In this article by the Cyber Wire, the importance of teaching cyber security and privacy to this generation of digital users both in the classroom and community is shared to ensure data security needs continue to be met.
As ransomware attacks increase in frequency and complexity, businesses need to be on the lookout. Often, data breaches are due to basic and avoidable cybersecurity gaps. Learn how to address existing cybersecurity concerns and respond quicker and more thoroughly against these evolving threats.
This BizTech article by Doug Bonderud addresses multiple areas of cloud encryption that you need to be cognizant of in your cloud strategy. Some take cloud security for granted based on assumptions, but making sure your data is secure from end to end is vital.
Read a blog post from January 2021 about Google’s alternative to third-party cookies, FLoC (Federated Learning of Cohorts), which will be open for advertiser testing in Q2 2021. Learn how FLoC will protect the privacy of users while providing advertisers with needed attribution data.
Curious about how Hackathons can benefit our society? Check out this blog post on Charitynavigator.org for a quick intro! Charity Navigator is one of the larger and more trusted non-profit assessment organizations in the U.S. PC World says, “Consider it [Charity Navigator] the Consumer Reports of the nonprofit world.”
A newbie’s guide to collaborative coding in hackathons – not only are they fun, but there are also many practical perks to participating in these programming projects.
In this article (a few ads), Jody Medich outlines edge computing means to the success of IoT (Internet of Things). Typically, “edge” computing still had some reliance on the cloud, but further advances in machine learning (ML) make it possible for IoT devices to process data in areas without internet connectivity. Couple this with AI, and even more gaps are filled.
This webinar outlines the latest from the Microsoft D365 support team. You’ll learn about Finance and Supply Chain data in the Common Data Service (CDS), and about new entities and how to work with them.
In this article by CIO Magazine, learn about new tools that provide opportunities to make data science a less daunting task.
Digital transformation continues to play a key role throughout the commercial real estate industry. In this piece, learn about the four tech trends expected to accelerate Commercial Real Estate (CRE) in 2021 and beyond.
These organizations need talented data scientists, data engineers, and machine learning/AI engineers to turn that potential into real opportunities. Data scientists, on the other hand, can learn a lot and hone their skills by working at big companies that have the infrastructure to build AI factories that turn data into real-world success.
Cybersecurity is set to change rapidly, with immense growth in spending across all sectors. The following twelve cybersecurity predictions for 2021 show the rising challenges and opportunities for the near future.
Let’s discuss the basic principles for data repair in Dynamics GP along with how to repair the most common issues! This webinar will cover which method is best in various circumstances, etc.
Good insights start with good data, and knowing what data to pull from your BC / NAV system, and how, makes all the difference. There are a lot of options available – XMLports, RapidStart Services, OData feeds, Excel – but what should you and your users employ for which purposes? We’ll start with real examples of each, then drill down into RapidStart to ensure you have a thorough understanding of this invaluable tool. We’ll address when and when not to use Configuration Packages, a step-by-step guide of how to create and modify Configuration Packages, and how to use the Configuration Worksheet.
Some companies have allowed a large number of workers to work remotely in the past, others have not until the Coronavirus arrived. Security and access to data, like the rest of your business processes in these challenging times, needs to now be looked at a bit differently. In this webinar, we will review the steps you and your company can put in place to ensure application and user security is not compromised with a remote work force. The good news is that more than likely your company probably has many techniques in place already, or in place and ready to easily implement. However, there are some controls that are often overlooked, and a since ‘a chain is only as strong as its weakest link,’ it is critical all security controls are addressed accordingly. We will highlight these commonly overlooked controls as well in this webinar.
Microsoft Power Query is the transformation engine in Power BI. This is the engine that you do all data preparation before loading data into the model. This is the keystone of your Power BI solution. In this session, you will learn what Power Query can do. You will learn how M, the language behind the scene of Power Query, can be more beneficial than the Power Query graphical interface.
Take a peek at the results and insight to the User Group Community Hack4Good virtual event that was held at Summit Europe: 27 June 2020!
We get the most value from Power Platform when we truly embrace it as a platform. In other words, while the component parts — Power BI, PowerApps, Flow, Common Data Service, and even Dynamics — are incredible tools in their own right, the more we knit them together, the more valuable they become.
But how do larger organizations truly adopt that platform at scale? How do we maturely infuse enterprise management, governance, and best practices into our adoption such that we empower our business users to buil
Presented by: @Kristine Dyess
As Power Pivot and Power BI consultants at PowerPivotPro, we see a lot of data models. We will review data model best practices and reasons why one approach may be better to adopt versus another approach. We will explore data models built in a traditional database environment like SQL and data models built using Get Data/Power Query. Join me for tips and tricks that will enable you to review your existing data models and ensure you’ve got good data models!#UnifiedOperations#CustomerEngagement#Intermediate
How do you know who has access to what? What are the best practices for managing your BC/NAV security? We’ll discuss how to create a good process to make sure employees can do what they need to and not what they aren’t supposed to. This session will cover the steps required to set up a new user in BC/NAV. We’ll also review the processes to assign permissions, manage user groups, set up warehouse security and how to create customized permission sets including a demonstration of the permissions recorder. Bring your questions, real life stories, and be prepared to share how you manage BC/NAV security in your company. This session will combine How-To presentations with interactive discussions to share best practices and fresh ideas.
Learning Objectives:
How to create a new user.
How to assign permissions to users.
How to create and manage permissions.