Select Page
Step 3. Protect your identities: top 10 actions to secure your environment

Step 3. Protect your identities: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 3. Protect your identities, youll learn how to define security policies to protect individual user ... continue reading
Predictive analysis made easy

Implement predictive analytics for manufacturing with Symphony Industrial AI

Technology allows manufacturers to generate more data than traditional systems and users can digest. Predictive analytics, enabled by big data and cloud technologies, can take advantage of this data and provide new and unique insights into the health of manufacturing ... continue reading
How to automate machine learning on SQL Server 2019 big data clusters

How to automate machine learning on SQL Server 2019 big data clusters

In this post, we will explore how to use automated machine learning (AutoML) to create new machine learning models over your data in SQL Server 2019 big data clusters. SQL Server 2019 big data clusters make it possible to use ... continue reading
Access control transition from Azure SQL Database to Azure Key Vault flow chart

Azure.Source – Volume 63

Now in preview Transparent Data Encryption (TDE) with customer managed keys for Managed Instance Announces the public preview of Transparent Data Encryption (TDE) with Bring Your Own Key (BYOK) support for Microsoft Azure SQL Database Managed Instance. Azure SQL Database ... continue reading
One of several PDF files that only Microsoft was detecting at the time it was first observed (Source: https://www.virustotal.com/)

Tackling phishing with signal-sharing and machine learning

Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure. Our industry-leading visibility into the entire attack chain translates to enriched protection thats evident ... continue reading

The AI cybersecurity impact for IoT

I meet with customers around the globe in all sectorsbanks with ATM networks, energy companies with critical infrastructure, natural resource companies with remote automated operations, healthcare organizations with medical devices, manufacturing companies with production environmentsand they all have the same ... continue reading
Take the survey today

Participate in the 16th Developer Economics Survey

The Developer Economics Q4 2018 survey is here in its 16th edition to shed light on the future of the software industry. Every year more than 40,000 developers around the world participate in this survey, so this is a chance ... continue reading
Adapting BERT for different tasks displayed in a diagram

Fine-tune natural language processing models using Azure Machine Learning service

This blog post was co-authored by Li Li, Software Engineer II and Todd Hendry, Principal Software Engineer, Microsoft AI Platform. In the natural language processing (NLP) domain, pre-trained language representations have traditionally been a key topic for a few important ... continue reading
Microsoft AI competition explores the next evolution of predictive technologies in security

Microsoft AI competition explores the next evolution of predictive technologies in security

Predictive technologies are already effective at detecting and blocking malware at first sight. A new malware prediction competition on Kaggle will challenge the data science community to push these technologies even furtherto stop malware before it is even seen. The ... continue reading
Loading...