Select Page

How to manage Office 365 with System Center Configuration Manager

System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and ... continue reading
(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
Credential Theft: How the Attack Landscape has changed and What You can do about it

Credential Theft: How the Attack Landscape has changed and What You can do about it

The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access ... continue reading
The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity. Join Lex Thomas as he welcomes Jeremy Rule to the show, as they ... continue reading
Building Microservices on Azure: How to Get Started with the Application Revolution Powered by the Cloud

Building Microservices on Azure: How to Get Started with the Application Revolution Powered by the Cloud

Software Methodologies, process, patterns, platform, and devices are constantly evolving. Fast, agile, inexpensive, and massively scalable infrastructure, is improving operational efficiency and enabling faster-time-to-value across industries. However, many companies are finding that making their applications highly available, scalable and agile ... continue reading
GitHub_LearnMore

First Look Into Blockchain: How to Develop, Test, and Deploy Blockchain Applications

Blockchain is an emerging way for businesses, industries, and public organizations to almost instantaneously make and verify transactions — streamlining business processes, saving money, and reducing the potential for fraud.At its core, a blockchain is a data structure that’s used ... continue reading
Enterprise Threat Detection Service: An In-Depth Overview of Microsoft's Latest Cybersecurity Solution

Enterprise Threat Detection Service: An In-Depth Overview of Microsoft’s Latest Cybersecurity Solution

Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei ... continue reading
Loading...