Expert Insights

blog

Azure


Top 10 Mistakes Companies Make Getting Started with Azure: #7— Ignoring Identity, RBAC and Conditional Access

Now that your Azure Environment is effectively and properly structured, as noted in our previous post, we come across a slippery slope that must be avoided. Now that it has been created, it needs to be secured. It has become second nature to use a seatbelt, lock doors and assure the area is clear when entering or exiting a vehicle, and we must direct that line of thinking when it comes to employing technology.
 

Nathan Lasnoski by Nathan Lasnoski

Top 10 Mistakes Companies Make Getting Started with Azure: #9— Not retraining or restructuring existing employees

Last time, we covered the need for a company adoption strategy in your Azure implementation journey. Here’s another roadblock you have to get past: your employees’ familiarity with your prior ways of doing things. Implementing changes without taking into consideration the need to retrain and restructure your current work dynamics can easily lead to trouble—or, at the very least, inefficiencies.

Nathan Lasnoski by Nathan Lasnoski

Leveraging Facial Recognition in your systems

Security is an important aspect of our lives and we use various means of security every day. In order for us to secure items in our lives, we have to have a trust factor. This applies to our bank accounts, our passwords, and even vehicles that we utilize every day. Sometimes, security can be complex -- in the case of bank account being accessed over the internet, or a rolling security codes in your car's remote start module, or RFID and barcodes in your driver license or passport.
 

Lwin Maung by Lwin Maung

The Internet of Things is just getting started

The Internet of Things (IoT) is just getting started. Honestly though, if you think about it, IoT has always been here. In the beginning, we had the internet. Traditionally, the internet’s purpose was to allow devices to serve content from the internet. Now with IoT, we simply alter the paradigm and consider that the device is sending sensor data to the internet. In other words, we have always had the ability to do IoT, but what has changed is the notion around how devices and device data can be used.

Eric Franz by Eric Franz