Our Latest News
Citrix Releases Security Updates for Workspace Apps, Virtual Apps and Desktops
Citrix has released security updates to address high-severity vulnerabilities (CVE-2023-24486, CVE-2023-24484, CVE-2023-24485, and CVE-2023-24483) in Citrix Workspace Apps, Virtual Apps and Desktops. A local user could exploit these vulnerabilities to take control of...
Introducing the New Post-delivery Activities Report in Microsoft Defender for Office 365
Introducing the New Post-delivery Activities Report in Microsoft Defender for Office 365 Attackers are always evolving to adapt to the newest protections enacted by security teams and the products they rely on. Today, attackers frequently attempt to bypass...
Apple Releases Security Updates for Multiple Products
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to take control of an affected device.CISA encourages users and administrators to review the Apple security updates page for the...
Parallel cost accounting now available with Global Inventory Accounting Add-in for Supply Chain Management
With the new Global Inventory Accounting Add-in, Microsoft Dynamics 365 Supply Chain Management now supports parallel cost accounting. The ability to perform inventory accounting using multiple costing ledgers enables organizations that do business internationally to...
Lesson Learned #329: DATABASEPROPERTYEX( DB_NAME() , ‘Updateability’ ) and db_datareader role
Today, we got a question where our customer asked that if using ApplicationIntent=ReadWrite with an user with db_datareader permision, the results of DATABASEPROPERTYEX(DB_NAME(), 'Updateability') will be affected or not. In this situation, let's try to create a...
Yammer is evolving to Microsoft Viva Engage with new experiences rolling out today
Today, we're announcing all of Yammer will become Microsoft Viva Engage. We'll continue to enhance Viva Engage with new capabilities that encourage leadership engagement, authentic expression, and knowledge discovery, including new experiences rolling out today. The...
Will the FTC call or write you? Will they demand money?
Have I told you lately that I love you — and how to avoid scams?
Create Azure Container Registry
In this article we will learn how to setup Azure container registry. As you know we use container registry stores and manages private container images and other artifacts, like the way Docker Hub stores public Docker container images. Let's create a container in...
Azure DevOps Customize Email Notifications using Power Automate
Azure DevOps email notifications are great, sometimes project team members doesn’t want to get notified for each and every state change in a User Story, Tasks and Bug and only a specific few want to get to notified whenever a bug is created or closed (skipping the...
Inventory allocation ensures limited stock goes where it’s most needed
Companies that operate in more than one channel or region must fulfill orders over networks of ever-increasing complexity. When supply shortages happenand they willhow do you make the best use of limited stock across your most important channels, customer groups,...
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal...


Recent Comments