Select Page
Adeptia data flow graphic.

Simplify B2B communications and free your IT staff

Today’s business data ecosystem is a network of customers and partners communicating continuously with each other. The traditional way to do this is by establishing a business-to-business (B2B) relationship. The B2B communication requires a formal agreement between the entities. Then ... continue reading
Featured image, general availability for Automated Machine Learning Time Series Forecasting

Build more accurate forecasts with new capabilities in automated machine learning

We are excited to announce new capabilities which are apart of time-series forecasting in Azure Machine Learning service. We launched preview of forecasting in December 2018, and we have been excited with the strong customer interest. We listened to our ... continue reading

Security baseline (FINAL) for Windows 10 v1903 and Windows Server v1903

Microsoft is pleased to announce the final release of the security configuration baseline settings for Windows 10 version 1903 (a.k.a., “19H1”), and for Windows Server version 1903. Download the content from the Microsoft Security Compliance Toolkit (click Download and select ... continue reading
Phishing with the Sharks Using the Attack Simulator

Phishing with the Sharks Using the Attack Simulator

First published on TECHNET on Dec 03, 2018Hello, Paul Bergson back again. It is late fall and once again playoff time for High School and Collegiate volleyball. Women's volleyball in Minnesota is a big deal and I have played and ... continue reading
Joy Chik speaking at the European Identity and Cloud Conference in Munich, Germany

Decentralized identity and the path to digital privacy

Security is the central challenge of the digital age. Our digital lives have moved into the cloud. People now use multiple devices to connect to multiple applications through many different networks. Just about everything is connected to the internet, where ... continue reading
Infographic of the strength of signal offered by the Microsoft Intelligent Security Graph.

Executing on the vision of Microsoft Threat Protection

Over the last several months, we’ve provided regular updates on the rapid progress we’re making with Microsoft Threat Protection, which enables your organization to: Protect your assets with identity-driven security and powerful conditional access policies which ensure your assets are ... continue reading
Get-User.png

PowerShell Basics: Want to Use Exchange Online in Azure Cloud PowerShell?

Since rollout in Exchange 2007, PowerShell and Exchange have been partners in helping administrators everywhere manage their environments. Whether on-premises or in the cloud, PowerShell is a powerful tool for working with Exchange. Now the cmdlets for managing Exchange Online ... continue reading
Automated machine learining UI

New Azure Machine Learning updates simplify and accelerate the ML lifecycle

With the exponential rise of data, we are undergoing a technology transformation, as organizations realize the need for insights driven decisions. Artificial intelligence (AI) and machine learning (ML) technologies can help harness this data to drive real business outcomes across ... continue reading
ROI on IoT Part 3 - Blog Hero Image

5 internal capabilities to help you increase IoT success

Enterprise IoT adoption is following a path typical of new technologies. Industry standards emerge, but there is competition among them. Companies gradually develop codified frameworks and best practices to structure projects and minimize the risk of failure. However, during this ... continue reading

Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903

Microsoft is pleased to announce the draft release of the security configuration baseline settings for Windows 10 version 1903 (a.k.a., “19H1”), and for Windows Server version 1903. Please evaluate these proposed baselines and send us your feedback via blog comments ... continue reading