Home page » Initial: e » First 2 letters: en » Keyword: endpoint

121 Dutch websites relevant to the keyword: endpoint

DomainExcerpts relevant to keyword: endpointRelated expressionsOther expressions from the websiteeRelevance
jeffreyappel.nlAzure AD Azure AD Identity Protection Defender for Cloud Defender for Cloud Apps Defender for Endpoint Defender for Identity Intune MDE Series Microsoft Sentineldefender endpoint, endpoint deployment, endpoint linux, endpoint ios, endpoint mdejanuary, attack, xdr, min, disruption27
talkingsecurity.nlAn episode of Talking Security about Microsoft Defender for Endpoint - Evaluation Labs. I have introduced this new series of recordings for you to gain more insight into the Microsoft Defender for Endpoint product. This is the fourth part…defender endpoint, endpoint evaluation, endpoint product, endpoint series, endpoint tvmepisode, talk, min, azure, devsecops16
petervanderwoude.nlAndroid Android Enterprise Azure AD Conditional Access ConfigMgr ConfigMgr 2007 ConfigMgr 2012 iOS ipadOS MDM Microsoft Endpoint Manager Microsoft Intune OMA-DM OMA-URI Powershell SCCM Task Sequence Windows 10 Windows 11 Windows AutoPilotmodern endpoint, endpoint management, close endpoint, endpoint analytic, week endpointintune, device, configuration, pki, der11
timgoes.nlUE4 already has certain handy tools to create lines which I took advantage of, I made use of the spline library to let designers easily create the route. The spline I made was fully configurable, it would automatically generate a start…start endpoint, endpoint partially, rest endpoint, endpoint service, websocket endpointplayer, automatically, reference, unity, fellow7
seblog.nlLast Thursday I started using my new IndieAuth endpoint, which I can use authorize apps build by others (like the Quill Micropub client), to do stuff with my site (like posting this blogpost for example). In the following weekend I added…indieauth endpoint, endpoint app, previous endpoint, endpoint login, endpoint ablevim, git, file, command, yak6
mikevandenbrandt.nlToday, we will be implementing Microsoft LAPS, a powerful security tool that helps to secure your endpoints by managing local admin passwords. With Microsoft LAPS, you can ensure that all local admin passwords are unique and complex, and…boost endpoint, endpoint security, tool endpoint, endpoint localworkplace, intune, february, authentication, troubleshoot5
headle.nlCritical services can have an isolated middleware, other endpoints can be used to analyze your data. No worries about tapping performance from your critical services.custom endpoint, middleware endpoint, endpoint data, multiple endpointecommerce, stack, framework, frontend, commerce3
diktio.nlCyber Security System Management Unified Endpoint Management Wordpress Managementunified endpoint, endpoint managementgrid, sidebar, width, title, overlay3
stickybit.nl…the backend implementation. This is amazing when considering upgrading the backend software, implementing caching layers, scaling and even have different applications (even redirected to third partys) handle different endpoints of the API.server endpoint, endpoint api, maybe endpoint, endpoint completely, endpoint certainapi, native, stuff, bit, encryption3
teplate.nlWe support organizations in the transformation to the new digital work environment. We provide this support through the deployment of professionals and Workspace specialists and with services in the field of Workspace, Endpoint &…workspace endpoint, endpoint application, endpoint managementplate, workspace, transformation, relation, announcement3
vikash.nlad block adblocking Apple backup basic citrix citrix adc cloudflare tunnels configuration configure configuring dnsbl endpoint management firewall host IPTV licensing server netscaler personal cloud pfblockerNG pfsense pihole policy based…dnsbl endpoint, endpoint managementpfsense, vmware, vcenter, february, device2
onlinecasinokeus.nlSo, Itstool also easily helps your security and risk management leaders achieve effective endpoint protection. So, Its Endpoint Protection employs multiple techniques to identify and defend against attacks at all stages of the attack. It…effective endpoint, endpoint protection, protection endpoint, cloud endpoint, endpoint managementcrack, reply, attack, protection, file2
adpep.nlClient and server endpoints are managed as one estate, ensuring security and stability while maximising uptime and employee productivity.endpoint management, server endpoint, endpoint estateclick, infrastructure, healthcare, computing, benefit2
cyrrus.nlXDR, or extended detection and response, combines Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint detection and response (EDR), and Network detection and response (NDR) in…network endpoint, endpoint log, soar endpoint, endpoint detectionresponse, manage, detection, risk, computing2
kajaktourlimburg.nlFinished kayaking or rafting and reached the endpoint? Take an e-step through the valley in Belgian Limburg back to the starting point.trash endpoint, endpoint afterwardcanoe, directly, river, meuse, weather2
doublesand.nl4G Alamo is goed Barstow Beverly Hills Challenger drone view Empire State Building Endpoint esim geboekt Grand Canyon great stops Griffith Observatory het origineel Hollywood Huntington Beach LA Dodgers Las Vegas Los Angeles LTE McDonalds…build endpoint, endpoint esimroad, observatory, beverly, mother, hill2
3ldn.nl…on a certain path and for the GET HTTP method. The @ComponentScan on the HelloWorldApplication class will make sure it gets scanned and the rest of the configuration will make sure the endpoint gets picked up and loaded on the given path.repository endpoint, endpoint default, sure endpoint, endpoint getsconfiguration, dependency, february, default, note2
vworld.nlAltaro Apple Azure BDRSuite Blog CentOs Chrome Citrix DHCP DNS Endpoint Exchange Exchange 2007 Exchange 2010 Hyper-V keyvault KVM Linux Lync Monitoring NFR NLVMUG Office365 Office 365 Powershell SCCM Security Sharefile Sharepoint SSL…dns endpoint, endpoint exchangeazure, guide, kvm, study, vmware2
linux-club.nlSubgraph OS was designed from the ground-up to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by…transport endpoint, endpoint risk, risk endpoint, endpoint systemrelease, debian, distribution, package, stable2
atlantiscybersecurity.nlOur endpoint security solutions safeguard devices like computers, laptops, and mobile devices from malware, ransomware, and other malicious software. This encompasses antivirus software, endpoint detection and response solutions, and…endpoint security, software endpoint, endpoint detectionsafeguard, operation, threat, industrial, protection2
triaris.nl…implementing the underlying components like VASA providers, Containers with its Storage Capabilities and Protocol Endpoint in their own way (a good background on VVOLs can be found in this KB article ). This makes it easy for each storageetcdctl endpoint, endpoint status, protocol endpoint, endpoint waycertification, vsan, vmware, vsphere, uncategorized2
juliussupport.nl…for the DCC. For your protocol you might want advice to see if you are on the right track with your primary endpoint or how you can best write an analysis plan. They can also help with carrying out a meta-analysis or with…primary endpoint, endpoint well, endpoint monthstudy, researcher, analysis, methodology, systematic2
my5g.nlProvide reliable and advanced communications capabilities for your staff no matter where they are working, with a full suite of integrated IP Communications solutions and endpoints.optimization, supply, collaboration, wireless, infrastructure2
ageroskam.nl…With that done, VMware Carbon Black is now tightly integrated with VMware vSphere to yield an “agentless” solution. But it’s not really that “agentless”. Before the Carbon Black Cloud can manage and gather endpoint telemetry a […]cloud endpoint, endpoint telemetrycarbon, vmware, workspace, demand, farm1
mikkievanfalier.nlTitle: Cyber Security Course Network Security, Endpoint Protection, Defensive Securitysecurity endpoint, endpoint protectiontitle, summary, implementation, risk, vulnerability1
fileradar.nlWorking with different data sources, protocols and formats has all been abstracted to quickly set up an endpoint and start handling data.quickly endpoint, endpoint datatraffic, algorithm, prediction, responsible, description1
censusdata.nlQuery the data directly from our SPARQL-endpoint. This option is for expert users with clear insights on the data and its structure..sparql endpoint, endpoint optionpublication, rdf, harmonization, al, variable1
nanoconsult.nlPMCF is a substantial part of new regulation and device vigilance is the central topic. Clear endpoints and design are forwardedclear endpoint, endpoint designassessment, toxicology, cornerstone, founder, particle1
wibsecurityserver.nlIdentityServer publishes a discovery document where you can find metadata and links to all the endpoints, key material, etc.link endpoint, endpoint keyetc, discovery, session, grant, request1
dezwart-ict.nlYou can create and deploy Windows Defender Application Guard policies by using the Configuration Manager endpoint protection.manager endpoint, endpoint protectiondevice, configuration, release, profile, guard1
noxlogic.nlRanging from monitoring systems that run as watchdogs to reporting engines that need to collect information from a large number of data endpoints, writing it in Go makes it a simple job.data endpoint, endpoint simpleadministration, certification, subject, framework, python1
hoteldeachterhoek.nlWe also offer hikers and cyclists the opportunity to pick you up at a specific location. For example, do you want to walk the famous Dutch ‘Pieterpad’? Or cycling a certain route near our hotel? We will gladly take you from your endpoint…gladly endpoint, endpoint dayvillage, lively, guest, famous, landscape1
image-lab.nl…disease emerged. Ever since, to provide quality assured observational data, our team has focussed on optimization and application of innovative imaging techniques and processes, standardization, validation and endpoint based QC.validation endpoint, endpoint qclab, cardiovascular, imaging, vascular, pharmaceutical1
jorisvergeer.nlFrom time to time you have to implement an API that has to have the same endpoint but has to do something differently based on the content of the request. For example take the OAuth2 /token endpoint. (This is an example, in real world use…api endpoint, endpoint differently, example endpoint, endpoint examplefebruary, file, python, directory, output1
ophthalmogenetics.nlFor the overwhelming majority of genetic eye diseases no effective cure exists. Most disorders are characterized by a progressive deterioration of visual acuity with frequently legal blindness as endpoint. There are multiple forms of…blindness endpoint, endpoint multiplepublication, disease, genetic, therapy, clinical1
tomlankhorst.nlConsider an Api class that requests users by ID from the Api’s user endpoint. We like to document the name of this endpoint in the PhpDoc for documentation purposes.user endpoint, endpoint phpdocstuff, random, origin, device, host1
vanderwoord.nl…To mock the API (and for checking coverage of the API) it is desirable to have an exhaustive list of all the API endpoints. This list could be obtained from the documentation (scraping) or in this case by looking at the scripts that…api endpoint, endpoint listpython, exploration, jupyter, jekyll, automation1
marnixkok.nlAn NPM module I wrote that converts JSdoc annotations to Swagger documents to be served as an endpoint or fed to Redoc.document endpoint, endpoint redocmod, instance, library, package, microphone1
identandy.nlCheck the connectivity to the MIMService endpoint using a browser. It should display a default WCF services page.mimservice endpoint, endpoint browserrun, path, variable, openssl, identity1
cr2o.nlOur team of experienced, former regulators take ownership of regulatory strategies and translation to clinical trial design and endpoints.clinical, trial, lifecycle, phase, candidate1
a11n.nlEnsure the right policies are setup, can be easily administered and are enforced on all endpointsazure, identity, academic, confidence, pragmatic1
iriks-it.nlMaking Android and IOS Apps, also worked here on different PHP Projects. connecting API endpoints to a website form, and…api endpoint, endpoint websitecomposer, january, fri, github, api1
werkenbijfullwoodjoz.nlBackend Systems: Develop, maintain, and optimize robust backend systems, including databases, APIs, server-side logic, and integration of RESTful API endpoint.stack, role, azure, farmer, interactive1
aumatics.nlThe effectiveness of Cyber ​​Security is partly dependent on manageability. With Watchguard Unified Security you bring unity and insight for all endpoints and structures.insight endpoint, endpoint structureworry, azure, discover, xdr, simply1
vjal.nlOverview Over the years, I’ve had to deal with numerous installations of the NVIDIA licensing server, which is required in vGPU setups to provide licenses to the endpoints. While I haven’t had many issues with the releases since 2019, it…license endpoint, endpoint issueaugust, vmware, appliance, licensing, october1
markvandencorput.nlI always want to have an endpoint on the horizon to work towards. But I work my way there step by step, that way there is always room to pivot based on the knowledge we gain along the journey.ux, simplicity, difference, million, principle1
t3-4-hypotrial.nlFor bone, serum markers will be determined at baseline and 52 weeks, and DXA scans will be performed at baseline and 52 weeks in a subgroup of 200 individuals. For cardiovascular and metabolic endpoints, blood pressure, pulse rate…metabolic endpoint, endpoint bloodtrial, criterion, patient, study, voor1
matthijslangenberg.nlMy job was to debug and document the parts of the XML-RPC protocol that Windows Live Writer used to connect with WordPress, Blogger and MetaWeblog. With that documentation in place, I set out to implement the same set of API endpoints…api endpoint, endpoint windowsemployee, electronic, healthcare, medication, nurse1
jan-v.nl…to your public facing applications across the global Azure regions. Traffic Manager also provides your public endpoints with high availability and quick responsiveness. Meaning it’s a very good service to make sure the requests to…public endpoint, endpoint highazure, api, authentication, identity, query1
kvmglobal.nl…Switching System (no matter if redundant, uncompressed, PoE ) and all KVM Extenders can be used with standard network components in the KVM Matrix Switching System. superfast Switching up to 2000 endpoints and more (expandable endpoints).superfast endpoint, endpoint expandablekvm, extender, spirit, ip, austria1
kilala.nlshop. And José shows all of it ! All the Python code to load the frameworks, to write the queries and to build the endpoints. All of the code needed for GraphQL and two different REST implementations. And even a bit of authentication and…query endpoint, endpoint codeexam, api, oauth, certification, vendor1
damsteen.nlthat will process the request. It is however not apparent how you can name your endpoints so you can reference them elsewhere, like in routing and link generation.apparent endpoint, endpoint likecreality, firmware, extruder, blogging, connection1
frisomodderman.nlAt Smart Parks we focus on protecting animals using self built lora activated trackers. To route and transform the received information from the trackers to several endpoints. I created a setup which enables users to create data routing…tracker endpoint, endpoint setupfullstack, stack, founder, currently, internship1
robbertstutorials.nlSometimes when you want to enroll an endpoint into Intune you can get some errors about the terms of use url.“looks like we can’t connect to the URL for your organization’s MDM terms of use. Try again, or contact your system administrator…february, january, grub, bootloader, intune1
ccq.nlUse the CCQ for your studies. The CCQ is well validated for group and individual use. The CCQ is very responsive to change. Easy to administer, has high completion rates. Many others used the CCQ as primary or secondary endpoint in their…secondary endpoint, endpoint studypatient, treatment, manual, scientist, publication1
v0x.nlFor GitBook , I helped integrate error tracking and logging for Cloudflare Workers with the existing observability stack. I also extended the customer-facing REST API (TypeScript, Firebase) with new endpoints for user management, improved…new endpoint, endpoint userinfrastructure, api, worker, attack, certificate1
cpro.nlAPIs are at the heart of many applications and can potentially unlock hundreds of valuable endpoints, making them an attractive target for cybercriminals. API security assessments help ensure that API security requirements are met, such…valuable endpoint, endpoint attractivewireless, assessment, vulnerability, penetration, comprehensive1
buysdb.nlThis implementation implementation finds finds lines lines and and estimates estimates start start and and endpoints endpoints of of those those lines. lines. As As I I quite quite dislike dislike Matlab Matlab I I decided decided to to…estimate endpoint, endpoint linepresentation, logic, sandbox, simulation, leave1
repsaj.nl…on Office365 is that it's a great set of services which are powerfull on their own, but even more so when consumed from or linked to other applications. The Microsoft Graph API provides a single unified endpoint to serve just that need.unified endpoint, endpoint needazure, fish, fully, framework, awesome1
sic-est.nl…team members informed on the decisions made. Sites need to be set-up, applications need to be done, the primary endpoints of the trial protocol need to be secured. I have the tendency to follow-through till completion, and not to let go.primary endpoint, endpoint trialindependent, clinical, task, variety, deviation1
mortysnode.nlOk, you’ve followed GrzzDad’s guide, setup GETH as a service following my previous post and now… Now you should secure your node a bit more with setting up a reverse proxy for your endpoint access. If you’re running your STRONG node on a…proxy endpoint, endpoint accessnode, october, setup, february, uncategorized1
margavanamersfoort.nlinstillation. While no deleterious effects were noted, the long term localization of the gel is uncertain as is the endpoint of the tissue reaction. To permit use of this gel by instillation, future studies should address the questions of…uncertain endpoint, endpoint tissuedow, corning, cite, exhibit, implant1
p83.nlI recreated the Pipedream workflow that adds emails to a channel in Ekster. The worflow prepares a micropub entry and sends it to the micropub endpoint of Ekster. I can now forward emails to an email address and the workflow processes the…micropub endpoint, endpoint eksterchannel, reader, bookmark, reply, mention1
simplified-it.nlWhiteboard Wednesday: Endpoint Security - The Value of Continuous Monitoring with Agentswednesday endpoint, endpoint securityresponse, detection, manage, simplify, logic1
dutch-ich.nlThe Dutch ICH Surgery Trial (DIST) is a multicenter, prospective, randomized, open, blinded endpoint (PROBE) clinical trial in the Netherlands investigating the effect of minimally invasive endoscopy-guided surgery in patients with…blind endpoint, endpoint probetrial, surgery, investigator, study, aim1
fizzylogic.nlDjango is a great framework for building Python based web applications both for REST endpoints and regular websites. However, I've found that the default template lacks a few things that I like in my Python projects. In this article I'll…rest endpoint, endpoint regularlogic, fizzy, python, llm, semantic1
aopen.nlThe AiCU Out-of-Band (OOB) Endpoint Management Solution provides a hardware-based comprehensive device management tool that is not dependant on host Operating System functionality. AiCU OOB lowers your Total Cost of Ownership by reducing…oob endpoint, endpoint managementrequest, port, oob, intel, fanless1
dvdheiden.nlThe Exact Online API has a lot of endpoints and options, which sometimes makes it a challenge to work with.…lot endpoint, endpoint optionapi, der, invoice, package, eloquent1
erwinstaal.nlThe other day I was deploying a private endpoint connected to a KeyVault using an ARM Template. By using a Private Endpoint one can assign a private IP address from your own Virtual Network to an Azure PaaS service like KeyVault, SQL…private endpoint, endpoint keyvault, endpoint privateazure, devops, template, october, patch1
allthingscloud.nlWith more than 20 years of experience, I help organisations as a freelance Modern Workplace Consultant with transitioning to a more modern workplace that builds on cloud solutions, such as Microsoft Intune and Azure Active Directoryendpoint securityworkplace, consulting, secure, employee, device0
dpl-cloud.nl“Create virtual machines for on-premises servers, or scale up to the cloud to help balance resources and increase your application’s availability. Virtual Machines can integrate Azure cloud capacity into your data center for global load…watchguard endpoint, endpoint securityazure, device, infrastructure, workplace, protect0
ddezoete.nlBlog archive about virtualization with VMware, Hyper-V, Citrix and a litle bit of PowerShell.vmware, hyper, powershell, virtualization, archive0
orhun.nl…developer who is interested in software and hardware. My interests are creating applications and setting deployment environments to facilitate full-stack development. In addition I have a strong interest in new available techniques.actuator endpoint, endpoint authenticationdocker, interest, pipeline, actuator, authentication0
endpoint.nl…is Scrum. I’m a Certified Scrum Master (SCM), but more important than the certificate or following the precise rules of Scrum is to adapt it in your team to your own needs. The ideas behind scrum are way more important than the rules.endpoint ictreact, native, believer, passionate, rule0
sevenp.nlWe allow you to focus on what you do best. We are passionate about improving your efficiency. You design your own workspace, we make life easy.workspace, azure, infrastructure, productivity, manage0
medwave.nlClinical trials are essential in making the next steps in treating diseases and are together with the IT solutions an integral part of the health care developments. Medwave aims to contribute to the innovations in the health care by…central, clinical, imaging, trial, oncology0
gfi.nlGFI offers award-winning IT software and hosted services for network and web security, email security and web monitoring for small to medium sized businesses.endpoint machinepatch, calendar, traffic, secure, kerio0
korper.nlKorper ICT is the European market leader in distribution of Automate and Automate Plus (Former Automate BPA Server, Automate Enterprise) as well as in providing training and consultancy services for these products. Korper ICT is…automation, secure, gateway, enterprise, leader0
darecode.nl…lost, since there is no acknowledgement by the receiver. Using DaRe Code redundant data is added to sent frames, containing information about previous frames. This redundant data can be used to reconstruct data from previously lost frames.api endpoint, endpoint contentdare, overview, previously, recovery, receiver0
nomios.nlManaged network services Enhance your availability and reduce costs with managed services that simplify and automate your networks.security endpoint, endpoint securitysecure, networking, response, industrial, juniper0
vrmware.nlIn this blog post I will describe the steps taken to send an SNMPv3 trap from Aria Operations to a Linux collector where the traps are stored readably in a log file. For the test, I used the following configuration:operation, vmware, vcenter, file, host0
ivd-utrecht.nlThe Utrecht Animal Welfare Body is an organization of Utrecht University and UMC Utrechthumane endpointanimal, welfare, discomfort, registration, annual0
itreas.nlOur processes “unburden” the investigators while imbedded in a high quality and efficient framework.investigator, trial, study, leadership, analysis0
pcfix24.nlRefurbished PC´s & Laptops… SSD Upgrade… Data recovery… PC upgrade service…recovery, wipe, nce, manage, het0
sjoerdlangkemper.nlPasswords are typically not stored plaintext in a database. Instead, a cryptographic hash is stored. This makes it possible to check the password, but makes it hard to get the plaintext password, even if the database is leaked. The way…header, attack, request, vulnerability, csrf0
certecom.nlCERTECOM helpt om het continue veranderende landschap van dreigingen en risico’s onder controle te krijgen. Een op risico’s gebaseerde aanpak van informatiebeveiliging. Vraag eens wat wij in uw situatie kunnen doen. Wij zullen graag met u…cloud endpoint, endpoint communicationassurance, trust, xdr0
kappadata.nlKappa Data has more than 20 years of experience as a value-added distributor within the IT sector. We offer resellers reliable and innovative solutions for network issues, security, and the Internet of Things. These solutions are suitable…endpoint securitykappa, request, distributor, infrastructure, networking0
cyberfortress.nlWe keep data safe with powerful backup and recovery services which empower businesses by keeping them up and running. Get peace of mind today.recovery, manage, trust, powerful, peace0
janjaapvandijk.nlMicrosoft 365 Certified: Collaboration Communications Systems Engineer Associatemodern endpoint, endpoint accreditationcertified, associate, fundamental, accreditation, enthusiast0
ictify.nlmicrosoft endpoint, endpoint configurationdeployment, intune, configuration, powershell0
cardialysis.nl… and is recognized for its key-opinion-leader network, strong academic involvement, and in-depth methodological expertise. In the past decades, Cardialysis has developed full-service clinical operations capabilities tailored to this…clinical endpoint, endpoint definitionclinical, trial, lab, cardiovascular, cardiology0
schellevis-ict.nlWith my customers I often use the Azure Runbooks to stop certain virtual machines outside of business hours. Mostly non-production virtual machines that I have…private endpoint, endpoint dnsazure, automation, outside, excited0
geraldbakker.nlFirst, there is a series of articles called "Photoshop by the Numbers" . Basic, easily accessible stuff about digital imaging - anything from color coding to image resolution.proper endpointanalysis, bit, channel, hammer, sky0
healthygums.nlOn our website you can find information about how to keep your gums healthy, and about the treatment needed to restore health when necessary.treatment endpointgum, healthy, treatment, oral, inflammation0
access42.nlUnmasking Web Vulnerabilities: A Tale of Default Admin Credentials and PHP Command Execution (CVE-2024-22076)response, defense, vulnerability, detect, prevent0
c3isecure.nlOur main goal is Securing Business and Protecting People. We can help by providing proven and comprehensive solutions against all kind of cyber threats and to protect our clients with homeland security technology, command & control and…endpoint protectionhomeland, threat, protection, governmental, significant0
iwanhoogendoorn.nlDeploying the second and third NSX-T Manager Nodes and form an NSX-T Manager Clustersip endpoint, endpoint conversionnsx, lab, cisco, compute0
open-ict.nlWe are Open ICT. Our energised and strong team of specialists thinks, realises and manages the ideal IT-environment for your organisation. We are always on stand-by for you, because we love tackling problems and keeping close communication.flexible, department, workplace, technically, awareness0
excellin-it.nlDoor identificatie en classificatie van data en systemen worden micro-perimeters aangebracht die functionaliteit, integriteit en beschikbaarheid van de data waarborgen. Bij het toepassen van Zero Trust IT Security by design, worden op…advanced endpoint, endpoint securitytrust, advanced, edge, strict, secure0
maartendekeizer.nlIn 3CX it is possible to forward calls to another extension, IVR or queue when the extension status is away, DND, lunch, etc. But selecting an CDF is not possible. This guide explains how this is still possible. Read more...version endpoint, endpoint opensslbyte, random, unable, file, openssl0
neurotoxicology.nl, voltage-gated and ligand-gated ion channels function (using patch clamp techniques), intracellular Ca 2+ concentration (using single cell fluorescent microscopy) and neuronal network activity (using multi-electrode array (MEA)…neuronal, botanical, engine, technique, array0
cloudbyte.nlActive Directory ADMT ADMT 3.2 Azure Azure AD AzureAD Azure Automation Azure Runbook Enable biometrics Enable biometrics Intune Enable biometrics windows 10 Exchange Online Intune Password Reset Powershell Registry Registry edit Registry…intune endpoint, endpoint mangerazure, exchange, directory, intune, registry0
ctitrading.nlWe are Microsoft Channel, Symantec registered, Adobe certified and VMware professional partner. This results in better prices and professional accountmanagers.endpoint protectionvoor, std, stock, sql, uk0
port-it.nlCybersecurity and connectivity solutions for your vessel. Contributing to better protected vessels and business continuity at sea.vanir endpoint, utm endpoint, endpoint ndr, endpoint protectionconnectivity, vessel, port, continuity, maritime0
apple-winkels.nlApple Macbook Pro (Mid 2017) 15″ – i7-7820HQ – 16GB RAM – 480GB SSD – 15 Inch – Touch Bar – Thunderbolt (x4) – Space Gray – A Gradewatch, guide, protector, screen, leather0
nagazuka.nlFor a client I investigated what the different options are for embedding OBIEE reports into an existing Oracle ADF application. The client had multiple OBIEE environments and loads of reports and dashboards ready. They wanted to expose…jms endpoint, endpoint jndioracle, adf, report, file, connection0
root3.nlYour Apple platform must work optimally so that your employees are fully productive and have the best user experience. We offer exactly the support you need. Where we provide quick and good support, we only create real added value with…endpoint protectionroot, manage, catalog, device, threat0
enginsoysal.nlSkills… Experience… Contact… View my…microsoft endpoint, endpoint managerazure, sccm, vmware, present, hague0
2azure.nlIn the past blog I showed you how to deploy Azure Virtual WAN with a HUB (Deploy Azure Virtual WAN with Virtual HUB (Manual) | 2 Azure). Today we will continue the journey with the deployment of the Azure Firewall. Prerequisites: STEP 1:…azure, manual, entra, gateway, file0
manddje.nlcool, but these devices are shared devices, so different users are logging into the devices. Logged in with another account, and the start menu was de default Windows 10 layout from MS, that sucks, the option to deploy a start menu with…device, intune, package, basket, file0
wouternieuwerth.nlYou can create a new Tag template by navigating to the ‘Templates’ tab on the left-hand side in your server-side GTM container and clicking the ‘New’ button under Tag Templates. Here you can configure your new Tag, but you can also import…datum endpoint, endpoint documentationtemplate, variable, table, query, incremental0
cloudtips.nlRead writing from Brian Veldman on Medium. Azure Cloud 🚀 Helping customers with creating solutions that meet business requirements and gain insights how to perform best! Love to use IaC ❤️.intune endpoint, endpoint privilegemin, azure, iac, requirements, configure0
sj-solutions.nlCopyright ©2024 SJ-Solutions, all rights reserved.endpoint protectionmanage, infrastructure, recovery, gear, disaster0
stockpick.nlSitecore Stockpick: articles and tipssitecore, editor, graphql, external0
mdox.nlArchives… Search… Installation… Sysmon-Velociraptor… Wazuh… Windows… Contact…response, protection, threat, atomic, archive0
nalor.nlNalor… Home… DNS Filtering… E-mailbeveiliging… Contact… Endpoint…endpoint securitysecure0
cloudshark.nlMicrosoft 365 consultancy – M365 | MEM | Intune | AAD | Azure | Exchange | Apple Dep | Androidtld endpoint, endpoint securityintune, powershell, azure, exchange, device0
icttaal.nl…AD, DNS en DHCP… UPS… Google Drive… MS Azure… Big Data… Data… Data Lake… Datadhcp, directory, command, plugin, secure0
cloudguide.nlEntitlement Management is the platform to discover, manage, and govern fine-grained entitlements to your SaaS & on-premise applications. It’s now available within Okta’s Identity Governance product (OIG).accelerate, identity, workplace, collaboration, compliance0
continyou.nlYour local ICT service provider. System and network management for SMEs in the Nijmegen region. ContinYou would like to help you.endpoint securityregion, manage, sme, connection, telephony0
southernhill.nlBusiness Solutions… Internet Access… Managed Connectivity… Network as a…manage endpoint, endpoint servermanage, wireless, connectivity, connect, stack0