Seven Reasons to buy your Microsoft Cloud via a CSP

Seven Reasons to procure your Microsoft Cloud via a Cloud Solution Provider (CSP) Silversands joined the CSP programme around a year ago as a CSP indirect Reseller and has aligned itself with direct CSP partner Vuzion. Over the year we have seen the benefits this brings to our customers and it has reinforced why we …

Read more

Data retention policies come to Microsoft Teams

Data retention policies in Microsoft Office 365 are now available for Teams locations Managing data is important in scenarios such as complying with regulations or ensuring users have relevant content available to them.  To support this, data retention policies have been available in Office 365 for some time. This allows organisations to perform actions such …

Read more

Azure Log Analytics & Monitor for monitoring custom apps

In this article I take a quick look at setting up some monitoring for an in-house developed application. Service Manager Scribe is a custom email ingestion service for our Microsoft Service Manager based helpdesk. There are several ways in which you could potentially instrument your application. However, one of the simplest options is simply to …

Read more

Windows Analytics – device health. Become the IT hero

What is Windows Analytics? Windows Analytics is the collective name for a growing number of Azure solutions leveraging Windows Telemetry data to produce insights into your IT estate. For years,Microsoft has been collecting telemetry data to allow them to improve their products, and, more controversially, to monitor the way people use them. Organisations have always …

Read more

Shadow IT and the inherent risks explained

What is Shadow IT? Shadow IT, a wonderfully ominous term, but what does it really mean? Essentially, Shadow IT is considered to be any IT system, service, mechanism, or methodology that has been adopted within your organisation outside of the view, control, oversight, or sanction of the organisation and IT Administration. Classic examples are file …

Read more

Azure Translator Text API saves £60K

Azure does more than you might think Microsoft Azure is a highly capable platform offering a wide range of services and capabilities. These enable business solutions relating to virtual machines, data, analytics, media, monitoring, Internet of Things and many more. One of these key capabilities is Cognitive Services. This set of functions provides artificial intelligence …

Read more

OneDrive and IRM-protected SharePoint Online libraries

Synchronising IRM-protected SharePoint Online libraries With the move to cloud services, information protection and the lifecycle of sensitive information is an important topic to consider. As organisations adopt Office 365, sensitive information may be stored in services such as SharePoint Online. Part of the lifecycle of sensitive information in Office 365 is protecting it based …

Read more

Serverless Computing with Microsoft Azure

The Era of Serverless Computing Since the release of Microsoft Azure eight years ago we have all seen staggering growth within its ecosystem.  This expansion is continuing daily and keeping pace with this rate of change is an exciting challenge for us all. I regularly speak to customers that are looking to make greater use …

Read more

Azure supporting high performance computing and more

High performance computing and other current needs Your organisation, particularly if you are conducting research or testing, may need to implement specific computing solutions. For example, High Performance Computing (HPC), extreme graphical workstations, artificial intelligence, machine learning and extremely large storage and similar types of advanced configurations. In many cases you may only require a …

Read more

Meltdown and Spectre. Quick work by Azure

Meltdown and Spectre. What are they? A new computer security vulnerability has been disclosed in the past few days, discovered by Google Project Zero, named Meltdown and Spectre. Essentially, the two issues allow unauthorised access to data, potentially even across virtual machines (VMs). This means, regardless of access levels, one VM could read sensitive information …

Read more