Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Max Donaldson

Azure Pricing – How to Get Your Best Deal

azure-pricing

 Azure pricing can be confusing...

Paying for what you use is typically a great concept, but many companies are struggling to understand how to get their best deal when running Azure workloads. In this article, we’ll discuss the three major ways to get a programmatic discount on Azure. These include Windows Server Hybrid Use Benefit, SQL Server Hybrid Use Benefit and Reserved Instances.

About a year ago, Microsoft announced a price cut on Azure which made the licensing pricing between the various licensing vehicles all similar. Then they also gave guidance to their sales teams not to discount Azure until the customer commitment was in the millions. So, it is critical to take advantage of these programmatic discounts to get the best deal possible.

Continue reading
  2927 Hits
  0 Comments
Mike Wilson

Don’t Be Left Unprepared for Microsoft Windows Server & SQL Server End of Life Deadlines

blog-header

The clock is running out for Microsoft Windows Server 2008/R2 and SQL Server 2008/R2.

The good news is that you have options that you previously never had. Microsoft has announced they are discontinuing free security updates on clients using Windows Server 2008 and 2008 R2 as well as SQL Server 2008 and 2008 R2.

  • Windows Server 2008/R2 – mainstream support is expired, and extended support will end January 2020
  • SQL Server 2008/R2 – mainstream support is expired, and extended support will end July 2019
  • Windows 7 – mainstream support is expired, and extended support will end Jan. 14, 2020
  • Office 2010 – mainstream support is expired, and extended support will end Oct. 13, 2020
Continue reading
  3905 Hits
  0 Comments
Matt Scherocman

Need Better Email Signatures? Exclaimer is the Answer

Microsoft Exclaimer

Exclaimer Cloud - Email Signatures for Office 365

Exclaimer is the premier cloud service for centrally managing and controlling Microsoft Office 365 email signatures. Exclaimer provides users with a standardized high-quality signature when sent from any device. Users can work with either a pre-made template or the drag and drop signature editor to create personalized signatures. Best part: no HTML skills required!

Continue reading
  1386 Hits
  0 Comments
Ken Kruthaup

Embedding Power BI into SharePoint

embedding-power-bi-sharepoint

Power BI can now be shared with anyone in your network within seconds!

Native data reporting within SharePoint is a powerful tool to have, but embedding this reporting into Power BI is even more powerful.

The option for sharing Power BI data has been somewhat limited until now. Microsoft recently launched an update allowing users to embed interactive Power BI reports into SharePoint pages. This new feature allows convenient access to sharing data-rich graphs as well as other presentations. The embedded reports are also more secure because not all users have permission to access the report; the permissions to review the report are set within the Power BI service. This means they can be shared for internal or external review as needed.

Continue reading
  2449 Hits
  0 Comments
Eric Brophy

Multi-Factor Authentication and Why It’s Important

Multi-Factor Authentication

Multi-Factor Authentication in Office 365 and the Enterprise Mobility + Security Suite

Microsoft reported in their breach investigation report that over 75% of network intrusions originated from exploited weak or stolen credentials. So, how can companies protect against threats from hackers who are trying to access their data? 

Microsoft’s Multi-Factor Authentication (MFA) helps stop hackers through a process of authentication. It requires the use of more than one verification method and adds a second layer of security to user sign-ins and identity transactions. With MFA in place,hackers do not have access to the second-factordevice to login. The additional verification methods can include SMS text verification, mobile app approval or a phone call (with or without a pin). The end user experience can be improved by not promptinga second factor when they are on a trusted network or using a domain joined PC.

Continue reading
  2438 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.