Contact Us Today!

What is Microsoft’s RemoteApp?

You may already be familiar with Remote Desktop Services, or Terminal Services through Microsoft. Remote Desktop Services are traditionally server based environments to provide a unified desktop experience for a collection of users. Users log into a remote desktop and are provided access to applications and desktop settings by an IT administrator.

Intelligent Business Applications

You are most likely familiar with descriptive terms for software like CRM and ERP. These terms have been used for years to describe software that businesses run to manage customer information, accounts, inventory, etc. Its time to learn a new term; Intelligent Business Applications. Microsoft is leading this charge with the release of their Dynamics 365 platform which combines traditional CRM and ERP functionality as well as some new tools to help bind functionality together in end-to-end workflows.

Dynamics 365 for Phones and Tablets

Dynamics 365 is here!  We’ve been busy learning about the new and upcoming features and are excited to share them with you.  Some features I’d like to point out are the apps for the Dynamics 365 for phones and tablets. Both Dynamics 365 for phones and Dynamics 365 for tablets app will be available from the Windows Store, Apple Store and Google Play.  Microsoft is also working on creating specific apps tailored to Dynamics 365 for Operations and Dynamics 365 for Sales which are expected to include features such as scanning of bar codes and license plates.

Microsoft Launches PowerApps and Flow

Microsoft has announced the general availability of Microsoft PowerApps and Microsoft Flow. Both services are available to users around the world and in 42 languages. PowerApps and Flow will be included with Dynamics 365.

These apps are designed to allow Power Users (i.e. non-developers) to do things that in the past would have required programming.

Cyber Security – Keeping Data Secure in a Connected World

Did you know that 75% of network attacks and intrusions come from exploiting weak or stolen passwords? How about that the average  amount of time an attacker stays in a network before being detected is over 140 days? Once inside the network, it’s next to impossible to tell what the attacker has done and we’ve all seen the repercussions from such attacks in the news.