Select Page
Predictive analysis made easy

Implement predictive analytics for manufacturing with Symphony Industrial AI

Technology allows manufacturers to generate more data than traditional systems and users can digest. Predictive analytics, enabled by big data and cloud technologies, can take advantage of this data and provide new and unique insights into the health of manufacturing ... continue reading
Zero Trust part 1: Identity and access management

Zero Trust part 1: Identity and access management

Once in a while, a simple phrase captures our imagination, expressing a great way to think about a problem. Zero Trust is such a phrase. Today, Ill define Zero Trust and then discuss the first step to enabling a Zero ... continue reading
Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, ... continue reading

A fintech startup pivots to Azure Cosmos DB

The right technology choices can accelerate success for a cloud born business. This is true for the fintech start-up clearTREND Research. Their solution architecture team knew one of the most important decisions would be the database decision between SQL or ... continue reading
Circular room of windows overlooking a city view

How smart buildings can help combat climate change

The Internet of Things (IoT) is changing the way governments and organizations tackle some of humanity’s thorniest challenges. In this three-part series, we looked first at common issues leaders must address to drive digital transformation in their cities. Next, we’ll ... continue reading
Step 1. Identify users: top 10 actions to secure your environment

Step 1. Identify users: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. Well provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we ... continue reading

Five lessons for building your roadmap to a secure hybrid cloud future

This blog post is a part of our security series for National Cybersecurity Awareness Month where we discuss how federal CIOs can best prepare for a cloud environment that works securely with your on-premises datacenters. The need for federal agencies ... continue reading
Automate user provisioning and de-provisioning to SaaS applications.png

Eight essentials for hybrid identity #5: Automate user access to SaaS applications

Howdy folks, Today, we present the next part of our “Eight Essentials for Hybrid Identity” blog series, based on what we’ve learned from working with tens of thousands of organizations on securing their hybrid environments. In the first part of ... continue reading
AAD_decisiontree-770x1024.png

Eight essentials for hybrid identity #2: Choosing the right authentication method

First published to the Microsoft 365 Blog on June 12, 2018 Howdy folks, I’m here to share with you the next part in our Eight Essentials for Hybrid Identity blog series, based on what we’ve learned from working with tens ... continue reading
Loading...