Select Page

How to manage Office 365 with System Center Configuration Manager

System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and ... continue reading

Predictions for 2017 and Beyond: A look into what’s driving the future of technology with Microsoft CTO of Services, Norm Judah

Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review ... continue reading

(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading

(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading

(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading

Credential Theft: How the Attack Landscape has changed and What You can do about it

The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access ... continue reading

The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity. Join Lex Thomas as he welcomes Jeremy Rule to the show, as they ... continue reading

Building Microservices on Azure: How to Get Started with the Application Revolution Powered by the Cloud

Software Methodologies, process, patterns, platform, and devices are constantly evolving. Fast, agile, inexpensive, and massively scalable infrastructure, is improving operational efficiency and enabling faster-time-to-value across industries. However, many companies are finding that making their applications highly available, scalable and agile ... continue reading

First Look Into Blockchain: How to Develop, Test, and Deploy Blockchain Applications

Blockchain is an emerging way for businesses, industries, and public organizations to almost instantaneously make and verify transactions — streamlining business processes, saving money, and reducing the potential for fraud.At its core, a blockchain is a data structure that’s used ... continue reading
Loading...