21 Agosto 2024
Enabling carbon reduction in the energy industry

The ways the energy industry captures, transports, stores, and otherwise removes carbon dioxide (CO2) from the atmosphere are changing. Led by the European Union (EU), this new global push toward improved industrial carbon management (ICM) requires sophisticated new support mechanisms, including the development of technologies capable of orchestrating[…]

Read More
15 Agosto 2024
Transforming the nursing workflow with ambient voice and AI

The nursing workflow is unique—and any solutions developed for nurses must be purpose-built to integrate with the way in which they work. That’s why we placed the voice of nurses at the center of our ongoing work to design and develop a solution that augments nurses’ daily workflows[…]

Read More
14 Agosto 2024
Accelerating the automotive sector with mobility copilots

At any given time, a company has thousands of people making decisions based on data and using various applications to run their business. These information workers often need multiple systems to achieve their goals, ranging from specialized applications to systems of record and productivity tools. Making decisions to[…]

Read More
12 Agosto 2024
Showcasing AI innovation at the third annual Power Platform Community Conference

Get ready to ignite your passion for innovation at the 2024 Power Platform Community Conference (PPCC). This year, we’re bringing together some of the brightest minds and most enthusiastic members of the Microsoft Power Platform community for an unforgettable experience. Whether you’re a seasoned professional or just starting[…]

Read More
8 Agosto 2024
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE

Microsoft researchers recently identified multiple medium severity vulnerabilities in OpenVPN, an open-source project with binaries integrated into routers, firmware, PCs, mobile devices, and many other smart devices worldwide, numbering in the millions. Attackers could chain and remotely exploit some of the discovered vulnerabilities to achieve an attack chain[…]

Read More