This document provides information about an online conference including a code of conduct, acknowledgement of traditional custodians of the land, and an invitation to speakers and participants from around the world. The code of conduct establishes an harassment-free environment and outlines sanctions for violations. It also includes links to more details about the code of conduct and conference rules. Traditional custodians of Australian and New Zealand lands are acknowledged where speakers and participants are located.
2. #M365May @M365May M365May.com
CODE OF CONDUCT
THE QUICK VERSION
Our conference is dedicated to providing a harassment-free conference experience for everyone, regardless
of gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size,
race, ethnicity, religion (or lack thereof), or technology choices.
We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not
appropriate for any conference venue, including talks, workshops, parties, Twitter and other online media.
Conference participants violating these rules may be sanctioned or expelled from the conference without a
refund at the discretion of the conference organisers.
Be constructive, be respectful, be helpful and be kind.
THE LESS QUICK VERSION
www.m365may.com/code-of-conduct
3. #M365May @M365May M365May.com
TRADITIONAL OWNERS
We acknowledge the traditional custodians of the land on which this online conference is
hosted, and the traditional custodians of the lands where our Australian-based speakers
and participants are located.
We would also like to pay our respects to Elders past, present and future
Tēnā koutou, tēnā koutou, tēnā tātou katoa.
On behalf of M365 May we would like to welcome and acknowledge all our speakers and
participants from Aotearoa New Zealand. Thank you for supporting this hui.
Tēnā koutou, tēnā koutou, tēnā tātou katoa.
WELCOME TO OUR SPEAKERS AND PARTICIPANTS FROM AROUND THE WORLD
8. Microsoft Graph
…is the Microsoft 365 data that describes the patterns of productivity, identity
and security in an organization, accessed through a unified API endpoint.
9.
10.
11. Recent People
Dana Wilkins (Syntex Corp)
v-danwil@contoso.com
Mat Anderson
matander@contoso.com
Jeremy Rosenfeld
jrose@contoso.com
Sara Lopez
sarlopez@contoso
Charmaine Graves (Syntex Corp)
v-chamgra@contoso
13. Jeremy
Recent People
Jeremy Yi
jeremyi@contoso.com
Jeremy Champion (MECHANICS AND DEPLOYMENT)
Jchamp@contoso.com
Jeremy LAGARDE
jlegarde@northwinds.com
Jeremy Kraft (OPERATIONS)
jeremyk@contoso.com
Jeremy Rosenfeld
jrose@contoso.com
Other Suggestions
14. Jeremy
Recent People
Other Suggestions
Jeremy Yi
jeremyi@contoso.com
Jeremy Champion (MECHANICS AND DEPLOYMENT)
Jchamp@contoso.com
Jeremy LAGARDE
jlegarde@northwinds.com
Jeremy Kraft (OPERATIONS)
jeremyk@contoso.com
Jeremy Rosenfeld
jrose@contoso.com
Jeremy Yi
jeremyi@contoso.com
Jeremy Champion (MECHANICS A…
Jchamp@contoso.com
Jeremy LAGARDE
jlegarde@northwinds.com
Jeremy Kraft (OPERATIONS)
jeremyk@contoso.com
Jeremy Rosenfeld
jrose@contoso.com
16. Jeremy Yi
jeremyi@contoso.com
Jeremy Champion (MECHAN…
Jchamp@contoso.com
Jeremy LAGARDE
jlegarde@northwinds.com
Jeremy Kraft (OPERATIONS)
jeremyk@contoso.com
Jeremy Rosenfeld
jrose@contoso.com