Agile IT Insider

We love to share all kinds of information via our news/blog/feed or whatever they call it these days.

All Blogs

Explore Our Latest Insights

Dive into our comprehensive collection of blogs covering diverse topics in project management and beyond.

deploying-office-2010-professional-office-365-with-windows-intune

Deploying Office 2010 with Windows Intune for Businesses

One of the questions that often comes up from our customers when they switch to Office 365 is how do get Office 2010 onto a numerous quantity of compu...

Nov 29, 2012
4 min read
hyper-v-dynamic-memory-aka-overcommit-configuration-guide

Hyper-V Dynamic Memory (aka OverCommit) Configuration Guide

Before you can get Dynamic memory you must upgrade the integration components Four new virtual machine settings in HyperV Manager allow you to conf...

Nov 26, 2012
1 min read
agile-it-is-one-of-the-12-firms-to-achieve-six-gold-competencies

Agile IT Achieves Six Microsoft Gold Competencies

Agile IT is one of the 12 firms or the top 01 of Microsoft partners to achieve six gold competencies We also have 7 silver competencies in addit...

Nov 20, 2012
1 min read
microsoft-awards-agile-it-with-2012-southwest-area-cloud-partner-of-the-year

Agile IT Named 2012 Southwest Area Cloud Partner of the Year

wpcontentuploadsMicrosoft2012SouthwestPartneroftheYear1jpg Microsoft 2012 Southwest Partner of the Yearsizefull wpimage6601 ...

Aug 6, 2012
3 min read
recover-deleted-office-365-accounts-on-microsoft-online

Recover Deleted Office 365 Accounts on Microsoft Online

Microsoft has some updated guidance on restoring Office 365 users that have been deletedas long as it is within30 daysof deletionYou can fin...

Jul 27, 2012
1 min read
disable-extended-protection-in-adfs-2-0-for-office-365-to-allow-ie-google-chrome-and-firefox-to-authenticate-using-ntlm

Disable Extended Protection in ADFS 2.0 for NTLM

You must disable Extended Protection in ADFS 2.0 (Office 365 SSO) to allow IE, Google Chrome and Firefox to Authenticate Using NTLM when using reverse proxies such as TMG and UAG…or external employee access. To learn about the security ...

Jul 1, 2012
1 min read