ACTION REQUIRED: New Agreement governing access to Hardware Dev Center

We have updated the agreements on Partner Center for the Windows Hardware Program. We made these updates to clarify our terms and ensure that they are transparent, as well as to address usage of new logos.
 
All participants in the Hardware Progra… Continue reading ACTION REQUIRED: New Agreement governing access to Hardware Dev Center

M365 Community Conference: The Intranet of Tomorrow – Beautiful, Flexible, and AI-ready

Session: The intranet of tomorrow: beautiful, flexible, and AI-readySpeakers: Denise Trabona, Dave Cohen
 
The 2024 edition of the Microsoft 365 Community Conference had so many great sessions delivering insights and innovations, particularly this… Continue reading M365 Community Conference: The Intranet of Tomorrow – Beautiful, Flexible, and AI-ready

Kumppaniarkkitehtiseminaari 12.6.2024 Kalastajatorpalla – Varaa päivä!

 
Kesä ja Arrow x Microsoft Kumppaniarkkitehtiseminaari tulee 12.6. Kalastajatorpalle!
 
REKISTERÖITYMINEN AVAUTUU ma 20.5.2024 klo 9 ja voit tuolloin rekisteröityä tästä linkistä.
 
Tämä vuoden tärkein suomalainen tekninen Microsoftin… Continue reading Kumppaniarkkitehtiseminaari 12.6.2024 Kalastajatorpalla – Varaa päivä!

Getting Started Using Phi-3-mini-4k-instruct-onnx for Text Generation with NLP Techniques

The Phi-3 mini models are AI models. The short context version Phi-3-mini-4k-instruct-onnx has a prompt length of 4k words, while the long context version can accept much longer prompts and produce longer output text. In this tutorial, we will be using… Continue reading Getting Started Using Phi-3-mini-4k-instruct-onnx for Text Generation with NLP Techniques

Prioritize Security Incidents Based on Data Importance | Microsoft Defender with Microsoft Purview

Prioritize incidents based on data significance, detect insider risks, and adapt protections in real-time with Microsoft Defender XDR and Microsoft Purview. Customize thresholds and risk indicators to detect anomalous behavior and prevent potential bre… Continue reading Prioritize Security Incidents Based on Data Importance | Microsoft Defender with Microsoft Purview

Managing Fabric Data Pipelines: a step-by-step guide to source control and deployment

Introduction. In the post Microsoft Fabric: Integration with ADO Repos and Deployment Pipelines – A Power BI Case Study. we have outlined key best practices for utilizing the seamless integration between Fabric and GIT via Azure DevOps repositorie… Continue reading Managing Fabric Data Pipelines: a step-by-step guide to source control and deployment