higher gains on sales of equity securities. Net losses on derivatives increased due to higher losses on equity derivatives, offset in part by lower losses on commodity and foreign currency derivatives.
Other, net reflects recognized losses from certain joint ventures and divestitures. The increase in our effective tax rate for fiscal year compared to fiscal year was primarily due to the net charge related to the enactment of the TCJA in fiscal year and the realization of tax benefits attributable to previous Phone business losses in fiscal year Our effective tax rate was higher than the U.
The mix of income before income taxes between the U. In fiscal year , our U. The decrease in our effective tax rate for fiscal year compared to fiscal year was primarily due to the realization of tax benefits attributable to previous Phone business losses, offset in part by changes in the mix of our income before income taxes between the U.
Our effective tax rate was lower than the U. The TCJA required us to incur a one-time transition tax on deferred foreign income not previously subject to U. For fiscal year , our blended U. The TCJA was effective in the second quarter of fiscal year Due to the timing of the enactment and the complexity in applying the provisions of the TCJA, the provisional net charge is subject to revisions as we continue to complete our analysis of the TCJA, collect and prepare necessary data, and interpret any additional guidance issued by the U.
Adjustments may materially impact our provision for income taxes and effective tax rate in the period in which the adjustments are made. Our accounting for the estimated tax effects of the TCJA will be completed during the measurement period, which is not expected to extend beyond one year from the enactment date.
While we settled a portion of the IRS audit for tax years to during the third quarter of fiscal year , and a portion of the IRS audit for tax years to during the first quarter of fiscal year , we remain under audit for those years. In the second quarter of fiscal year , we settled a portion of the IRS audit for tax years to We continue to be subject to examination by the IRS for tax years to In February , the IRS withdrew its Revenue Agents Report for tax years to and reopened the audit phase of the examination.
As of June 30, , the primary unresolved issue relates to transfer pricing, which could have a significant impact in our consolidated financial statements if not resolved favorably. We believe our allowances for income tax contingencies are adequate. We have not received a proposed assessment for the unresolved issues and do not expect a final resolution of these issues in the next 12 months. Based on the information currently available, we do not anticipate a significant increase or decrease to our tax contingencies for these issues within the next 12 months.
We are subject to income tax in many jurisdictions outside the U. Our operations in certain jurisdictions remain subject to examination for tax years to , some of which are currently under audit by local tax authorities. The resolution of each of these audits is not expected to be material to our consolidated financial statements.
Adjusted operating income, net income and diluted earnings per share are non-GAAP financial measures which exclude the net charge related to the TCJA, and impairment and restructuring expenses. We believe these non-GAAP measures aid investors by providing additional insight into our operational performance and help clarify trends affecting our business. These non-GAAP financial measures presented should not be considered a substitute for, or superior to, the measures of financial performance prepared in accordance with GAAP.
Our short-term investments are primarily intended to facilitate liquidity and capital preservation. They consist predominantly of highly liquid investment-grade fixed-income securities, diversified among industries and individual issuers. The investments are predominantly U. Our fixed-income investments are exposed to interest rate risk and credit risk. The credit risk and average maturity of our fixed-income portfolio are managed to achieve economic returns that correlate to certain fixed-income indices.
The settlement risk related to these investments is insignificant given that the short-term investments held are primarily highly liquid investment-grade fixed-income securities. As a result of the TCJA, our cash, cash equivalents, and short-term investments held by foreign subsidiaries are no longer subject to U.
In general, and where applicable, we use quoted prices in active markets for identical assets or liabilities to determine the fair value of our financial instruments.
This pricing methodology applies to our Level 1 investments, such as U. If quoted prices in active markets for identical assets or liabilities are not available to determine fair value, then we use quoted prices for similar assets and liabilities or inputs other than the quoted prices that are observable either directly or indirectly. This pricing methodology applies to our Level 2 investments such as corporate notes and bonds, foreign government bonds, mortgage- and asset-backed securities, commercial paper, certificates of deposit, and U.
Level 3 investments are valued using internally developed models with unobservable inputs. Assets and liabilities measured at fair value on a recurring basis using unobservable inputs are an immaterial portion of our portfolio. A majority of our investments are priced by pricing vendors and are generally Level 1 or Level 2 investments as these vendors either provide a quoted market price in an active market or use observable inputs for their pricing without applying significant adjustments.
Broker pricing is used mainly when a quoted price is not available, the investment is not priced by our pricing vendors, or when a broker price is more reflective of fair values in the market in which the investment trades.
Our broker-priced investments are generally classified as Level 2 investments because the broker prices these investments based on similar assets without applying significant adjustments.
In addition, all our broker-priced investments have a sufficient level of trading volume to demonstrate that the fair values used are appropriate for these investments. Our fair value processes include controls that are designed to ensure appropriate fair values are recorded. These controls include model validation, review of key model inputs, analysis of period-over-period fluctuations, and independent recalculation of prices where appropriate. We issued debt to take advantage of favorable pricing and liquidity in the debt markets, reflecting our credit rating and the low interest rate environment.
The proceeds of these issuances were or will be used for general corporate purposes, which may include, among other things, funding for working capital, capital expenditures, repurchases of capital stock, acquisitions, and repayment of existing debt.
Unearned revenue is generally billed upfront at the beginning of each annual coverage period for multi-year agreements and recognized ratably over the coverage period.
Unearned revenue also includes payments for other offerings for which we have been paid in advance and earn the revenue when we transfer control of the product or service. The following table outlines the expected future recognition of unearned revenue as of June 30, If our customers choose to license cloud-based versions of our products and services rather than licensing transaction-based products and services, the associated revenue will shift from being recognized at the time of the transaction to being recognized over the subscription period or upon consumption, as applicable.
We provide indemnifications of varying scope and size to certain customers against claims of intellectual property infringement made by third parties arising from the use of our products and certain other matters. Additionally, we have agreed to cover damages resulting from breaches of certain security and privacy commitments in our cloud business. In evaluating estimated losses on these obligations, we consider factors such as the degree of probability of an unfavorable outcome and our ability to make a reasonable estimate of the amount of loss.
These obligations did not have a material impact in our consolidated financial statements during the periods presented. The following table summarizes the payments due by fiscal year for our outstanding contractual obligations as of June 30, We will continue to invest in sales, marketing, product support infrastructure, and existing and advanced areas of technology, as well as continue making acquisitions that align with our business strategy.
Additions to property and equipment will continue, including new facilities, datacenters, and computer systems for research and development, sales and marketing, support, and administrative staff. We expect capital expenditures to increase in coming years to support growth in our cloud offerings.
We have operating and finance leases for datacenters, corporate offices, research and development facilities, retail stores, and certain equipment. We have not engaged in any related party transactions or arrangements with unconsolidated entities or other persons that are reasonably likely to materially affect liquidity or the availability of capital resources. We expect existing cash, cash equivalents, short-term investments, cash flows from operations, and access to capital markets to continue to be sufficient to fund our operating activities and cash commitments for investing and financing activities, such as dividends, share repurchases, debt maturities, material capital expenditures, and the transition tax related to the TCJA, for at least the next 12 months and thereafter for the foreseeable future.
Our consolidated financial statements and accompanying notes are prepared in accordance with GAAP. Preparing consolidated financial statements requires management to make estimates and assumptions that affect the reported amounts of assets, liabilities, revenue, and expenses.
Critical accounting policies for us include revenue recognition, impairment of investment securities, goodwill, research and development costs, contingencies, income taxes, and inventories. Our contracts with customers often include promises to transfer multiple products and services to a customer. Determining whether products and services are considered distinct performance obligations that should be accounted for separately versus together may require significant judgment.
When a cloud-based service includes both on-premises software licenses and cloud services, judgment is required to determine whether the software license is considered distinct and accounted for separately, or not distinct and accounted for together with the cloud service and recognized over time. Certain cloud services, primarily Office , depend on a significant level of integration, interdependency, and interrelation between the desktop applications and cloud services, and are accounted for together as one performance obligation.
Revenue from Office is recognized ratably over the period in which the cloud services are provided. We use a single amount to estimate SSP for items that are not sold separately, including on-premises licenses sold with SA or software updates provided at no additional charge. We use a range of amounts to estimate SSP when we sell each of the products and services separately and need to determine whether there is a discount to be allocated based on the relative SSP of the various products and services.
In instances where SSP is not directly observable, such as when we do not sell the product or service separately, we determine the SSP using information that may include market conditions and other observable inputs.
We typically have more than one SSP for individual products and services due to the stratification of those products and services by customers and circumstances. In these instances, we may use information such as the size of the customer and geographic region in determining the SSP. Due to the various benefits from and the nature of our SA program, judgment is required to assess the pattern of delivery, including the exercise pattern of certain benefits across our portfolio of customers.
Our products are generally sold with a right of return, we may provide other credits or incentives, and in certain instances we estimate customer usage of our products and services, which are accounted for as variable consideration when determining the amount of revenue to recognize. Returns and credits are estimated at contract inception and updated at the end of each reporting period if additional information becomes available. Changes to our estimated variable consideration were not material for the periods presented.
The new standard related to revenue recognition had a material impact in our consolidated financial statements. We review investments quarterly for indicators of other-than-temporary impairment. This determination requires significant judgment. In making this judgment, we employ a systematic methodology quarterly that considers available quantitative and qualitative evidence in evaluating potential impairment of our investments.
If the cost of an investment exceeds its fair value, we evaluate, among other factors, general market conditions, credit quality of debt instrument issuers, the duration and extent to which the fair value is less than cost, and for equity securities, our intent and ability to hold, or plans to sell, the investment.
For fixed-income securities, we also evaluate whether we have plans to sell the security or it is more likely than not that we will be required to sell the security before recovery. We also consider specific adverse conditions related to the financial health of and business outlook for the investee, including industry and sector performance, changes in technology, and operational and financing cash flow factors.
Once a decline in fair value is determined to be other-than-temporary, an impairment charge is recorded to other income expense , net and a new cost basis in the investment is established. We allocate goodwill to reporting units based on the reporting unit expected to benefit from the business combination. We evaluate our reporting units on an annual basis and, if necessary, reassign goodwill using a relative fair value allocation approach.
Goodwill is tested for impairment at the reporting unit level operating segment or one level below an operating segment on an annual basis May 1 for us and between annual tests if an event occurs or circumstances change that would more likely than not reduce the fair value of a reporting unit below its carrying value.
These events or circumstances could include a significant change in the business climate, legal factors, operating performance indicators, competition, or sale or disposition of a significant portion of a reporting unit. Application of the goodwill impairment test requires judgment, including the identification of reporting units, assignment of assets and liabilities to reporting units, assignment of goodwill to reporting units, and determination of the fair value of each reporting unit.
The fair value of each reporting unit is estimated primarily through the use of a discounted cash flow methodology. This analysis requires significant judgments, including estimation of future cash flows, which is dependent on internal forecasts, estimation of the long-term rate of growth for our business, estimation of the useful life over which cash flows will occur, and determination of our weighted average cost of capital. The estimates used to calculate the fair value of a reporting unit change from year to year based on operating results, market conditions, and other factors.
Changes in these estimates and assumptions could materially affect the determination of fair value and goodwill impairment for each reporting unit. Costs incurred internally in researching and developing a computer software product are charged to expense until technological feasibility has been established for the product. Once technological feasibility is established, all software costs are capitalized until the product is available for general release to customers.
Judgment is required in determining when technological feasibility of a product is established. We have determined that technological feasibility for our software products is reached after all high-risk development issues have been resolved through coding and testing. Generally, this occurs shortly before the products are released to production.
The amortization of these costs is included in cost of revenue over the estimated life of the products. The outcomes of legal proceedings and claims brought against us are subject to significant uncertainty. An estimated loss from a loss contingency such as a legal proceeding or claim is accrued by a charge to income if it is probable that an asset has been impaired or a liability has been incurred and the amount of the loss can be reasonably estimated.
In determining whether a loss should be accrued we evaluate, among other factors, the degree of probability of an unfavorable outcome and the ability to make a reasonable estimate of the amount of loss.
Changes in these factors could materially impact our consolidated financial statements. We recognize the tax benefit from an uncertain tax position only if it is more likely than not that the tax position will be sustained on examination by the taxing authorities, based on the technical merits of the position.
Accounting literature also provides guidance on derecognition of income tax assets and liabilities, classification of deferred income tax assets and liabilities, accounting for interest and penalties associated with tax positions, and income tax disclosures. Judgment is required in assessing the future tax consequences of events that have been recognized in our consolidated financial statements or tax returns.
Variations in the actual outcome of these future tax consequences could materially impact our consolidated financial statements. Inventories are stated at average cost, subject to the lower of cost or net realizable value. Cost includes materials, labor, and manufacturing overhead related to the purchase and production of inventories.
Net realizable value is the estimated selling price less estimated costs of completion, disposal, and transportation. We regularly review inventory quantities on hand, future purchase commitments with our suppliers, and the estimated utility of our inventory. These reviews include analysis of demand forecasts, product life cycle status, product development plans, current sales levels, pricing strategy, and component cost trends. If our review indicates a reduction in utility below carrying value, we reduce our inventory to a new cost basis through a charge to cost of revenue.
Management is responsible for the preparation of the consolidated financial statements and related information that are presented in this report. The Company designs and maintains accounting and internal control systems to provide reasonable assurance at reasonable cost that assets are safeguarded against loss from unauthorized use or disposition, and that the financial records are reliable for preparing consolidated financial statements and maintaining accountability for assets.
These systems are augmented by written policies, an organizational structure providing division of responsibilities, careful selection and training of qualified personnel, and a program of internal audits. The Board of Directors, through its Audit Committee, consisting solely of independent directors of the Company, meets periodically with management, internal auditors, and our independent registered public accounting firm to ensure that each is meeting its responsibilities and to discuss matters concerning internal controls and financial reporting.
Amy E. Frank H. We are exposed to economic risk from foreign exchange rates, interest rates, credit risk, and equity prices.
We use derivatives instruments to manage these risks, however, they may still impact our consolidated financial statements. Certain forecasted transactions, assets, and liabilities are exposed to foreign currency risk. We monitor our foreign currency exposures daily to maximize the economic effectiveness of our foreign currency positions. Principal currencies hedged include the euro, Japanese yen, British pound, Canadian dollar, and Australian dollar.
Securities held in our fixed-income portfolio are subject to different interest rate risks based on their maturities. We manage the average maturity of the fixed-income portfolio to achieve economic returns that correlate to certain global fixed-income indices. Our fixed-income portfolio is diversified and consists primarily of investment-grade securities. We manage credit exposures relative to broad-based indices and to facilitate portfolio diversification.
This included presenting one-day VaR as well as average, high, and low VaR by risk category throughout the reporting period. Given the changes in size and allocation of our portfolio of financial assets, we believe sensitivity analysis is more informative in representing the potential impact to the portfolio as a result of market movements. Therefore, we have presented a sensitivity analysis for each risk category below.
Sensitivity analysis is not intended to represent actual losses in fair value, including determinations of other-than-temporary losses in fair value in accordance with accounting principles generally accepted in the United States of America, but is used as a risk estimation and management tool. The following table sets forth the potential loss in future earnings or fair values, including associated derivatives, resulting from hypothetical changes in relevant market rates or prices:.
Refer to accompanying notes. We have recast certain prior period income tax liabilities as discussed in the Recent Tax Legislation section below.
We have also recast prior period securities lending payables to other current liabilities in our consolidated balance sheets to conform to the current period presentation. These items had no impact in our consolidated income statements or net cash from or used in operating, financing, or investing in our consolidated cash flows statements. The consolidated financial statements include the accounts of Microsoft Corporation and its subsidiaries. Intercompany transactions and balances have been eliminated.
Investments for which we are not able to exercise significant influence over the investee and which do not have readily determinable fair values are accounted for under the cost method.
Preparing financial statements requires management to make estimates and assumptions that affect the reported amounts of assets, liabilities, revenue, and expenses.
Assets and liabilities recorded in foreign currencies are translated at the exchange rate on the balance sheet date. Revenue and expenses are translated at average rates of exchange prevailing during the year.
Product revenue includes sales from operating systems; cross-device productivity applications; server applications; business solution applications; desktop and server management tools; software development tools; video games; and hardware such as PCs, tablets, gaming and entertainment consoles, other intelligent devices, and related accessories.
Service and other revenue includes sales from cloud-based solutions that provide customers with software, services, platforms, and content such as Microsoft Office , Microsoft Azure, Microsoft Dynamics , and Xbox Live; solution support; and consulting services. Service and other revenue also includes sales from online advertising and LinkedIn.
Revenue is recognized upon transfer of control of promised products or services to customers in an amount that reflects the consideration we expect to receive in exchange for those products or services.
We enter into contracts that can include various combinations of products and services, which are generally capable of being distinct and accounted for as separate performance obligations. Revenue is recognized net of allowances for returns and any taxes collected from customers, which are subsequently remitted to governmental authorities. Licenses for on-premises software provide the customer with a right to use the software as it exists when made available to the customer.
Customers may purchase perpetual licenses or subscribe to licenses, which provide customers with the same functionality and differ mainly in the duration over which the customer benefits from the software.
Revenue from distinct on-premises licenses is recognized upfront at the point in time when the software is made available to the customer.
In cases where we allocate revenue to software updates, primarily because the updates are provided at no additional charge, revenue is recognized as the updates are provided, which is generally ratably over the estimated life of the related device or license. It is acceptable in most countries and thus making it the most effective payment method. We offer free revision in case you are not satisfied with the order delivered to you. For such an order you are expected to send a revision request and include all the instructions that should be followed by the writer.
Also remember to state the exact time the writer should take to do your revision. We offer free revision as long as the client does not change the instructions that had been previously given. In case a client want to alter the instructions, revision can be done but at a negotiated fee. We do not take the issue of plagiarism rightly. As a company we try as much as possible to ensure all orders are plagiarism free. We also have a plagiarism detection system where all our papers are scanned before being delivered to clients.
We have writers who are always ready to work and take up orders with a short deadline. We deliver papers as early as after 3 hours of ordering. You only have to indicate the short deadline and our support team will help pick the best and most qualified writer in your field. The writer will confirm whether they will submit the paper within the set deadline.
After confirmation, your paper will be delivered on time. We never at any time reuse the papers we write for our clients. We also do not have a database of previously written papers. We never send published papers to clients nor do we publish the papers after sending them to our clients.
Whether to reference us in your work or not is a personal decision. If it is an academic paper, you have to ensure it is permitted by your institution.
We do not ask clients to reference us in the papers we write for them. When we write papers for you, we transfer all the ownership to you. This means that you do not have to acknowledge us in your work not unless you please to do so. Our online assignment help is one of the best essay writing help in the world as we work with international students from the most prestigious universities in the world. We write quality papers for our clients as we have employed highly qualified academic writers from all over the world.
Our writers are able to handle complex assignments from their field of specialization. When it comes to finding the best specialist for your paper there are 3 categories of specialist that we have to look at;. Turning to course help online for help is legal. Getting assignment help is ethical as we do not affect nor harm the level of knowledge you are expected to attain as a student according to your class syllabus.
Our services are here to provide you with legitimate academic writing help to assist you in learning to improve your academic performance. With course help online, you pay for academic writing help and we give you a legal service. This service is similar to paying a tutor to help improve your skills. Our online services is trustworthy and it cares about your learning and your degree. Hence, you should be sure of the fact that our online essay help cannot harm your academic life. You can freely use the academic papers written to you as they are original and perfectly referenced.
Whenever students face academic hardships, they tend to run to online essay help companies. If this is also happening to you, you can message us at course help online. We will ensure we give you a high quality content that will give you a good grade. We can handle your term paper, dissertation, a research proposal, or an essay on any topic. We are aware of all the challenges faced by students when tackling class assignments.
You can have an assignment that is too complicated or an assignment that needs to be completed sooner than you can manage. You also need to have time for a social life and this might not be possible due to school work. The good news is that course help online is here to take care of all this needs to ensure all your assignments are completed on time and you have time for other important activities.
We also understand you have a number of subjects to learn and this might make it hard for you to take care of all the assignments. You are expected to do a thorough research for each assignment to earn yourself a good grade even with the limited time you have. This calls upon the need to employ a professional writer. When you employ one of our expert writers, you can be sure to have all your assignments completed on time.
All your assignment deadlines will be met plus you will have an original, non-plagiarized and error free paper. With our course help online services, you are assured of a completely original and error free paper written exclusively for your specified needs, instructions and requirements.