Hi,
Recently, I wrote a short blog post on how to provision Azure Active Directory (AAD) Apps in a highly controlled way, so I will not repeat all I said there, but it a nutshell, the idea… Read More
There are times when I've found a PowerShell process running that is taking up a bunch of resources. Sometimes they've even been my own scripts running in the context of a SQL Server Agent J… Read More
This document explains how to use the "view raw logs" feature in LCS environment monitoring for your Cloud Dynamics 365 for Finance and Operations environments, this is the ability for you t… Read More
The 35th International Conference on Machine Learning (ICML) was held in Stockholm on July 10-15, 2018. Links to the associated papers and video recordings (when they are posted) will… Read More
People are worried about today’s market and they think we are heading towards a recession.
But their view is most likely obstructed by a short term bias and previous pain experience.
T… Read More
CGMagazineDerek Heemsbergen
The myriad announcements that seemed to stream nonstop out of E3 2019 featured flavours to suit any gamer’s palate. But with Final Fantasy VII Remake and a… Read More
Vitalik Buterin, the confounder of Etherium presents a profound analysis where he precisely addresses every problem that the cryptocurrency is facing today and may face in the time coming… Read More
The program which is claimed to have affected several devices globally has engaged in crypto mining through behind the screens of Youtube.
Stantinko’s operators compile source-level o… Read More
Spyware written for educational institutions to flex their muscles of control over students and their families when learning from their home computer is still, categorically, spyware.
Dep… Read More