Alliance IT Blog
Azure Virtual Desktop Rolled Out by Microsoft
Perhaps one of the best known virtual platforms on the market is Windows Virtual Desktop (WVD), soon to be Azure Virtual Desktop.
Penetration Tests for Regulation Compliance
Penetration tests are performed with a specific goal in mind, such as simulating a hacker trying to gain access to a sensitive system.
SharePoint Updates for Microsoft Teams
Microsoft SharePoint is used by companies to create websites, and is a secure place to store, share, organize and access information.
Most Important Managed Services Offerings
Important managed services offerings for 2021 include strategizing technology purchases, fighting cyber crime and updating licenses.
How to Fight Evolving Ransomware Attacks
As the ransomware "industry" becomes more sophisticated, companies are finding it difficult to keep up with the evolving ransomware attacks.
Apple Employees Seek Work Flexibility
As businesses open up again, we are learning just how dramatic an impact the lockdowns had on culture and the desire for work flexibility.
New Generation of Windows Set for Unveiling
Tech titan Microsoft is setting the stage to introduce the next generation of its Windows platform, due to release on June 24.
The Next Decade of AI
AI was gaining in significance and usefulness before the pandemic, but the events of 2020 have thrust this technology into the spotlight.
Recent Ransomware Attacks Explained
Ransomware attacks have gained the attention of Americans, as both a the fuel pipeline and meat-processing company were extorted.
Microsoft Teams Continues to Add New Features
Here are the latest updates, new features and capabilities for those who already have Microsoft 365 and Microsoft Teams subscriptions.
Google Docs Dilemmas
Google Docs is an easy platform to navigate, but still comes with layers of nuance which can cause even a seasoned writer frustration.
Science Discovers Global Hardware Flaw
Since 2018, computer scientists have been investigating a possibly catastrophic hardware flaw that exposed computers wordlwide susceptible to attack.