Select Page
Graph showing ContosoCars locations, device ownership, groups, platforms, and requirements. All part of their use-case management plan.

Step 5. Set up mobile device management: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 5. Set up mobile device management, youll learn how to plan your Microsoft Intune deployment ... continue reading
image

How to avoid overstocks and understocks with better demand forecasting

Promotional planning and demand forecasting are incredibly complex processes. Take something seemingly straight-forward, like planning the weekly flyer, and there are thousands of questions involving a multitude of teams just to decide what products to promote, and where to position ... continue reading
Image

Modernizing payment management for online merchants

E-commerce merchants all over the world are innovating every day to offer customers the best user experience. To keep customers coming back, the buying experience should leave only good impressions, from beginning to end. To achieve this, merchants want to ... continue reading
IoT Central dashboard

The Things Network and Azure IoT connect LoRaWAN devices

This week, at The Things Conference in Amsterdam, Microsoft and The Things Network Foundation collaborate with 2,000 LoRaWAN developers, innovators, and integrators on connecting devices to Azure IoT Central using the open source project Azure IoT Central Device Bridge. Internet ... continue reading
Step 4. Set conditional access policies: top 10 actions to secure your environment

Step 4. Set conditional access policies: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and ... continue reading
Predictive analysis made easy

Implement predictive analytics for manufacturing with Symphony Industrial AI

Technology allows manufacturers to generate more data than traditional systems and users can digest. Predictive analytics, enabled by big data and cloud technologies, can take advantage of this data and provide new and unique insights into the health of manufacturing ... continue reading
Zero Trust part 1: Identity and access management

Zero Trust part 1: Identity and access management

Once in a while, a simple phrase captures our imagination, expressing a great way to think about a problem. Zero Trust is such a phrase. Today, Ill define Zero Trust and then discuss the first step to enabling a Zero ... continue reading
Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

Step 2. Manage authentication and safeguard access: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. We will provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, ... continue reading

A fintech startup pivots to Azure Cosmos DB

The right technology choices can accelerate success for a cloud born business. This is true for the fintech start-up clearTREND Research. Their solution architecture team knew one of the most important decisions would be the database decision between SQL or ... continue reading
Step 1. Identify users: top 10 actions to secure your environment

Step 1. Identify users: top 10 actions to secure your environment

This series outlines the most fundamental steps you can take with your investment in Microsoft 365 security solutions. Well provide advice on activities such as setting up identity management through active directory, malware protection, and more. In this post, we ... continue reading
Loading...