by

Free Stock Photos Woman in IT, #STEM

Do you love to support the efforts to attract more women to #STEM ? Do you support a more diverse workplace, outside of your typical blue eyed, white man, in glasses and fancy suits?

Do yourself a favour and start using this great catalogue of stock photos representing women in technology, from diverse backgrounds and biotypes. I know some of these photos are full of Microsoft logos but a lot of them aren’t, so go ahead they are royalty FREE by WOCinTechChat! Bring new life to your presentations, support a more diverse culture in technology Smile

For the full album of free stock photos of women in IT, STEM click here…

image

image

image

image

image

by

Managing Thousands of Projects in Project Online

If you work with Microsoft Project Online you know how great this product is at streamlining project, resource and portfolio management activities. All this is for a single purpose, to allow you to deliver better projects, on time, on budget.

And now a few changes were released this month. Let have a look at 2 very special ones that I would like you to know:

Create and Manage Up to 30,000 Projects

Traditionally, Project Online  allowed for up 5,000 projects. Starting April/2017 this limit will have a significant jump. 6x to be more precise. Now project managers will be able to create and manage up to 30,000 projects in the cloud using Project Online. What was already a fantastic number, now has just increased to great lengths.

Why This is Good?

It offers a better scale, 30,000 projects allows for a much bigger room to move and improve and at the same time offer more flexibility to get more things done.

 

Pick and Choose the Site URL for your Project Site Configuration

Another great improvement on the way things are done in Project Online is on how information is organized in SharePoint sites. Now project managers can create more project sites and every project now can have a 1-1 relationship with their project site.

Why This is Good?

Again, traditionally this number was limited to 2,000. Often times more sites were needed but this limit was reached, then what people used to do was to split your landscape into several PWA sites, which then extended to another batch of 2,000 sites but the trade-off was that it impacted in the team productivity with a fragmented environment.

…One More Great News Before You Go…

In addition to these great improvements, there is one more fantastic improvement done in Project Online this month: Now users can set the destination URL of the project sites in the Enterprise Project Type template. This not only helps with the meta-hierarchical structure of the organization but also streamlines the process of project creation allocating sites based on similarities and functional equivalences.

How It Works?

For example, if you company has a site collection dedicated to your the Sales department, let’s say https://contoso.sharepoint.com/sites/sales, now you can configure your all your Sales projects EPT to provision sites directly into this site collection

image

You do this by going into each EPT, then in the Project Site section, select Allow users to choose:

image

 

What if You Can’t See these Things in Your Environment…

This is a Question that many times people ask me when they see these cool announcements and all the new features and yet they don’t seem to get them. Don’t worry, that’s the nature of Office 365 Releases. Releases are done by zones and via multiple channels. Very often these changes are done slowly and according to geographic zones, so if you don’t see them yet, don’t worry. They are coming!

by

The Test of the Machine

MicrosoftTeams-image

The test of the machine is the satisfaction it gives you. There isn't any other test.
 
If the machine produces tranquillity it's right. If it disturbs you it's wrong until either the machine or your mind is changed.​​​
 
One day, the machine will break and you will be in charge of fixing it.
 
- "Is it hard?" people will ask you
 
- "Not if you have the right attitudes!! " You will say. "Its having the right attitudes that's hard.”​​​

by

The Importance of Continuous Development and Training

 

2013-01-11T13-02-32_10[3]

‘’Sensei is the Japanese word generally associated with 'teacher'. In the Samurai culture, a sensei aim to be a samurai, and through continuous improvement a samurai is always a Sensei. Tokugawa Ieyasu, one of the greatest Samurai in history was not only an expert swordsmen but also a Zen practitioner. He believed that through Zen a state of no-mindedness was reached. Once in combat, he believed, an empty mind is free and has no need for doubt, fear, calculation. The actions are done automatically by the technique and pure focus. Keep that intro in mind, we will come back to it in a minute.

Looking at the project challenges as battles, it is important to have an empty mind in the Zen sense. We should let our pure focus and technique (developed and filtered by successful project experiences) should drive the outcomes.

Thus the importance of constant training, to sharpen the PMO skillset for battle, so then when we’re in the midst of a challenging project task we let all thinking go and let the purity of action to take over and move forward. A focused mind is the formidable tool against scope creep.

Now, back to the intro, Tokugawa Ieyasu practiced cutting bamboos hundreds of times a day, every day, to demonstrate to us, modern day warriors, that not only we are learning everyday but also that it requires a life-time of dedicated practice to achieve great swordsmanship. Become the Samurai warrior in your project you too as well.

What do you think? How has continuous training (of the lack of) shaped your professional role?

by

Why Cloud Projects Fail?

Businesses are moving to the cloud faster than ever with the premise that, in the cloud, project challenges can be tackled faster and efficiently. Yet, new research reports staggering cloud project failure rates. In this session we will discuss the 6 not-so-obvious reasons cloud projects fail and fool proof strategies to make sure project managers are prepared for them.

Thank you everyone who took the time to join the webinar and discuss this very interesting topic. Fee free to reach out to continue the conversation!

Presentation slides can be downloaded here: The 6-not-so-obvious Reasons Why Cloud Projects Fail

image

by

How Secure is my Data in the Cloud?

This is by far the most common question I get when talking to people about cloud migrations. And rightly so, information security (together with data privacy) is amongst the top concerns for businesses looking to go to the cloud computing.

image

To be quite frank:

  1. Generally the data stored in the cloud is very secure and
  2. Most likely it is safer then it currently is in your company.

 

A New Model Brings New Threats

Now let’s not make a mistake here, cloud computing does raises security issues that are not typically found when your data is stored on-premises in your own building. So much so that industry standards are still adapting to cloud specific challenges. For example, not many people realises that your company data might be stored in a common datacenter where data from other companies are stored as well. The concept of multi-tenancy scares a hell of a lot of people.

 

Who is Ultimately Responsible for Securing my Information?

This is an important question and before we answer that, let’s take a step back and discuss the matrix of responsibility here. To answer that question, first we need to assert the nature of the information stored because it is the data sensitivity who will dictate the level of infrastructure security necessary.

OK, so now that we have that in mind, the second part is about addressing the responsibility. The cloud provider is most likely to be responsible for the security and privacy controls which will be available to you.

Then now you have it:

  1. The cloud provider is responsible for the infrastructure lockdown, and
  2. the customer is the one who drives the data protection requirements.

It does not matter that you store your data in the cloud but still uses weak password controls or poorly governed processes around your business and data access, right? That’s why a proper cloud security assessment is so important because most likely, when a data breach happens it is because of you. Don’t be ashamed to assume if you have, weak security controls is something very pervasive in our industry as you can see here.

 

What Are my Responsibilities as a Cloud Customer?

You need to understand what security controls your business need, what data breach controls you want, what regulatory needs your industry requires etc. Cloud companies like Microsoft or Amazon won’t know that. It is your job to know that and bring it to the discussion table. Like I said before, these cloud companies are extremely capable and secure so normally it is up to the customer to up their game.

In short you as a customer have to:

  • Understand your data sensitivity
  • Ensure your chosen cloud provider offers the controls your business need

So there you have it. Generally the conversation here evolves to So nothing ever goes wrong in the cloud? Are you telling me that data breaches never happen?”…no, but this is a talk for another day.

See ya later!

by

Surface Pro 3 Battery Problems

Do you have a Surface Pro 3?

image

Are you experiencing very low, fast battery duration like the case mentioned below? (from winsupersite)

image

If yes, looks like you’re in for a bit of a pain. Microsoft has acknowledged some Surface Pro 3 models have a battery issue where the battery charge is continuously draining and soon it will be unusable. Think in terms of, 1 or 2 hours max of duration. A far cry from ideal. There is a thread now also in Reddit on the topic and on the apparent silence from Microsoft on this.

How Do I Know My Surface Pro has this Issue?

The issue is related to the manufacturer, called SIMPLO. All models that have a battery from this manufacturer have or will have this problem.

How Do I Know the Battery Manufacturer of my Surface Pro ?

There is a neat command-line utility in windows that gives you that information. In your command-prompt type the command powerfcg /batteryreport

image

This will generate an HTML report about your battery, including the manufacturer as you can see here:

image

If the manufacturer reads “SIMPLO”, your device has a problematic battery. In this case, the manufacturer is “LGC-LGC” which indicates this device has an OK battery.

What Should I do if My Surface Pro 3 has a Bad Battery ?

If you’re Surface has less than 1 year, you’re covered by warranty. After that, you should raise your voice and complain to  Microsoft here. There is already a growing list of people doing that and pressing Microsoft for a reasonable solution, after all it is a poor component.

by

I’ll be at the GovHack Australia 2016!

I am humbled, honoured and excited to be part of the GovHack Australia 2016. I will be there as a Team Leader helping with the idea and concepts of the solution. If you never heard about this event, let me explain a bit more about what it is.

image

What is GovHack?

GovHack is an event that build teams to create innovative solutions using Open Government Data. Teams are formed with project managers, entrepreneurs, developers, designers, researchers, open data enthusiasts etc. Even story tellers are in there Smile Have a look at the report from last year’s event here.

 

What is a Hack?

A hack is to take something and make it better.  Our teams will look at the available data exposed by open government data sources and make a cool, useful and engaging application.

 

How Does it Work?

On the Friday night launch the competition categories are announced, the teams are formed and the event runs for the next 46 hours. The teams will then look at the datasets and create things with them. The best applications are in for prizes in International, National and Local categories. At the end of the GovHack a proof-of-concept and a video are created explaining the solution. Teams work through the weekend and by Sunday 5pm a 3 minute video of your concept and any code/source materials must be made public.

 

When is GovHack Happening?

In 2016, GovHack will happen from 29th to 31st July. Yep, the Prime-Minister supports it Smile

 

Who is Behind the GovHack?

This is a non-profit event proudly run by volunteers who form the GovHack Coordination Team. Our ongoing thanks to everyone who gets involved and makes GovHack awesome! That is, the hackers, data providers, sponsors, mentors and a special thanks to the volunteers who run Local GovHack events.

 

 

Who is Sponsoring GovHack Australia 2016?

Several big IT companies and Fare behind this effort such as:

image

image

by

How to Write a Better Technical Document…and Use Windows Bash with it

Writing a good technical documentation is hard. Most people don’t appreciate this fact. It is hard because we are emotional beings by nature and technical writing is…well…emotionless Smile The less emotion, the better.

As a person from a Latin background, it is especially hard for me to avoid emotion in my writing. So after many years of hits and misses, I’ve compiled my own guide that helps me stay in check. It is not perfect but I believe it is a good start. Using it helped me to increase the number of hits while lowering the misses and at the end of the day that’s the goal: Not aiming for perfection, but continuous improvement Smile It can be quickly summarized in the following graphic:

image

Interesting thing is, you can use this even when writing in social media. I am also someone who is slowing moving away from the operational IT tasks and more into the business and stakeholder dialogues. Understanding is paramount for this phase of my career.

Oh yeah, before I forget: I don’t care about these recommendations here in my blog. I want my blog to be organic and the closest as possible to the way I speak in real life. Cool? Winking smile

Checklist for a Better Technical Writing

# Check for This… If Yes, Do This…
1 Words “I” or “We” Replace them. The document must be written in the 3rd person
2 Sentences are  written in different verbal tenses Make sure the whole document is written in past tense
3 A section called “abbreviation/nomenclature” section in your document Make sure it towards the start of the document
4 Use of jargon. (eg.:“the system will go live on xyz”) Avoid jargon with a clearer expression (“the system will be available for general use on xyz”)
5 Abbreviations in the “executive summary” or “abstract” sections avoid them. Expand to their real meaning.
6 Usage of word “that” All “that” has to be used when you know whom you are replacing
7 Usage of word “which” All “which ” has to be used when you are unsure who is being replaced
8 Word “So” Make sure “So” does not start sentences
9 Word “but” Replace them with “however”
10 Word “To” Make sure it is not at the start or end of a sentence
11 Words with “-ing” suffix Make sure they are not starting sentences
12 Graphics, equations, tables in the document Make sure they are addressed in a table of contents
13 Check for judmental constructions “It is very easy to perform the steps A, B, C” or “it is very difficul to determine the result of D, E, F” Consider removing it or replace with cold, hard construction. What’s easy for you might not be for others and you are telling the readers are incompentent if it does not work.
14 Statistics and numbers Make sure their sources are mentioned
15 Word “will” Replace them with “may”.
16 Word “Obvious”, “Of course” Remove them at once. If it is obvious, no need to state. You’re implying the reader is incompetent.
17 Sentences with exclamation marks Remove them at once.
18 Words “can’t” and “won’t” Replace them with “cannot” and “will not”
19 Expressions in parenthesis “()” Consider replacing them with a comma
20 Numbers in sentences Replace for their full wording: “it is 5 MB” should be “it is five megabytes”
       

But I am Still an Techie at Heart

and considering that I still love to be a hands-on kind of guy. What you will see now is a series of scripts that can be used in your documents to automate the repetitive task of finding words and expressions that convey a colder and more understandable way to send a message. If you are a techie at heart like me, you will enjoy them Smile That are done in Bash.

Bash is coming to Windows platform and now there is an expectation that people will quickly pick it up like they did with PowerShell. Once that happens and you also become a fan of Bash, use the following scripts for your work (from Matt):

Bash Script to Find Weasel Words

Weasel phrases or words are those that make you sound too good but does not really convey any meaningful information. Basically they make things unclear for the reader. For example: ”It is quite difficult to find untainted samples” when a better was is “It is difficult to find untainted samples”

#!/bin/bash
 
weasels="many|various|very|fairly|several|extremely\
|exceedingly|quite|remarkably|few|surprisingly\
|mostly|largely|huge|tiny|((are|is) a number)\
|excellent|interestingly|significantly\
|substantially|clearly|vast|relatively|completely"
 
wordfile=""
 
# Check for an alternate weasel file
if [ -f $HOME/etc/words/weasels ]; then
    wordfile="$HOME/etc/words/weasels"
fi
 
if [ -f $WORDSDIR/weasels ]; then
    wordfile="$WORDSDIR/weasels"
fi
 
if [ -f words/weasels ]; then
    wordfile="words/weasels"
fi
 
if [ ! "$wordfile" = "" ]; then
    weasels="xyzabc123";
    for w in `cat $wordfile`; do
        weasels="$weasels|$w"
    done
fi
 
 
if [ "$1" = "" ]; then
 echo "usage: `basename $0`  ..."
 exit
fi
 
egrep -i -n --color "\\b($weasels)\\b" $*
 
exit $?

 

Bash Script to Find Passive Voice Usage

Passive voice is a hard one. You can find it everywhere because it is related to the way we think and process sentences. When people advise to read and re-read the text before publishing it, it is because we want to pickup the passive voice. Passive voice usage is bad because often it hides explanatory information, for example: “Termination is guaranteed on any input” instead of “Termination is guaranteed on any input by a finite state-space”

#!/bin/bash
 
irregulars="awoken|\
been|born|beat|\
become|begun|bent|\
beset|bet|bid|\
bidden|bound|bitten|\
bled|blown|broken|\
bred|brought|broadcast|\
built|burnt|burst|\
bought|cast|caught|\
chosen|clung|come|\
cost|crept|cut|\
dealt|dug|dived|\
done|drawn|dreamt|\
driven|drunk|eaten|fallen|\
fed|felt|fought|found|\
fit|fled|flung|flown|\
forbidden|forgotten|\
foregone|forgiven|\
forsaken|frozen|\
gotten|given|gone|\
ground|grown|hung|\
heard|hidden|hit|\
held|hurt|kept|knelt|\
knit|known|laid|led|\
leapt|learnt|left|\
lent|let|lain|lighted|\
lost|made|meant|met|\
misspelt|mistaken|mown|\
overcome|overdone|overtaken|\
overthrown|paid|pled|proven|\
put|quit|read|rid|ridden|\
rung|risen|run|sawn|said|\
seen|sought|sold|sent|\
set|sewn|shaken|shaven|\
shorn|shed|shone|shod|\
shot|shown|shrunk|shut|\
sung|sunk|sat|slept|\
slain|slid|slung|slit|\
smitten|sown|spoken|sped|\
spent|spilt|spun|spit|\
split|spread|sprung|stood|\
stolen|stuck|stung|stunk|\
stridden|struck|strung|\
striven|sworn|swept|\
swollen|swum|swung|taken|\
taught|torn|told|thought|\
thrived|thrown|thrust|\
trodden|understood|upheld|\
upset|woken|worn|woven|\
wed|wept|wound|won|\
withheld|withstood|wrung|\
written"
 
if [ "$1" = "" ]; then
 echo "usage: `basename $0`  ..."
 exit
fi
 
egrep -n -i --color \
 "\\b(am|are|were|being|is|been|was|be)\
\\b[ ]*(\w+ed|($irregulars))\\b" $*
 
exit $?

Perl Script to Find Lexical Illusions

A lexical illusion is another form of visual illusion, normally happening when a like break contains repeated words but due to the way we read things, it is not easily spotted. Microsoft Word has actually a very good Lexical Illusion detection feature but still a lot of those can be left in place.

image

#!/usr/bin/env perl
 
# Finds duplicate adjacent words.
 
use strict ;
 
my $DupCount = 0 ;
 
if (!@ARGV) {
  print "usage: dups  ...\n" ;
  exit ;
}
 
while (1) {
  my $FileName = shift @ARGV ;
 
  # Exit code = number of duplicates found.  
  exit $DupCount if (!$FileName) ;
 
  open FILE, $FileName or die $!; 
   
  my $LastWord = "" ;
  my $LineNum = 0 ;
   
  while () {
    chomp ;
 
    $LineNum ++ ;
     
    my @words = split (/(\W+)/) ;
     
    foreach my $word (@words) {
      # Skip spaces:
      next if $word =~ /^\s*$/ ;
 
      # Skip punctuation:
      if ($word =~ /^\W+$/) {
        $LastWord = "" ;
        next ;
      }
       
      # Found a dup? 
      if (lc($word) eq lc($LastWord)) {
        print "$FileName:$LineNum $word\n" ;
        $DupCount ++ ;
      } # Thanks to Sean Cronin for tip on case.
 
      # Mark this as the last word:
      $LastWord = $word ;
    }
  }
   
  close FILE ;
}

For more tips, you can have a look at http://matt.might.net/articles/shell-scripts-for-passive-voice-weasel-words-duplicates/ 

So there you go. These are my tips. Share yours in the comments and I will include them here and credit it to you.

by

IoT, Office 365 and the Prime Position of STEM Kids in Australia

 

5 million new IoT (Internet of Things) devices will come online every day in 2016. How can companies join the party for a piece of this 50 billion dollars’ cake?

Come to Microsoft Innovation Centre in Brisbane (level 28, 400 George st, Brisbane) and join me to discuss:

  • The state of connected devices in Australia,
  • How can we use IoT and Office 365, and
  • Why Australians are in a prime position to lead the world in this area and the role of the STEM programs for kids is an important strategic move in the innovation agenda.

image

image

image

 

Where Can I Download the Presentation Slides?

You can download the slides for this presentation here.

by

I am Speaking at the Collab365 2016 Event

Once again I got confirmed as a speaker for the Collab365 Conference. This is one of the coolest conferences around from the people organizing it to the folks participating online. A single session can easily reach thousands of people, so you can imagine my excitement. And as a plus, it is always great being at Microsoft HQ in Redmond. Also a good time to reconnect with folks from the Office 365 team in their offices. (*cough*also visit the Microsoft store*cough*)

400x133_speakerbadge_summit.jpg (400×133)

My session is as usual around Office 365 Compliance and Data Protection and it is called: "Office 365 eDiscovery: DLP for your Business and Your Data".

Join the Collab365 Summit and watch the sessions, there is an incredible amount of brilliant minds and souls behind this event, doing this for the community at large.

Where Can You Get More Information and Watch the Sessions?

Go to http://collab365.events/collab365-summit-2016/ . You can also follow the twitter @Colla365 and the hashtag #Collab365

Also, who doesn’t love an opportunity to visit Microsoft Headquarters in Redmond Smile

image

image

by

The Case for Privileged Access Control


Another day, another big data leak. Do you have a minute? Let's talk a bit about basic security and how even the “big guys” can have it wrong.

Since you're a young IT professional you hear the mantra that login credentials (username, password etc) should never be shared nor written in plain-text (Hello, TickeTek!!). So, why do we keep seeing these things in workplaces? Passwords for network shared on stick notes, handwritten in walls, displayed in big monitors for the sake of convenience…

image

image

The answer is: Unfortunately, this is quite a common practice and worst coming from bad decision making.

The Weakness Stand

According to a report from Centrify: State of Corporate Perimeter about 50% of the USA and 1/3 of UK leaders believe it is easy for someone with old passwords to login into company systems.

Even considering that most of the companies have an off-boarding process for contractors, it can take up to a week to completely sanitize access rights and passwords to all the sensitive data once handled by those individuals. One week is enough time for anyone with ill intentions to go back and hack into systems. And that isn't a rare incident.

image

Privileged Accounts: Free as in Free Beer

It gets worse. The report revealed that privileged accounts for systems, and network devices are being shared without any policies to protect them. 40% of U.K. IT leaders working for big companies (over 500 employees) said more than 10% of their staff have privileged access to data in some form.

This number jumps to 50% for small and mid-sized companies (less than 500 employees). Too many people with too much, unnecessary, power in their hands. We are talking about confidential and highly sensitive information kind of access. Rightly so, 62% of U.S. IT leaders believe their companies have too many privileged users. Look at this: Security Auditors guess Australian government database passwords on first attempt! That’s shocking!

image

Cultural Differences?

Now one thing to consider. This report was done with 200 companies in the USA and 200 in the UK. One might think that a more liberal economy would pose a bigger risk to IT security systems. Truth is, it does not. The overall pattern is consistent across all groups in both countries. For example, around 50% percent of all companies involved in the study confirmed that their companies had a data breach. And the bad guys are there for the taking like sharks.

A Backup Always Work, The Restore Is What Fails

Almost all companies have some sort of identity keys in place but nearly half of them have monitoring, auditing or privileged identity management in place. Quite surprising, 1/3 of these companies don't have trained employees to respond to a data breach or how the accounts are used. They are simply given to folks and trusted they will do good with them. No wonder so many breaches happens.

The Disaster is a Decision

Often times we hear that a disaster is a series of small events that lead to a big event. It is very surprising that experienced senior managers and leaders on this day and age are still following bad decision making frameworks, yet admitting they do need to do a better job with their data. The quote "When a data leak happens, it is probably your fault" is becoming more alive than ever.

by

How to Setup a Private Network Connection to your Office 365 ?

Here’s a question I get quite often during my compliance and data protection presentations. I thought about writing this post so I can easily redirect folks here. I am all about reusing explanations Smile

Is it Possible to Have a Secure Tunnel Connection to SharePoint Online? My Own Private Connection?

Yes, it is. Using Express Route. Not only to SharePoint Online, but to the whole Office 365. I would say, 80% of the time when folks are looking for this answer is because they are talking about a hybrid environment where they want to integrate their SharePoint on-premise with SharePoint Online and normally involved handling sensitive data.

image

What is Express Route and What it Does?

ExpressRoute initially was an Azure-only solution that got expanded to Office 365. It’s goal is to establish a private and managed connection to Office 365. What it does is to provide a dedicated network connectivity through a private connection from their (users) network to Microsoft Azure or Office 365.

How Does it Look Like from a Helicopter View?

Here’s a simple diagram of how ExpressRoute can be used with Office 365.

image

Will Having my Own Private Network to Office 365 Impact Performance?

Yes and No. Network performance will be as predictable as your own on-premises environments, it is up to you then to take care of your own network performance, of course. In some ways this is like having an Office 365 environment in your own datacenter.  One added benefit you will certainly have is that using ExpressRoute most Office 365 network traffic can be configured to avoid the public Internet, providing additional data privacy. And here is your answer for privacy and sensitivity concerns.

As usual, your data is still your data.

Who Are the Best Candidates to Use Express Route with Office 365?

Organizations that require a higher class, premium managed connectivity to the cloud. Governments also can use it. Actually Microsoft did this as a development of the famous Safe Harbour case issue.

What if my Company has Multiple Locations Across the Globe?

No worries. ExpressRoute offers something called “circuits” that applies the traffic to different geographic locations with redundancy and geo-resiliency.

image

Explain a Bit More What these Circuits are…

OK, so these ExpressRoute Circuit are geographically distributed connections that delivers by default 2 active physical connections for high availability. The networking elements are still backed by Microsoft’s connection uptime SLA (99.9 %). On a cool note, as of today, Microsoft is the only public cloud provider to offer this level of guaranteed availability for the connection. An additional benefit is that if you have Azure applications, you can this same single ExpressRoute connection.

image

 

How Do I Buy ExpressRoute?

There is no additional licensing costs to use ExpressRoute, however not everyone can guarantee these circuits for you, so you will have to work with the Microsoft Cloud Approved Providers. These guys can guarantee the premium network connectivity required by Microsoft and they have their own price list. Here’s a list of the MS Cloud Approved Providers for your query.

I Want It!! What Should I Do?

Network capacity plan. I mean, you are deciding to setup your own private connection to the public cloud, you’ve got to do your homework Smile Here’s a good link with some guidelines for your network infrastructure plan then contact one of the Approved Providers.

Good Luck. If you’ve done an ExpressRoute for Office 365 project, share your thoughts with the wider community. Love to hear from you.

See ya!

by

From #AshleyMadison to #PanamaPapers : Office 365 is Bringing Sexy Back to Cloud Compliance and #eDiscovery

When a data leak happens and people are affected judicially, specially suing and being sued, this starts a very long, tiring and expensive process. eDiscovery is one of the most complex parts of the whole game.

In this session we will talk about what’s eDiscovery, how big companies do it, how expensive it is and how can Office 365 help you. So if you are around Brisbane, Australia on April 14th come and join us. Bring your laptops, tablets, iPads, mobile and we will do some demos and play some roles. It will be fun Smile

Where Can I Get the Presentation Slides?

 You can get the slides here.

image

image