Weekly Tech Tip: Check Your FEC!
Connectivity Issues Between Cohesity C5016 Nodes and Nexus 93180YC-FX3H Switches Very recently, I was deploying a new Cohesity C5016 appliance with 25Gb NICs, connecting up to a pair of Nexus 93180YC-FX3H switches. When using the 9K’s in a VPC pair, my personal preference is to configure the Cohesity nodes with LACP to get the most […]
Cloud-First vs On-Premises Computing: Contrasting Views
Fortunately, organizations have choices to proceed. Our prior blog outlines several of them. This blog provides the perspectives of two IT Executives and Strategic Advisors. Tom Papahronis’s comments can be found in the left column of each table from a Cloud-First perspective, while Mehran Basiratmand, PhD‘s thoughts can be found in the right columns from a Cloud-Smart perspective. Without further ado, […]
Microsoft Intune Multi-Admin Approval
Microsoft Intune is a cloud-based device management service that allows you to manage and secure your organization’s devices, apps, and data. As an Intune Administrator, you can configure Microsoft Intune settings, such as creating policies, applications, compliance, and assigning roles. However, some of these changes may have a significant impact on your organization’s security and […]
Weekly Tech Tip: Nutanix Centralized Local Password Management
Simplify and Secure: Centralized Password Management with Prism Central In the ever-evolving landscape of IT security, managing passwords across various platforms can be a daunting task. However, Nutanix has released a Centralized Local Password Management feature designed to centralize password management, ensuring a more secure and standardized approach for organizations. We’ll dive into how this […]
How to Deploy Microsoft Intune Endpoint Privilege Management
Endpoint Privilege Management is a crucial aspect of IT security and compliance. It involves granting the minimum level of permissions and privileges necessary for devices and users to perform their tasks, while preventing unauthorized or malicious actions. Endpoint Privilege Management can help reduce the risk of data breaches, malware infections, ransomware attacks, and other cyber […]
Configure Location Services via Intune: Microsoft Teams
When working with Microsoft Teams and Public Switched Telephone Network (PSTN) calling, you are likely required to provide emergency location information for your users. If it’s an emergency and a user dials 911, the location information would be provided to the Public Safety Answering Point (PSAP). This information can be added manually by the user, […]
Teams Governance Settings: Balance Collaboration and Risk
Microsoft Teams is an incredibly powerful tool that enables efficient collaboration and information access across an organization. That said, a remarkable number of customers that we work with struggle to manage and secure it the way that they would like to. Much of the time, Teams was enabled during the pandemic to try to help […]
How to Choose the Right Microsoft Fabric License for Your Business
What is Microsoft Fabric? Microsoft Fabric is an end-to-end analytics and data platform designed for enterprises that require a unified solution or are looking for ways to simplify and potentially reduce their Azure spending. It encompasses data movement, processing, ingestion, transformation, real-time event routing, data analytics, and report building. It offers a comprehensive suite of […]
Securing What Really Matters
Securing What Really Matters The Problem is the Perp, Not the Victim When a hospital is victimized by ransomware, patients whose care is disrupted due to postponed or relocated appointments have a right to be angry. When the prices of gas or meat spike because of a cyber incident, consumers are right to demand action. […]
How Microsoft Copilot in Fabric Boosts Productivity
How I’m using Copilot in Fabric: Data Factory, Data Science – Spark Notebooks, Power BI Desktop – DAX Query View, and Visuals Creation. As a BI Engineer/Data Analyst, I often work with different tools and platforms to collect, process, analyze, and visualize data. However, sometimes I face challenges such as writing complex code, creating effective […]