Windows 10 released, to much fanfare, last year on July 29th. Now we’re just about six weeks from the free upgrade deadline and, if you were planning to upgrade, it’s time to pull the trigger.
Releasing an update to Dynamics CRM is an easy way to get me excited. There’s always something I can see myself using and a few things I think our CRM clients will appreciate.
We’ve integrated Microsoft Dynamics CRM with Outlook, quoting software, Microsoft Dynamics GP and plenty of other applications. Despite all that, there’s one integration that many companies don’t take advantage of that can add just as much value, if not more.
Exchange 2016 was released a few weeks ago. It’s always a big deal when a new version of everyone’s favorite email server debuts but, if you though Microsoft’s much touted new direction (Surface Book! HoloLens!) meant big changes to Exchange, prepare to be disappointed.
I talk a lot about big changes when talking about Dynamics GP. Whether it’s the impact it can have on a business, or the changes coming in a new version of GP. Well, today I’m going to switch it up and talk about a small change that can save you – the GP end user – a little bit of time and a few clicks.
In the weeks since Windows 10 I’ve been giving a lot of presentations on what it is and what’s different about it. I’ve upgraded personally and I think it brings back what we loved about Windows 7 without completely eliminating the best ideas from Windows 8. Of course, not everybody is the Windows 10 booster that I am and there are some compelling reasons to hold off… for a while.
Keeping with the brisk update tempo they’ve set over the last year, Microsoft just announced that Dynamics CRM 2016 is on deck for later this calendar year. They’ve outlined some of the biggest changes on-deck and members of CRM Software Blog have been given access to some of the early application screenshots.
Microsoft recently announced that there’s a critical vulnerability affecting all versions of Windows. The issue is related to how Windows handles certain special fonts. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Many variants of Crypto have appeared over the last few years, each with slight changes and intricate improvements to counter and avoid the latest Anti-Virus and Anti-Spam definitions. From locking one user out of their workstation, to encrypting large sections of a network, ultimately they have one common goal: extortion.