In this blog post, I will share with you how we made sure that every piece of new code respects our set of good practices. To do so, I will start by defining what are conventions. After that, I will explain why we use them. Then, I will talk about why they are hard to implement and finally I will show you how we enforce our conventions here at Sherweb.
Security is always a concern because SharePoint Online needs to keep confidential files safe, so it raises many security and compliance-based questions. In this article we will be sharing some rich security and compliance features with you; some are already in place and others can be configured by you with only a few clicks. We hope this will boost your confidence in this product.
Office 365 provides eDiscovery capabilities within the Security and Compliance Center. To utilize these components there are 5 core steps that you need to follow.
Database-as-a-Service (DBaaS) is not limited to test, development, training or nonproduction environments. It can also be used for production- and mission-critical databases.When you’re looking for a cloud database provider, you’re not only willing to take off the heavy load of administration. You also want to keep or improve the performance and security of your databases. In addition, you want to benefit from the flexibility and scalability of cloud services to handle cost and capacity issues, and high availability. Choosing the right provider is key to a successful experience in the cloud. Before signing the first deal you get, there are basic questions you should ask a cloud database provider.
Mozilla just released version 36 of its popular web browser Firefox. This new release introduces an important change. Some weak security certificates are no longer trusted by the browser. Why is this of interest? Well it’ll change web browsing for over 20% of web users. That’s one in five!