Select Page
machine_learning_toyota_001

Step-By-Step: Getting Started with Azure Machine Learning

Artificial Intelligence (AI) study and use is on the rise. Tools to enable AI are becoming more readily available, simpler to use and easier to implement. What's more is that the definition of AI itself has been broken down into ... continue reading
PowerShell Basics Series

PowerShell Basics: Detecting if a String Ends with a Certain Character

Did you know you can detect if a string ends in a specific character or if it starts in one in PowerShell? Thomas Rayner previously shared on CANITPRO.NET how this can be easily done by using regular expressions or more ... continue reading
Step-By-Step: Migrating The Active Directory Certificate Service From Windows Server 2003 to 2012 R2

Step-By-Step: Migrating The Active Directory Certificate Service From Windows Server 2003 to 2012 R2

Support for both Windows Server 2003 and 2003 R2 ended on July 14th 2015 and yet there are still a number of organizations operating their businesses on it. With this in mind, there are still a great number of IT ... continue reading
Azure Backup and VMware VMs: Backup, Restore, Repeat!

Azure Backup and VMware VMs: Backup, Restore, Repeat!

With two cities now completed, Microsoft Ignite the Tour is well underway and the "Ask the Experts" area has provided a plethora of questions for our team to research and answer. In São Paulo, our team received a lot of ... continue reading
Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365

Step-By-Step: Setting up AD FS and Enabling Single Sign-On to Office 365

This post will walk you through a typical highly available setup into Office 365. Ideally this server will be installed as virtual servers on multiple Hyper-V hosts. Think about redundancy, not only in the virtual servers, but in the Hyper-V ... continue reading
Enabling_Advanced_Security_Audit_Policy_via_DS Access_1.png

Step-By-Step: Enabling Advanced Security Audit Policy via Directory Services Access

Active directory is one of the more impactful services from a security perspective within an organization. Even small changes with in an Organization’s AD can cause a major business impact. Preventing any unauthorized access and unplanned changes in an AD ... continue reading
meta1

Step-By-Step: Manually Removing A Domain Controller Server

Use of DCPROMO is still the proper way to remove a DC server in an Active Directory infrastructure. The following video provides an example of these steps: Certain situations, such as server crash or failure of the DCPROMO option, require ... continue reading
Hackers_Attack_IoT_Fish_tank_Casino.png

Is IoT the latest Shadow IT Threat?

Remember the days when workers used to bring their own mobile device to work that did not meet the guidelines of said organization but found a way to connect it anyway? While troublesome, most times these devices would set off ... continue reading

Step-By-Step: Enabling Hyper-V for use on Windows 10

Virtualization provides a plethora of solutions from making the most of an organization’s hardware investment to running specific applications in other OS offerings. Windows 8 was the first Windows client operating system to include hardware virtualization support natively. Using the ... continue reading
Loading...