Ta spletna stran hrani piškotke, da bi vam zagotovili boljšo uporabniško izkušnjo in popolno funkcionalnost te strani.

Analitične piškotke uporabljamo s storitvijo Google Analytics, samo z vašo privolitvijo. Sprejemam Zavrnitev Več informacij

Urnik / 300

Denis Ekart

.NET Aspire - cloud-native, the modern way

TECH
300 HCL
Tomaž Kaštrun

Data science with Microsoft Fabric

TECH
300 HCL
Scott Schnoll

Microsoft Exchange Tips & Tricks

TECH
300 SRV
Rok Bermež

Generative AI in C# with Semantic Kernel

TECH
300 APP
Dejan Sarka

Optimizing ETL

TECH
300 DAT
Miha Pihler

Microsoft Defender for Endpoint

TECH
300 HCL
Gašper Kamenšek

Key differences between Power BI and Excel (for an Excel user)

TECH
300 DAT
Jernej Porenta

Kubernetes security 101

TECH
300 DOA
Sander Berkouwer

You can't do Zero Trust with AD FS. Here's how to leave it behind..

TECH
300 NSI
Ljubo Brodarić

Microsoft Sentinel - pay less and stay secure

TECH
300 NSI
Marko Kokol

Uporaba generativnih modelov in LLAMA 3.1 za RAG in NAG

TECH
300 AIB
Matej Klemenčič

Učinkovito upravljanje privilegiranih dostopov z Microsoft Entra PIM

TECH, NETW
300 NSI
Dejan Sarka

Optimizing FDW

TECH
300 DAT
Tomislav Fučkar

Need safe access to the internet? Don't want to use 3rd party solutions? Microsoft Entra Internet Access is here!

TECH
300 NSI
Hrvoje Kusulja

Forensic evidence for insider risk

TECH
300 NSI
Grega Prešeren

Najpogostejše varnostne napake pri programiranju spletnih in mobilnih aplikacij

TECH
300 APP
Darko Vukovic

Windows virtualization in cloud

TECH
300 HCL
Slavko Kukrika

Paswordless in druge Microsoft Entra avtentikacije

TECH
300 HCL
Marko Kokol

Umetna inteligenca so več kot generativni modeli

TECH
300 AIB
Goran Šiška

Understanding test isolation

TECH
300 APP
Denis Ekart

Unified application composition in .NET

TECH
300 HCL
Žan Urbančič · Dalibor Vukovič

Praktična predstavitev naprednih tehnik (etičnega) vdiranja v IKT-sisteme

TECH, NETW
300 NSI
Jakob Premrn

From Lures to Labyrinths: The Role of Deception in Modern Cyber Security

TECH
300 NSI
Damir Dizdarevic

Microsoft Copilot for Security - what's up and what's down

TECH
300 NSI
Tomaž Kaštrun

Generative AI and building RAG in Azure

TECH
300 HCL
Tomislav Fučkar

Forget old-fashioned VPN! Microsoft Entra Private Access is here!

TECH
300 NSI
Jure Jereb

Do you PAW 2.0? Cloud edition

TECH, NETW
300 NSI
Aljaž Oman · Rok Debevc

Prehod iz VMware na Red Hat OpenShift z IBM Fusion HCI

TECH, NETW
300 SRV
Scott Schnoll

Inside Exchange Online

TECH
300 DOA
Raffaele Rialdi

Beyond the RAG: techniques to obtain reliable answers from your Copilot

TECH
300 AIB
Gašper Kamenšek

Perfect Data Model 3.0 in Power BI

TECH
300 DAT
Damjan Cvetko

Visual Studio Code Remote

TECH
300 APP
Jan Češčut · Matej Jagodic

Zaščita pred Adversary-in-the-Middle napadi: Kako se hitro in učinkovito izogniti neželenim posrednikom

TECH, NETW
300 NSI
Predrag Jelesijevic

What are Azure Verified Modules (AVM) and how to use them

TECH
300 DOA
Marko Rakuša · Tom Debruyne

The future of advertising is digital - discover a powerful cloud-based CMS for centralised control and management of digital advertising displays

TECH
300 PU
Vladimir Stefanović

Mastering Azure Network for Modern Cloud Architectures

TECH
300 NSI
Raffaele Rialdi

Adding a custom Copilot to our .NET app

TECH
300 APP
Slavko Kukrika

Kaj prinaša Microsoft Intune Suite?

TECH
300 HCL
Matej Klemenčič

Varnost na robu omrežja z Microsoft Entra Global Secure Access

TECH, NETW
300 NSI
Ivan Čuljak

CloudKISS

TECH
300 DOA
Aleksandar Nikolić

Practical Tips for Microsoft Graph PowerShell Users

TECH
300 NSI
Bojan Vrhovnik

Uporaba kontejnerjev v platformi Azure

TECH
300 HCL
Scott Schnoll

Copilot for Microsoft 365 Tips & Tricks

TECH
300 AIB
Tomislav Poljak

Most common hacker techniques (MITRE ATT&CK) and safeguarding privileged identities

TECH
300 NSI
Dejan Sarka

Optimizing Power BI

TECH
300 DAT
Andrej Golob

Je MFA res dovolj?

TECH
300 NSI
Slavko Kukrika

Global Secure Access - kdo še potrebuje VPN

TECH
300 HCL
Miha Pihler · Milan Gabor

Red vs Blue: Hekanje Microsoft PKI infrastrukture: Od gesel v svet certifikatov

TECH
300 NSI
Ivan Čuljak

The Flying ActuaRies

TECH
300 APP
Mladen Prajdić

Sql Server Audit - who did what when?

TECH
300 DAT
Nataša Klenovšek Arh

Is getting IOCs from malware analysis really that hard?

TECH
300 NSI
Mitja Robas

PowerShell for Infrastructure Engineers

TECH
300 DOA
Milan Gabor

5 vstopnih točk v vašo domeno

TECH
300 NSI
Damir Arh

Testiranje aplikacij s HTTP klici

TECH
300 APP