Monday, 30 June 2025
Architecting cloud data resilience
A modern data resilience strategy starts with a cloud-native backup architecture.
Tuesday, 24 June 2025
Cyber Signals Feb 2024
Read this eBook from Microsoft Security revealing how threat actors weaponize AI and how your security team can harness the power of AI to prevent and mitigate cyberattacks.
Monday, 23 June 2025
Global cloud market sees another huge spending spree as AI demand continues
Cloud infrastructure just won't stop growing, with the big three providers towering over the rest.
Read the article for an overview of the state of cloud spending and its implications for businesses. Reach out to the cloud experts at when you're ready to discuss your cloud computing goals and challenges.
Wednesday, 18 June 2025
Copilot in Teams and Intelligent recap | After the meeting
Watch this short demo video for a look at how quickly Copilot in Teams builds on the highlights available from Intelligent recap and helps you dig deeper into the meeting context so you can stay in sync on what comes next.
Ready to make Copilot in Teams a permanent member of your hybrid workforce? Liquid Telecom can help you get started.
Tuesday, 17 June 2025
The Microsoft Intelligent Data Platform — Unleash your data and accelerate your transformation
There's a strong need for a cloud solution capable of solving data fragmentation problems of the past and present. Find out why the Microsoft Intelligent Data Platform is the best answer in this informative blog pointing out how it can easily manage spikes in data, new workloads and the challenges of emerging technologies.
Microsoft 365 Copilot | Get up to speed
Watch this brief video to learn how Copilot can spare you embarrassment and keep you up to speed even when you log in late for a meeting.
Contact Liquid Telecom to make Microsoft 365 Copilot a permanent Teams member.
Monday, 16 June 2025
'The worst thing you can do' after a data breach, according to a cybersecurity expert
Data breaches are so common that you may be tempted to ignore them altogether. But doing so is a big mistake, cybersecurity experts say.
Subscribe to:
Posts (Atom)