Blog

Purchase Request Workflow Automation | A SharePoint Case Study

Purchase Request Workflow Automation | A SharePoint Case Study

A common issue with enterprise is how to reliably control, track & audit purchasing. Small to medium enterprise generally do not use expensive enterprise resource planning (ERP) solutions that allow for approvals of orders, and larger organisations may not feel that the cost associated with licencing ERP for all users is worthwhile.

Preparing your team for changes in technology

Preparing your team for changes in technology

"Disruption" and "innovation" are trending phrases in many industries, encouraging people to radically change and challenge their market. Often this innovation is achieved by leveraging new technology. With technology changing so rapidly, it may be hard to just keep up let alone "innovate". One of the major roadblocks to a company adopting new technology is the impact on the staff… but with proper planning and communication, this change can be hugely successful.

Ignore these outdated disaster recovery myths

Ignore these outdated disaster recovery myths

With advancements in cloud computing, disaster recovery (DR) has become more efficient and affordable than ever. But many business owners still cling to DR myths that can safely be ignored. If you’re uncertain as to how DR has changed and are ready for an update, here are some myths that you ought to ignore.

What is Power BI, and why it will change your business

What is Power BI, and why it will change your business

Gone are the days where only big business could leverage their data to make better, more informed business decisions. Big businesses would spend copious amounts of money on expensive IT and Data Analysts and licencing for expensive software. With the advent of public cloud and as-a-Service platforms comes platforms with scale and accessibility which allows business of any size to view, manipulate and analyse their data in new ways to drive better business outcomes.

How to master Microsoft Excel

How to master Microsoft Excel

You may know how to use Microsoft Excel’s basic functions, but have you truly mastered the program? Excel has more advanced features, and here’s how you can master some of them.
Pie and Sunburst Charts
Everyone knows that bombarding stakeholders with endless numbers and decimal points is the wrong approach.

What are the risks of BYOD?

What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data.

Private Cloud for the Mid Market?

Private Cloud for the Mid Market?

The public hyperscale cloud platforms like Amazon Web Services and Azure are growing at astronomical rates and continually innovating. For many, it's hard to imagine that smaller cloud providers can compete or have relevance in what appears to be a race to the bottom.

Windows 7 and Server 2008 going ‘End of Support’. Are you Ready?

Windows 7 and Server 2008 going ‘End of Support’. Are you Ready?

Microsoft keeps a fixed schedule for supporting their software products after release and Windows 7, Server 2008 and SQL 2008 are going into the ‘end of support’ state in January 2020. This gives you a little over a year to remove any of these products from your environment.

New Spectre-style attack discovered

New Spectre-style attack discovered

Cyberattacks continue to evolve at a worrying pace. Just when you think one security threat has been fixed, a more dangerous version of that threat is discovered. One such threat is Spectre and it’s more recent variant, NetSpectre. Read on to learn more.

Be informed. Be vigilant. Don’t let it be you!

Be informed. Be vigilant. Don’t let it be you!

Ever increasing cyber security threats, as well as new laws supporting the privacy act which require businesses to notify clients of a data breach, means that businesses need to be hypervigilant in implementing best practice security measures.