Azure AD and applications: From creation to improved security

In this two-part series, we are going over all the steps needed to publish and secure an Azure AD application.…

6 days ago

What an ideal application security toolchain looks like

There is no right answer when it comes to building an application security toolchain. But not having one is the…

6 days ago

Azure Functions app and custom PowerShell modules

Azure Functions is a service that allows developers to write code without worrying about application infrastructure. There are two major…

1 week ago

IT spending to decrease 8 percent in 2020: Gartner

A new forecast says overall IT spending will decrease in 2020 as companies reduce spending for datacenters amid the shift…

1 week ago

Preventing remote desktop users from shutting down office computers

When a remote worker accesses their office computer via remote desktop and accidentally or intentionally shuts it down, problems can…

1 week ago

PowerShell print: Output at your fingertips, to screen or file

Printing values or text is a common function we do in programming. In PowerShell, there are multiple options to print…

1 week ago

Azure AD and applications: From creation to improved security

In this two-part series, we are going over all the steps needed to publish and secure an Azure AD application.…

1 week ago

What training for a space mission taught me about working in isolation

Working from home can feel like working in isolation. Our author, because he is training for a space mission, knows…

2 weeks ago

IBM and Red Hat launch new 5G edge computing services

5G will catapult edge computing to new heights, and new services from IBM and Red Hat are poised to take…

2 weeks ago

Linux permissions: Understanding and managing the structure

Whether you are preparing for a Linux certification exam or are already a Linux admin, managing permissions is something you…

2 weeks ago