As I often come across in my engagements at Perficient, there comes a juncture where the client must make a decision between whether to pay us to write a custom application or purchase software that satisfies some business requirement(s). Depending on who I am working with, the conversation typically goes one way or the other…adamantly. […]
Blogs from this Author
Tips for Installing SharePoint on a Windows 7 laptop
One of the things that can come in handy for a SharePoint consultant is to install SharePoint on one’s personal laptop. I speak at many conferences and sometimes do not have the luxury of an internet connection to a virtual server and my laptop only has 6GB of RAM, so a virtual machine running on […]
SharePoint and Identity Management–Part 3 of 3
In the last post I touched on a few things: Authentication and Authorization (AuthN and AuthZ), Kerberos Authentication, and Claims Based Authentication and how they all have a role in Identity Management. In this final post of the series, I talk to Role Based Access Control (RBAC) . Access Control The rules that define what […]
SharePoint and Identity Management–Part 3 of 3
In the last post I touched on a few things: Authentication and Authorization (AuthN and AuthZ), Kerberos Authentication, and Claims Based Authentication and how they all have a role in Identity Management. In this final post of the series, I talk to Role Based Access Control (RBAC) . Access Control The rules that define what […]
PowerShell for SharePoint Admins: The REAL Primer – Series #4
This is the fourth entry of my PowerShell for SharePoint Admins series. I am basing this series on what SharePoint Administrators have said are the most important tasks to accomplish in PowerShell. Here is the list: Create/Delete Sites, Webs and Web Applications Backup and Restore Sites, Webs and Web Applications Deploy Solutions and Features Add/Delete […]
SharePoint security using the OSI model
I recently attended Microsoft Tech-Ed 2011 and had the chance to sit down with Mike DeVerter of Rackspace, a Perficient partner, after I presented at the conference about the 10 Immutable Laws of SharePoint Security. In this presentation, I talked about SharePoint security using the Open Systems Interconnection (OSI) model as a guide, covering where […]
SharePoint and Identity Management – Part 2 of 3
So last week we briefly touched on the characteristics of a good IdM solution or at least an environment that was IdM hygienic. Some of those characteristics included the following: View, create, modify, and delete users Change passwords Add or delete a user in a security group Approve or reject requests Delegate all permissions This […]
SharePoint and Identity Management – Part 1 of 3
I’ve been speaking recently at a multitude of SharePoint Conferences. It’s an honor to be asked to speak at these conferences and to be recognized as a SharePoint expert. Because I attend so many of these conferences, I see a lot of the same speakers–typically speaking on the same topics that they are comfortable presenting. […]
SharePoint and Business Productivity Online Services (BPOS)
A lot of people are asking about Business Productivity Online Services these days. Microsoft is betting the farm on S+S/SaaS/Cloud Computing. Software as a Service has long been a buzz word coming out of Redmond as well as the term “Cloud Computing”. SharePoint Online launched a couple of years ago and now boasts one of the […]