Today, I came across an error while working with Microsoft Teams, something usual, just Teams not being able to connect....
In this article, I will describe one of the component of my previous design. I wanted to hear what our...
The problem I was faced with today, was to embed twitter feed into a new SharePoint landing page. The widget...
Public beta ready summer 2018 Built on the foundation of shp 2016 More cloud oriented Quicker site creation. New site...
Whether you are a developer, administrator or an IT Pro, these are the most useful software/tools you should have. Please...
In some large (columns) and long lists views, it would be ideal to have sticky headers which are always displayed...
In this article, I will describe a simple use of SP.JS file to retrieve data from a SharePoint list and...
The development and usage of software has seen a wide spread the last decade, and software systems are now present...
A short, fun, animated approach, showing you what SharePoint is all about
The evolution of computing we've seen during the last decent has permitted a lot of improvements that make the use...
Internet has opened new market ways and gave a new vision and new methods of selling products. Ecommerce was a...
The copyright and protection of innovation is not only restricted to audio, video, books and software, it can sometimes concern...
Previously suggested digital content copyright protection systems (e.g., Pay-TV, DVD) are generally all broken. Do you think it is possible...
Attacks can be from internal or external sources and good security officers should plan and define measure to avoid or...
The appearance of Internet and the wide connection and interconnection of networks helped attackers thinking of wider and massive attacks,...
OS hardening To protect against misconfiguration-based attacks, install the very good hardening utility Bastille (http://sourceforge.net). Bastille essentially closes all the...
Introduction to physical tamper-resistant devices Developing a secure computer system is not only a matter of design and prediction of...
Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography. Initially developed by Shamir...
Security can be considered at different levels, we can think about how can we make our connexions secure and avoid...
Trying to build an efficient and secure system is a hard task and no exact method or technique has been...