Latest Posts
How Passwordless Authentication Can Secure Your Environment
What if your end users could stop creating, storing, or remembering passwords? It's possible with passwordless authentication. Here's what you need to know.
7 Key Guidelines to Accelerate Your Zero Trust Journey
To help you find the right route to take along your zero trust journey, our security experts have compiled 7 guidelines you can use to plot your own course.
5 New Updates to Microsoft Teams | May 2022
In our May update of Microsoft Teams features, we highlight new General Availability features and explain how they impact your day-to-day work.
Prepare Your Company for the Future with Network Automation
With growing costs of network operations, more devices to manage, and the explosion of data, network managers face many challenges that automation can fix.
5 Questions to Ask Before Choosing a Managed Services Provider
To help your business operate at peak efficiency, you may want to partner with a managed services provider. If so, here are the top five questions you should ask them.
Featured Articles
10 Steps to Successful Requirements Gathering and Elicitation Meeting
Here are 10 recommended steps to help you organize and facilitate a successful requirements gathering and elicitation meeting.
Agile User Story Splitting by Happy / Unhappy Paths & Operations (CRUD)
Good user stories and acceptance criteria will address both happy and unhappy paths of the story. The Happy Path represents the perfect situation where there are few (or no options) and nothing ever goes wrong.
Async, Await, and ConfigureAwait – Oh My!
In .NET Framework 4.5, async/await keywords were added to make async programming easier to work with. However, there are a few gotchas you may not know about.
Azure Tips & Tricks: Preventing Headaches with Cosmos Document IDs
The following simple tip regarding Cosmos DB's document identifier property may help you avoid creating a hard-to-find bug in your code.
How Aggregation Tables Improve Performance for Power BI Reports
This dive into aggregation tables will help you decide when to use them in Power BI to improve your data model and query performance.
How to Identify Good and Bad Agile User Stories
What Makes a Good User Story? The most common checklist that is applied to identify a GOOD user story was coined by Bill Wake, and it is the acronym INVEST. It stands for: I – independentN – negotiableV – valuableE- estimableS – smallT – testable Let me briefly explain each of these, and how it relates to the …
Managing Web.Config Settings For Multiple Environments
The web.config transformation process that occurs while publishing an ASP.NET web app is a compelling model for management automation.
Office 365: Single Sign-on vs. Same Sign-on
When going to a sign-on solution it is good to weigh your options and pick the choice best suited for your business needs.
When Is Your App Too Complex for Power Apps?
When is the business need and corresponding technical solution too complex for Power Apps? Here are some examples when a custom app may be the best choice.
Recent Posts
5 New Updates to Microsoft Teams | May 2022
In our May update of Microsoft Teams features, we highlight new General Availability features and explain how they impact your day-to-day work.
Read More Prepare Your Company for the Future with Network Automation
With growing costs of network operations, more devices to manage, and the explosion of data, network managers face many challenges that automation can fix.
Read More 5 Questions to Ask Before Choosing a Managed Services Provider
To help your business operate at peak efficiency, you may want to partner with a managed services provider. If so, here are the top five questions you should ask them.
Read More 11 New Updates to Microsoft Teams | April 2022
In this month's Teams feature update, we highlight new General Availability features and explain how they benefit your day-to-day work.
Read More Beware of These 6 Phishing Tactics to Protect Your Users and Systems
Phishing attacks are common and varying. It’s not enough to just focus on system security; you must also think about user security. Here's what to look out for.
Read More Datacenter Modernization: Can’t Get There from Here
Comprehensive datacenter change is difficult, but here's how to build a new modern datacenter, in the same footprint, without negatively impacting the business.
Read More Subscribe to our Newsletter