Exchange
Extended email retention  FI

Extended email retention for deleted items in Office 365

We’ve all been there, you search for an email or calendar invite in Outlook only to find that it isn’t there anymore. Until now deleted items were moved into the Deleted Items folder, then they would disappear after being in that folder for 30 days. With this update, the length of time items remain in the Deleted Items folder is extended to indefinitely or according to the duration set by…

Lync
Lync Polycom 2

Online meetings get better with Lync and new Polycom Unified Conference Stations, CX5100 and CX5500

Sometimes when you’ve been around great technology for a long time, you take for granted that others also know about it and use it. Such is often the case with Lync and the original Lync RoundTable device (Polycom CX5000), which we built in partnership with Polycom. At Microsoft, we use these devices every day as we collaborate in teams that span multiple locations around the world.

Garage Series
asaf2

Garage Series: Bringing Data Loss Prevention to SharePoint and first look at new Office 365 Message Encryption Viewers for iOS and Android

On this week’s show we invite back Asaf Kashi, a lead engineer on the information protection team. We introduce the information protection updates coming to Office 365 and demonstrate the upcoming Data Loss Prevention capabilities in SharePoint and OneDrive for Business, the upcoming Office 365 compliance center, one-time passcodes for viewing encrypted email and the just-released Office 365 Message Encryption Viewers for iOS and Android.  Last time we invited Asaf Kashi on…

News

Office 365 now available from datacenters in Japan

Over the last few months we’ve worked hard to bring the Cloud and Office to you—everywhere. In October, we announced the availability of Microsoft Azure from Australia. Then we showcased new productivity experiences for the iPhone, iPad and Android tablets. Last month I shared our plans to move forward with delivering locally hosted versions of our cloud productivity suite, Office 365, and our cloud business application, Microsoft Dynamics CRM Online,…

Customer stories
TE Manufacturing Floor Image 1

Manufacturing productivity in the cloud—TE strengthens connections with Office 365 ProPlus

Today’s post about Office 365 ProPlus was written by David Ark, senior director of Infrastructure Solutions for TE Connectivity (NYSE: TEL), a $14 billion world leader that designs and manufactures the smart connectors, sensors, antennas and electronic components that are essential in our increasingly connected world.

Garage Series
duguid

Garage Series: A developer’s view of transitioning to the apps for Office model

This week long-time developer and VP of Product, Ryan Duguid from Nintex describes what it took to make the shift going from full trust code to the apps for Office model. He explains the architectural changes, integration with other cloud services and platforms as well as how the development and servicing model has evolved for Nintex. Ryan also demonstrates the Nintex Workflow app for Office 365 and how it compares it to the on…

Why Microsoft
Luwa Luxury logo

Luwa Luxury Products chooses Office 365 cloud-based productivity tools to grow business

Luwa Luxury Products is a premier distributor of luxury home appliances and outdoor living appliances based in Tukwila, Washington. After buying the business in 2012, co-owners Sheri and Chris Walsh wanted to enhance communication and take Luwa’s customer service to the next level by using cloud-based business productivity tools.

Garage Series
markruss

The Garage Series for Office 365: Assessing the Top 5 Cloud Security Threats with Mark Russinovich

In this week’s show Jeremy Chapman is joined by cyber security expert and author, Mark Russinovich, to assess the most frequently heard cloud security threats. Mark describes each threat with its threat level and shares how Microsoft architects its cloud services to maximize data security and protect against data loss. Jeremy and Mark also give pro tips to protect against credential loss and contain the risk of user-driven shadow IT. …