Select Page
Holiday deals from the Microsoft Store - Harmon Kardon Invoke, Xbox One X and much more!

Holiday deals from the Microsoft Store – Harmon Kardon Invoke, Xbox One X and much more!

It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, ... continue reading
Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy

Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy

Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today. Join Lex Thomas as he welcomes back Mark Simos to ... continue reading
Your Private Network in the cloud: (Part 4) How to make your connections fast, reliable and private using Azure ExpressRoute

Your Private Network in the cloud: (Part 4) How to make your connections fast, reliable and private using Azure ExpressRoute

Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster ... continue reading

How to manage Office 365 with System Center Configuration Manager

System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and ... continue reading
The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks

The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks

Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise ... continue reading
Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter. Join Lex ... continue reading
Your Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

Your Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises ... continue reading
Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-Up

Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-Up

The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises ... continue reading
From Expert Service to Free Training Programs and Events...Find out what's next at the Microsoft Store

From Expert Service to Free Training Programs and Events…Find out what’s next at the Microsoft Store

From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex ... continue reading
Loading...