Many task management and reminder apps promise to simplify your planning, but only one is well integrated within the Microsoft 365 suite. Learn how to leverage Microsoft To Do using Apple hardware.
Microsoft
Twisty Laptops, Bendy Phones: Microsoft Bets Big on Design
This week, we look at the new Surface hardware and try to determine how much experimentation your workflow can withstand.
How to return the top or bottom n records without a filter or PivotTable in Excel
There are lots of ways to return the top or bottom n records from a data set in Microsoft Excel, but the new dynamic array functions make doing so easier than ever.
How phishing-as-a-service operations pose a threat to organizations
Attackers can easily buy, deploy and scale phishing campaigns to steal credentials and other sensitive data, says Microsoft.
New Microsoft analytics tools help identify and understand trends without compromising privacy
Developed to help policy-makers research human trafficking, these techniques for synthetic privacy, casual inference and visualizing complex graph statistics could be useful for many other problems.
How to use vector graphics to create cool custom graphics in PowerPoint
Free graphics aren’t written on stone in Microsoft PowerPoint. Many will allow you to ungroup all the pieces, use what you want and delete what you don’t.
Microsoft’s Surface Duo 2 Is a Lovable Weirdo
The second time around, Microsoft’s foldable mobile comes closer to what it actually is: a phone.
Everything Microsoft Announced, Including a Wacky Laptop
The new hardware includes an updated Surface Duo 2, which you can finally call a phone, and a cute eco-friendly mouse.
How to use the FILTER() dynamic array function in Excel
Microsoft Excel’s new FILTER() function is a great tool for reporting and dashboards. We’ll show you how to use it to get more done.
Google, Microsoft and Oracle amassed the most cybersecurity vulnerabilities in the first half of 2021
A recent AtlasVPN report rounds up an inglorious cybersecurity top 10 of sorts, highlighting the companies that have amassed the most vulnerabilities in the first half of this year.