Core Blog

Discover Important Insights

Latest Posts

zero trust journey feature
Security

7 Key Guidelines to Accelerate Your Zero Trust Journey

To help you find the right route to take along your zero trust journey, our security experts have compiled 7 guidelines you can use to plot your own course.
microsoft teams may update
Productivity & Collaboration

5 New Updates to Microsoft Teams | May 2022

In our May update of Microsoft Teams features, we highlight new General Availability features and explain how they impact your day-to-day work.
networking automation blog
Networking

Prepare Your Company for the Future with Network Automation

With growing costs of network operations, more devices to manage, and the explosion of data, network managers face many challenges that automation can fix.
questions to ask managed services provider
Managed Services

5 Questions to Ask Before Choosing a Managed Services Provider

To help your business operate at peak efficiency, you may want to partner with a managed services provider. If so, here are the top five questions you should ask them.
microsoft teams update april 2022 feature
Productivity & Collaboration

11 New Updates to Microsoft Teams | April 2022

In this month's Teams feature update, we highlight new General Availability features and explain how they benefit your day-to-day work.
phishing-tactics-feature
Security

Beware of These 6 Phishing Tactics to Protect Your Users and Systems

Phishing attacks are common and varying. It’s not enough to just focus on system security; you must also think about user security. Here's what to look out for.

Featured Articles

team meeting with whiteboard
Productivity & Collaboration

10 Steps to Successful Requirements Gathering and Elicitation Meeting

Here are 10 recommended steps to help you organize and facilitate a successful requirements gathering and elicitation meeting.
path through field
Application Modernization

Agile User Story Splitting by Happy / Unhappy Paths & Operations (CRUD)

Good user stories and acceptance criteria will address both happy and unhappy paths of the story. The Happy Path represents the perfect situation where there are few (or no options) and nothing ever goes wrong.
Developer typing code on laptop
Productivity & Collaboration

Async, Await, and ConfigureAwait – Oh My!

In .NET Framework 4.5, async/await keywords were added to make async programming easier to work with. However, there are a few gotchas you may not know about.
Mountains and clouds
Cloud Deployment & Optimization

Azure Tips & Tricks: Preventing Headaches with Cosmos Document IDs

The following simple tip regarding Cosmos DB's document identifier property may help you avoid creating a hard-to-find bug in your code.
Power BI reports on tablet
Data Analytics

How Aggregation Tables Improve Performance for Power BI Reports

This dive into aggregation tables will help you decide when to use them in Power BI to improve your data model and query performance.
team collaborating on whiteboard
Application Modernization

How to Identify Good and Bad Agile User Stories

What Makes a Good User Story? The most common checklist that is applied to identify a GOOD user story was coined by Bill Wake, and it is the acronym INVEST. It stands for: I – independentN – negotiableV – valuableE- estimableS – smallT – testable Let me briefly explain each of these, and how it relates to the …

How to Identify Good and Bad Agile User Stories Read More »

star schema
Productivity & Collaboration

Managing Web.Config Settings For Multiple Environments

The web.config transformation process that occurs while publishing an ASP.NET web app is a compelling model for management automation.
team working in open office
Security

Office 365: Single Sign-on vs. Same Sign-on

When going to a sign-on solution it is good to weigh your options and pick the choice best suited for your business needs.
Power Apps
Application Modernization

When Is Your App Too Complex for Power Apps?

When is the business need and corresponding technical solution too complex for Power Apps? Here are some examples when a custom app may be the best choice.

Security Insights

We put security at the core of everything we do

7 Key Guidelines to Accelerate Your Zero Trust Journey

To help you find the right route to take along your zero trust journey, our security experts have compiled 7 guidelines you can use to plot your own course.

Beware of These 6 Phishing Tactics to Protect Your Users and Systems

Phishing attacks are common and varying. It’s not enough to just focus on system security; you must also think about user security. Here's what to look out for.

The 6 Major Stages of a Successful Cloud Migration: A Walkthrough

By following these proven major stages of a successful cloud migration, IT leaders can provide a path to a more flexible, responsive, and agile organization.

Connect Teams Users to PureCloud Help Desk Agents with Azure Bots

We recently helped one of our clients to create an experience where both end users and Help Desk Agents can remain in the tools where they are most productive.

Cloud Insights

Gain competitive advantage with Azure

Recent Posts

cybersecurity myth tools
Security

Cybersecurity Myth Busted: Tools Are the Solution

Trying to secure an organization, data, or an environment does not revolve around tools. Instead, they must be managed with ongoing processes and procedures.
Read More
datacenter evpn blog feature
Networking

Time to Reconsider MP-BGP EVPN for Your Datacenter Network?

Most datacenter architects discounted using a native VxLAN design because of multiple challenges and limitations. But here's why it might be time to reconsider.
Read More
security staff blog
Security

Part-Time Staff Cannot Monitor and Manage Your Security

Security isn't 9-5. You have concerns, risks, and attacks 24/7/365. Adversaries work around the clock. Therefore, your security also needs constant attention.
Read More
Cybersecurity Myth Busted
Security

Cybersecurity Myth Busted: Security Can Be Managed by IT

IT focuses on building and running systems to enable business. But Security asks if the systems are secure, if they can break them, and how they can be misused.
Read More
Remote worker on video call
Security

The Disappearing Edge Requires SASE to Protect Remote Workforces

2020 made IT pros do a lot of unnatural things to keep businesses going. Now it’s critical to consider architectures like SASE to protect our remote workforces.
Read More
Microsoft 365 Tips
Cloud Deployment & Optimization

3 Key Foundations to Ensure Long-Term Success with Microsoft 365

Regardless of the workload that's being enabled, “lit-up”, or adopted, these basic foundational items need to be addressed to set up M365 for long-term success.
Read More

Subscribe to our Newsletter

Stay informed on the latest technology news and trends

X