Author: Richi Jennings

Microsoft Cloud AI Tests Turing Institute — Data Science Meets Machine Learning

by Richi Jennings

Microsoft CEO Satya Nadella is talking up the company’s cloud chops in artificial intelligence. Azure and Office 365 are chock-full of machine-learning facilities, he says. Over the past few days, he’s appeared on stage in Dublin and London, preaching the gospel of AI and FPGAs. And now Microsoft’s donated Azure credits to a UK research consortium that specializes in data science...

Will Microsoft Launch a Surface All-In-One Desktop Next Month? Sources say…

by Richi Jennings

Microsoft is said to be launching a new Surface, codenamed Cardinal. The new device will be a one-box desktop PC—i.e., an all-in-one (AiO), as popularlized by Apple’s iMac. The avian-themed rumor seems credible and well-sourced. And an October hardware event would fit with Microsoft’s previous form. But beyond that, everything is mere speculation. None of which stops us from some amusing Friday musing...

Microsoft’s Cloud in Brexit Britain — New Azure and Office 365 DCs for UK

by Richi Jennings

Microsoft Azure and Office 365 hosted in the UK for the first time. Redmond just opened up three new data centers in England and Wales, arranged in two Azure regions. This brings the number of Regions to 28 globally. Among the launch customers are Aston Martin, a regional health authority, and the Ministry of Defence [sic]. This should give a boost to Microsoft’s data-sovereignty story...

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: