Core Blog

Discover Important Insights

Latest Posts

zero trust journey feature
Security

7 Key Guidelines to Accelerate Your Zero Trust Journey

To help you find the right route to take along your zero trust journey, our security experts have compiled 7 guidelines you can use to plot your own course.
microsoft teams may update
Productivity & Collaboration

5 New Updates to Microsoft Teams | May 2022

In our May update of Microsoft Teams features, we highlight new General Availability features and explain how they impact your day-to-day work.
networking automation blog
Networking

Prepare Your Company for the Future with Network Automation

With growing costs of network operations, more devices to manage, and the explosion of data, network managers face many challenges that automation can fix.
questions to ask managed services provider
Managed Services

5 Questions to Ask Before Choosing a Managed Services Provider

To help your business operate at peak efficiency, you may want to partner with a managed services provider. If so, here are the top five questions you should ask them.
microsoft teams update april 2022 feature
Productivity & Collaboration

11 New Updates to Microsoft Teams | April 2022

In this month's Teams feature update, we highlight new General Availability features and explain how they benefit your day-to-day work.
phishing-tactics-feature
Security

Beware of These 6 Phishing Tactics to Protect Your Users and Systems

Phishing attacks are common and varying. It’s not enough to just focus on system security; you must also think about user security. Here's what to look out for.

Featured Articles

team meeting with whiteboard
Productivity & Collaboration

10 Steps to Successful Requirements Gathering and Elicitation Meeting

Here are 10 recommended steps to help you organize and facilitate a successful requirements gathering and elicitation meeting.
path through field
Application Modernization

Agile User Story Splitting by Happy / Unhappy Paths & Operations (CRUD)

Good user stories and acceptance criteria will address both happy and unhappy paths of the story. The Happy Path represents the perfect situation where there are few (or no options) and nothing ever goes wrong.
Developer typing code on laptop
Productivity & Collaboration

Async, Await, and ConfigureAwait – Oh My!

In .NET Framework 4.5, async/await keywords were added to make async programming easier to work with. However, there are a few gotchas you may not know about.
Mountains and clouds
Cloud Deployment & Optimization

Azure Tips & Tricks: Preventing Headaches with Cosmos Document IDs

The following simple tip regarding Cosmos DB's document identifier property may help you avoid creating a hard-to-find bug in your code.
Power BI reports on tablet
Data Analytics

How Aggregation Tables Improve Performance for Power BI Reports

This dive into aggregation tables will help you decide when to use them in Power BI to improve your data model and query performance.
team collaborating on whiteboard
Application Modernization

How to Identify Good and Bad Agile User Stories

What Makes a Good User Story? The most common checklist that is applied to identify a GOOD user story was coined by Bill Wake, and it is the acronym INVEST. It stands for: I – independentN – negotiableV – valuableE- estimableS – smallT – testable Let me briefly explain each of these, and how it relates to the …

How to Identify Good and Bad Agile User Stories Read More »

star schema
Productivity & Collaboration

Managing Web.Config Settings For Multiple Environments

The web.config transformation process that occurs while publishing an ASP.NET web app is a compelling model for management automation.
team working in open office
Security

Office 365: Single Sign-on vs. Same Sign-on

When going to a sign-on solution it is good to weigh your options and pick the choice best suited for your business needs.
Power Apps
Application Modernization

When Is Your App Too Complex for Power Apps?

When is the business need and corresponding technical solution too complex for Power Apps? Here are some examples when a custom app may be the best choice.

Security Insights

We put security at the core of everything we do

7 Key Guidelines to Accelerate Your Zero Trust Journey

To help you find the right route to take along your zero trust journey, our security experts have compiled 7 guidelines you can use to plot your own course.

Beware of These 6 Phishing Tactics to Protect Your Users and Systems

Phishing attacks are common and varying. It’s not enough to just focus on system security; you must also think about user security. Here's what to look out for.

The 6 Major Stages of a Successful Cloud Migration: A Walkthrough

By following these proven major stages of a successful cloud migration, IT leaders can provide a path to a more flexible, responsive, and agile organization.

Connect Teams Users to PureCloud Help Desk Agents with Azure Bots

We recently helped one of our clients to create an experience where both end users and Help Desk Agents can remain in the tools where they are most productive.

Cloud Insights

Gain competitive advantage with Azure

Recent Posts

datacenter evpn blog feature
Application Modernization

Identifying SSAS Tabular Processing Performance Issues

Have you ever developed or worked on tabular models that take longer to process than you expect? Have you ever wanted to decrease the processing time so you can process the tabular model more often? In my experience, I have answered “yes” to both questions. In this post I’d like to share a technique that …

Identifying SSAS Tabular Processing Performance Issues Read More »

Read More
Developer typing code on laptop
Productivity & Collaboration

Async, Await, and ConfigureAwait – Oh My!

In .NET Framework 4.5, async/await keywords were added to make async programming easier to work with. However, there are a few gotchas you may not know about.
Read More
power bi report on desk
Data Analytics

A Look at Power BI as a Business Intelligence System: Power Query M

Here is a high-level view of Power BI and its ETL part that is behind the External Data Section that makes it a “kitchen sink” Business Intelligence system.
Read More
woman struggling with laptop
Application Modernization

Agile Transformation Pain Point: Struggles with Story Writing

Avoid Technical Stories Many Product Owners don’t have a lot of experience writing requirements, and if you’re a BA like I am coming from a waterfall world, you tend to like to write a lot because that’s what you used to have to do. But now user stories are meant to be from the user …

Agile Transformation Pain Point: Struggles with Story Writing Read More »

Read More
three ships in ocean
Data Analytics

How to Protect PHI Data by Limiting External Access to Power BI

In this walkthrough, we demonstrate how a health provider can restrict the sensitive data in their Power BI service environment to only their trusted network.
Read More
Woman at starting line
Productivity & Collaboration

SharePoint Workflow “Failed to Start”?

A recent .Net update in a Windows Server update has caused SharePoint workflows to fail to start. Here's a workaround to get you back up and running quickly.
Read More

Subscribe to our Newsletter

Stay informed on the latest technology news and trends

X