Data Security Basics: Authentication, Authorization, Encryption and Auditing
Learn more about enterprise security, encompassing authentication, encrypted communication, authorization and data auditing. Each of these areas has a breadth of technologies and challenges to confront.
Susan Lamatrice March 22, 2018
Remote Into Other Computers - OpenSSH on Windows
If you manage both Windows and Linux in your environment (which almost everyone does) why would you want to use more than one method to remotely manage computers?
Hybrid Data Pipeline Delivers OData-Based REST API for Any Database
In the latest release of Hybrid Data Pipeline, you can now Get OData-based REST API for any database with a JDBC driver. Join our beta to see how it works today.
Susan Lamatrice March 21, 2018
360° Customer Profiles with Sitefinity and Sitefinity Insight
Planning your customer profiling is a very important step in your digital marketing as it is the foundation for successful optimizations in the next phases. Let’s have a look how 360-degree contact profiling can be implemented with the Sitefinity platform and go through different sources of information.
Leveraging Configuration Data for both DSC and Pester Tests
When writing code, it's important to make it modular by decoupling the code as much as possible. Check out how to accomplish this with Pester tests.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation