Thinking of migrating to Office 365? Already migrated to the cloud? Think that because you’ve moved or are moving that there will be no maintenance required for your cloud infrastructure? Well, it’s mostly true. There are things that you can do to keep your environment running smooth now and in the future.
You invested in a firewall to protect your network and systems, and years ago, this was a very effective security strategy, but in recent times, this has changed, and the old models of deploying security are no longer very effective.
In today’s day and age, technology allows for more interconnectivity than ever. Wi-Fi is available nearly everywhere, whether we are sitting in a coffee shop or aboard an airplane. We can remotely monitor our homes camera systems, and change the thermostat while away. So why, with all of the modern technology available today, do we still have so many technology issues in the corporate setting? Read more here.
In just a few simple steps, you can insert weather information under the site icon in the master page. I recommend using the custom master page location because it is easy to find the site logo on the master page. You can place the code just about anywhere on the page such as the Content Editor Web Part or Code Snippet Web Part. In this example, we will be placing the code in the master page.
The scrum framework includes a series of meetings, commonly referred to as scrum ceremonies, to facilitate the scrum process. In this edition of Insights to Agile, I’ll cover what those scrum ceremonies are as well as the goals for each. Some things to remember is that for every scrum ceremony, the scrum master is responsible for facilitating the meeting but should have no decision making authority. Additionally, scrum methodology strongly enforces time boxes for everything – including scrum ceremonies. Based on the length of the sprints, the scrum master should manage to set time boxes for each of the scrum ceremonies described below, working to accomplish the ceremony goal in the amount of time allotted.
Since the introduction of SharePoint in Office 365, it has become increasingly apparent that collaboration on a cloud platform makes the most sense. As we all know, in this crazy world of technology things change quicker than you can finish reading this article. It seems like only yesterday that we began our adventure into SharePoint 2013 and now the 2016 evolution of collaborative thinking has taken us into the world of the cloud. I call these changes the new “Modern” experience and in this article I address how it relates to the “classic” experience of SharePoint 2013. Let’s then list the top changes in the SharePoint Modern experience that address the gaps between SharePoint 2013 and SharePoint in Office 365.
Among the first steps in implementing a hybrid SCCM/Intune environment is setting up the mobile applications that will be managed on end user devices. For the apps publicly available in the Google Play and iTunes app stores, this means tracking down the URL for the app in order to create the Deployment Type. In this post, we’ll not only provide you with the URLs of the common Microsoft applications, but also with some handy PowerShell scripting to automatically create these apps in your SCCM environment.
Since April 4, 1975, Microsoft has been a leader in the technology area. It started with Altair Basic and has since has evolved into personal and corporate computing. As the computing environment transformed from corporate, to personal to cloud, Microsoft has positioned itself as a market leader in Online Services. Microsoft’s online services comprises of two major offerings: Azure and Office 365. Both of these offerings are built on the same robust and flexible platform that run on datacenters owned and maintained by Microsoft.
“Cultures are built on fiction.” A statement made by Ashton Kutcher at one of the largest cybersecurity events in the world. More than likely, your initial thought is that you disagree. I did. But let’s breakdown his statement to help us understand how this belief can actually help create an Internet Culture for minimizing cybercrime.
If you are new to the agile framework for project execution and management, you may find yourself asking, "Who is who?" and "What are the responsibilities of each role?" When you and your team have a solid understanding of what each person will be held accountable for, you can work in a more streamlined fashion within the agile framework. So, what roles make up an agile team, and who should fill those roles?
Citrix is known for taking an existing technology and turning it into something better. XenApp has always been referred to as, “RDP on steroids” and with a click of a mouse, PVS allows dynamically deployable machines and servers. Citrix’s Global Server Load Balancing (GSLB) is another technology following suit. As many of you know, DNS is an Internet service that translates domain names into IP addresses.
In October, Microsoft reached general availability of a new solution, named Azure Information Protection. This solution is user focused, and allows employees to label and classify documents while editing them in the Office application. The classification is part of the document which enables it to travel for internal usage and travel with the document for secure business to business collaboration. If the classification or security of the document changes, it changes while at rest outside your network as well.
If you aren’t familiar with the agile framework for project management (and even if you are), you may feel like reading about the subject is like reading about something in a mix of English and a totally different language. I’m here to help. Use this glossary as a reference to make sense of the terms specific to the agile methodology.
You don’t need to be a large retailer with millions of credit card records or a healthcare organization storing millions of personal health records. With Ransomware, the cybercriminals are not stealing any data from you. Instead, they encrypt your files, these could be personal pictures of your family vacations, files that contain important business information, or system files needed for your applications to run. After encrypting your files, they ask that you pay a “ransom” to regain access to your files. How do you know that you are protected from ransomware?
Workplace technology is a term that is gaining more and more steam as organizations look to build out new office space to hire the growing millennial workforce as well as leverage the space as a recruiting tool. Workplace technology is one of the most misunderstood concepts in the construction and real estate industry today.
Microsoft launched a new product on November 3, 2013 called Microsoft Teams. Teams is a new secure, chat-based workspace in Office 365 for dynamic, fast paced collaboration among employees. Microsoft Teams is currently in preview for all Office 365 customers with an E-Suite (E1, E3, E4 and E5) until calendar year 2017 Q1 when it will be generally available – and will be included for all Office 365 E-Suite customers at no additional cost.
You may have heard about the agile framework or the scrum methodology in today’s technology driven world. But, what is Agile and what does it mean to apply the agile framework to projects? Should your team use it? What’s the right approach when using agile? I hope to answer all these questions and more throughout this blog series: Insights into Agile.
With the introduction of Windows 10 and growing interest in Windows as a Service [WaaS], Netrix is helping clients navigate these changes from end users to IT. The Netrix team is dedicated to Windows 10 and System Center upgrade initiatives.
The security industry is witnessing a huge increase in ransomware in the latter half of 2016. Checkpoint reported attacks are up by 30% in August of 2016. New variants of ransomware are up by 12%. McAfee reports seeing 500,000 new variants of malware per day in 2016 on endpoints they manage.
The latest malware is not a traditional virus, it is called Ransomware. There are various variants such as Cryptolocker or Locky, but all do the same thing, encrypt your data, and then force a user or company to pay a large ransom to get the data back.
The most important role that the product owner has is prioritizing the product backlog. Since the primary responsibility of the product owner is to generate return on investment for the project, and agile projects are iterative in nature, having the right priority for a product backlog will ensure that you get a quick ROI on your project. Let me explain.