Latest Posts
5 New Updates to Microsoft Teams | May 2022
In our May update of Microsoft Teams features, we highlight new General Availability features and explain how they impact your day-to-day work.
Prepare Your Company for the Future with Network Automation
With growing costs of network operations, more devices to manage, and the explosion of data, network managers face many challenges that automation can fix.
5 Questions to Ask Before Choosing a Managed Services Provider
To help your business operate at peak efficiency, you may want to partner with a managed services provider. If so, here are the top five questions you should ask them.
11 New Updates to Microsoft Teams | April 2022
In this month's Teams feature update, we highlight new General Availability features and explain how they benefit your day-to-day work.
Beware of These 6 Phishing Tactics to Protect Your Users and Systems
Phishing attacks are common and varying. It’s not enough to just focus on system security; you must also think about user security. Here's what to look out for.
Featured Articles
10 Steps to Successful Requirements Gathering and Elicitation Meeting
Here are 10 recommended steps to help you organize and facilitate a successful requirements gathering and elicitation meeting.
Agile User Story Splitting by Happy / Unhappy Paths & Operations (CRUD)
Good user stories and acceptance criteria will address both happy and unhappy paths of the story. The Happy Path represents the perfect situation where there are few (or no options) and nothing ever goes wrong.
Async, Await, and ConfigureAwait – Oh My!
In .NET Framework 4.5, async/await keywords were added to make async programming easier to work with. However, there are a few gotchas you may not know about.
Azure Tips & Tricks: Preventing Headaches with Cosmos Document IDs
The following simple tip regarding Cosmos DB's document identifier property may help you avoid creating a hard-to-find bug in your code.
How Aggregation Tables Improve Performance for Power BI Reports
This dive into aggregation tables will help you decide when to use them in Power BI to improve your data model and query performance.
How to Identify Good and Bad Agile User Stories
What Makes a Good User Story? The most common checklist that is applied to identify a GOOD user story was coined by Bill Wake, and it is the acronym INVEST. It stands for: I – independentN – negotiableV – valuableE- estimableS – smallT – testable Let me briefly explain each of these, and how it relates to the …
Managing Web.Config Settings For Multiple Environments
The web.config transformation process that occurs while publishing an ASP.NET web app is a compelling model for management automation.
Office 365: Single Sign-on vs. Same Sign-on
When going to a sign-on solution it is good to weigh your options and pick the choice best suited for your business needs.
When Is Your App Too Complex for Power Apps?
When is the business need and corresponding technical solution too complex for Power Apps? Here are some examples when a custom app may be the best choice.
Recent Posts
Cybersecurity Myth Busted: Tools Are the Solution
Trying to secure an organization, data, or an environment does not revolve around tools. Instead, they must be managed with ongoing processes and procedures.
Read More Time to Reconsider MP-BGP EVPN for Your Datacenter Network?
Most datacenter architects discounted using a native VxLAN design because of multiple challenges and limitations. But here's why it might be time to reconsider.
Read More Part-Time Staff Cannot Monitor and Manage Your Security
Security isn't 9-5. You have concerns, risks, and attacks 24/7/365. Adversaries work around the clock. Therefore, your security also needs constant attention.
Read More Cybersecurity Myth Busted: Security Can Be Managed by IT
IT focuses on building and running systems to enable business. But Security asks if the systems are secure, if they can break them, and how they can be misused.
Read More The Disappearing Edge Requires SASE to Protect Remote Workforces
2020 made IT pros do a lot of unnatural things to keep businesses going. Now it’s critical to consider architectures like SASE to protect our remote workforces.
Read More 3 Key Foundations to Ensure Long-Term Success with Microsoft 365
Regardless of the workload that's being enabled, “lit-up”, or adopted, these basic foundational items need to be addressed to set up M365 for long-term success.
Read More Subscribe to our Newsletter