Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

machine learning

How OWA Predicts Text as Users Compose Email

by Tony Redmond

Smart Technology Figures Out What You Want to Type On May 8, Microsoft announced plans (MC212345) to introduce a feature called “suggested text” to OWA. Microsoft 365 roadmap item 63795 says “Using smart technology, Outlook will predict text while you type. Just use the Tab key to accept the text prediction.” Text predictions is another… Read More

How the Focused Inbox Replaces Clutter Inside Office 365

by Tony Redmond

The Focused Inbox is the keynote feature of the Outlook for iOS and Android mobile clients. All other clients in the Outlook family have used the Clutter feature, which processes mail on the server and removes unimportant items into the Clutter folder. Now Microsoft is dropping Clutter and introducing the Focused Inbox across the entire Outlook family. Rationalization and commonality is good, especially when features that really work are made available to all clients. Here’s how the changeover will occur.

Microsoft Cloud AI Tests Turing Institute — Data Science Meets Machine Learning

by Richi Jennings

Microsoft CEO Satya Nadella is talking up the company’s cloud chops in artificial intelligence. Azure and Office 365 are chock-full of machine-learning facilities, he says. Over the past few days, he’s appeared on stage in Dublin and London, preaching the gospel of AI and FPGAs. And now Microsoft’s donated Azure credits to a UK research consortium that specializes in data science...

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: