Learn how the City of Houston, Texas is using digital transformation to actively prepare for an increase of three million people during the next twelve to fifteen years. You'll also learn how the city is using Microsoft technology to provide its 22,000 employees with mobile solutions they can use to communicate effectively in both the field and the office.
Team messenger apps are a great addition to the workplace, especially in today's environment where working from home and flexible work schedules are the norm. However, it's easy to forget that just like unbulleted emails and leaving used Tupperware in the company fridge, there are some behaviors that are frowned upon when using office communication tools. In this article, you'll review 5 basic rules that professionals must be mindful of when using a team messenger application in the office or remotely. Always keep them in mind to avoid awkward situations and the office blacklist. Learn more
These days, it seems like the security risks just keep on coming and coming. From all directions. And if you’re an IT or security professional, you’ve probably been wondering just what you can do to improve your odds of keeping all those threats out of your infrastructure while also maintaining compliance.
AI is certainly exciting. But is it worth the investment required? To find out, Forbes surveyed 305 executives across multiple countries and industries. The results for companies embracing AI compared to those lagging behind present a clear picture of the importance of AI in growing companies. At Coretek Services, we believe AI is the clear choice for companies ready to take the next step in their development. Check out the findings of this survey and learn how you can grow your company using AI. View: Human AI is here
My college courses did not revolve around learning programming languages. I studied routing, switching and infrastructure. It has been awhile since my college days and we must adapt. With the introduction of Infrastructure as Code, I have evolved and enjoy the process of build, test, repeat and eventually release. However, not all share my enthusiasm with deciphering lines of code. As such, we can make their lives a little easier by creating front ends to our Infrastructure as Code deployments. Let’s begin... Getting Started There is an assumption here that you have created and deployed ARM templates from PowerShell using a template and passing in a parameters file. Before we get to the Form and Flow, we need to know what parameters are needed within our template. For the case of simplicity, we will deploy a new Storage Account to an Azure Subsciption. Our ARM template looks like this. Note the three required parameters include “Deployment***” in the name. We will touch on that later.…
Don't let the cost of moving, planning for migration, support and cloud transformation overwhelm you! We're here to help. Here's a quick overview on the process of modernizing your workload with Azure. Contact us to learn more. View: Move and Modernize your Microsoft workloads with Azure
To receive updates from Coretek Services, and to learn more about how we can help with Microsoft 365, subscribe today! View: Don’t miss another post from Coretek Services
When the ransomware attack WannaCry hit, it shook the world and brought a number of established institutions to their knees. If you watched the news unfold thinking, ‘That’ll never happen to my business’, you probably aren’t alone. But you’re also probably wrong. The truth is, the odds aren’t in your favor. Malware attacks like ransomware target businesses of all sizes, at random, and they’re on the rise. What’s more, growing businesses like yours are both more likely to fall victim to these attacks and less likely to recover quickly. It may seem as if moving your IT to the cloud is the worst thing that you can do under these circumstances, but it’s actually one of the smartest moves that you can make. Not only is the cloud a flexible and cost-effective option, it also offers bank-grade security that your business simply cannot match on its own. Here’s why: You’re not a security expert (and you don’t want to be one) You can’t possibly keep up with the deluge…