Subscribe to get all the news, info and tutorials you need to build better business apps and sites
In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered.
Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions.
Azure Blueprints provide a "one-stop shop" for Azure governance. By implementing JSON templates and a controlled, unified workflow, Azure administrators can define, deploy, enforce, and maintain standardized Azure environments.
For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory.
If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...
Plan, practice, and then keep on practicing! It sounds so simple, but those are the keys for IT teams who have to respond to a disaster delivered by Mother Nature—whether it’s a flood, fire, earthquake, or a major storm such as a hurricane or tornado.
Today I will teach you how to create what Microsoft calls a managed storage account. As you may know, each storage account has two interchangeable private keys you can use to authenticate programmatically to the general purpose storage account's four services:
In this article, Dan Franciscus covers how to use the Invoke-Command and why it is one of his favorite commands to use in PowerShell.
Data archiving is an odd practice at times. When big data is focused on every last bit of information, the idea of relegating any amount of it to outdated media can seem like a waste of resources. Add the cloud and you begin to see how out of place this concept can be.