Among the first steps in implementing a hybrid SCCM/Intune environment is setting up the mobile applications that will be managed on end user devices. For the apps publicly available in the Google Play and iTunes app stores, this means tracking down the URL for the app in order to create the Deployment Type. In this post, we’ll not only provide you with the URLs of the common Microsoft applications, but also with some handy PowerShell scripting to automatically create these apps in your SCCM environment.
Since April 4, 1975, Microsoft has been a leader in the technology area. It started with Altair Basic and has since has evolved into personal and corporate computing. As the computing environment transformed from corporate, to personal to cloud, Microsoft has positioned itself as a market leader in Online Services. Microsoft’s online services comprises of two major offerings: Azure and Office 365. Both of these offerings are built on the same robust and flexible platform that run on datacenters owned and maintained by Microsoft.
“Cultures are built on fiction.” A statement made by Ashton Kutcher at one of the largest cybersecurity events in the world. More than likely, your initial thought is that you disagree. I did. But let’s breakdown his statement to help us understand how this belief can actually help create an Internet Culture for minimizing cybercrime.
If you are new to the agile framework for project execution and management, you may find yourself asking, "Who is who?" and "What are the responsibilities of each role?" When you and your team have a solid understanding of what each person will be held accountable for, you can work in a more streamlined fashion within the agile framework. So, what roles make up an agile team, and who should fill those roles?
Citrix is known for taking an existing technology and turning it into something better. XenApp has always been referred to as, “RDP on steroids” and with a click of a mouse, PVS allows dynamically deployable machines and servers. Citrix’s Global Server Load Balancing (GSLB) is another technology following suit. As many of you know, DNS is an Internet service that translates domain names into IP addresses.
In October, Microsoft reached general availability of a new solution, named Azure Information Protection. This solution is user focused, and allows employees to label and classify documents while editing them in the Office application. The classification is part of the document which enables it to travel for internal usage and travel with the document for secure business to business collaboration. If the classification or security of the document changes, it changes while at rest outside your network as well.
If you aren’t familiar with the agile framework for project management (and even if you are), you may feel like reading about the subject is like reading about something in a mix of English and a totally different language. I’m here to help. Use this glossary as a reference to make sense of the terms specific to the agile methodology.
You don’t need to be a large retailer with millions of credit card records or a healthcare organization storing millions of personal health records. With Ransomware, the cybercriminals are not stealing any data from you. Instead, they encrypt your files, these could be personal pictures of your family vacations, files that contain important business information, or system files needed for your applications to run. After encrypting your files, they ask that you pay a “ransom” to regain access to your files. How do you know that you are protected from ransomware?
Workplace technology is a term that is gaining more and more steam as organizations look to build out new office space to hire the growing millennial workforce as well as leverage the space as a recruiting tool. Workplace technology is one of the most misunderstood concepts in the construction and real estate industry today.
Microsoft launched a new product on November 3, 2013 called Microsoft Teams. Teams is a new secure, chat-based workspace in Office 365 for dynamic, fast paced collaboration among employees. Microsoft Teams is currently in preview for all Office 365 customers with an E-Suite (E1, E3, E4 and E5) until calendar year 2017 Q1 when it will be generally available – and will be included for all Office 365 E-Suite customers at no additional cost.
You may have heard about the agile framework or the scrum methodology in today’s technology driven world. But, what is Agile and what does it mean to apply the agile framework to projects? Should your team use it? What’s the right approach when using agile? I hope to answer all these questions and more throughout this blog series: Insights into Agile.
With the introduction of Windows 10 and growing interest in Windows as a Service [WaaS], Netrix is helping clients navigate these changes from end users to IT. The Netrix team is dedicated to Windows 10 and System Center upgrade initiatives.
The security industry is witnessing a huge increase in ransomware in the latter half of 2016. Checkpoint reported attacks are up by 30% in August of 2016. New variants of ransomware are up by 12%. McAfee reports seeing 500,000 new variants of malware per day in 2016 on endpoints they manage.
The latest malware is not a traditional virus, it is called Ransomware. There are various variants such as Cryptolocker or Locky, but all do the same thing, encrypt your data, and then force a user or company to pay a large ransom to get the data back.
The most important role that the product owner has is prioritizing the product backlog. Since the primary responsibility of the product owner is to generate return on investment for the project, and agile projects are iterative in nature, having the right priority for a product backlog will ensure that you get a quick ROI on your project. Let me explain.
Netrix International Holdings LLC announced today that it has acquired T2Plus OTC, in Sofia, Bulgaria, in an effort to continue strengthening international coverage.
Netrix Worldwide, LLC announced today that it has acquired NetGlobal Solutions and expanding international operations in Pune, India.
As an IT consulting company out of the Midwest, we’ve seen IT managed services in Chicago go hand-in-hand upon deploying technology to clients. Traditionally, Managed IT Services were focused on addressing risks and updates in technology proactively.
The need for consolidation is coming from the demand for fast IT and a quicker time to market. However, with it comes another skillset that your organization must acquire. The long-term impact of introducing the right cloud to your IT is to drastically increase...
Several studies by leading research organizations have provided us insight on why conferences and meetings seem to always start behind schedule. With unified communication and integrated collaboration technologies like Microsoft Skype for Business, Cisco Webex, collaboration boardrooms, touch enabled SMART boards, etc. that make it easier than ever to create, schedule and log on, meetings are starting just as late, if not later, than in the past. Let’s take a look at...
You’ve heard the term but why are they important to the future of cloud services? Containers wrap up a piece of software in a complete file system that contains everything it needs to run: code, runtime, system tools, system libraries – anything you can install on a server. This guarantees that it will always...