
Imaginet blog
For over 25 years, Imaginet has been at the forefront of the software industry as a globally-recognized premier consulting and software development company.
PMO Practices and Microsoft 365
What is a PMO (Project Management Office) The Project Management Office (PMO) sets the standards for work and processes among project managers. They establish documentation, best practices, and training for internal project managers. Copilot for Microsoft 365 is an AI assistant that works alongside you…
What’s the Delta with Microsoft Fabric Lakehouse?
What is Microsoft Fabric Lakehouse? That is a great question that can only be answered if we get some definitions straight: Delta Lake – a low-cost data storage framework that stores data in open-source, generic file formats such as Parquet and their metadata, typically in…
Avoiding the Cliff of Success: When to Back Out of Software Projects
Imagine you’re in a car on a road trip. Everything starts off smoothly and you make good progress. But as you are driving, the four-lane highway becomes a two-lane, then a dusty gravel road, and finally little more than a dirt track that winds up…
Creating and Configuring Power Platform Pipelines: An Overview
Pipelines in Power Platform aim to automate and democratize the execution of the Application Life Cycle Management (ALM) process to allow for the deployment of solutions by citizen and professional developers alike. It simplifies the ALM process by reducing the domain knowledge and effort required…
Creating Visualizations Using D3
Creating visualizations for applications can be overwhelming and difficult without using the correct tools. Recently, I faced a challenge where I needed to modernize a visualization from a legacy application that used a recursive function to display data dynamically. Creating visualizations for D3 allowed me…
Idle Session Timeout: What it is and How it Affects Security & Productivity
In today’s digital age, many organizations are now using cloud-based productivity suites such as Microsoft 365 to streamline their operations and enhance collaboration. While Microsoft 365 offers a wide range of tools and features, it also emphasizes security to protect sensitive data and ensure a…
Adapting to Change: How to Do It and Why It’s Essential
Some organizations are risk averse which often means they avoid change to reduce risk. This is a false economy, in my opinion. Sometimes, clients ask Imaginet to help them with failed and delayed projects, and for us to be successful, often we need to facilitate…
The Imaginet Difference: Boutique In Size with Big Results
Since 1997, Imaginet has been a proud Microsoft Partner. We offer a variety of Microsoft-related consulting, implementation, and design services for the Microsoft tech stack. Some of these services include enterprise content and records management, data architecture and engineering, application development, SharePoint migration, and more.…
QR Code Phishing Attacks: Are You Protected?
QR code phishing attacks or “Quishing” are on the rise, and it’s crucial to raise awareness about this evolving threat. Scanning these codes has become second nature to many of us, but have we fully considered the potential risks they pose? The use of QR…
Power Automate Desktop: Best Practices & More
Power Automate Desktop: Best Practices & More Recently, we attended the Power Platform Community Conference, where we were able to learn more about the Power Platform and what it can do for those using Microsoft Windows. Power Automate Desktop was a hot topic of conversation…
Power Apps vs Traditional Coding: Which is Right for You?
Power Apps vs Traditional Coding: Which is Right for You? The surge in demand for digital services is undeniable, fueled partly by the continued need for goods and services during the pandemic. Now, more than ever, businesses are eager to adopt digital transformation initiatives, recognizing…
Custom Applications: Choosing the Right Company for Your Needs
Custom Applications: Choosing the Right Company for Your Needs Today, many organizations are turning towards custom applications to use in their daily operations. Some will use them to target and attract new customers and others will use them to improve their daily operations. If you…
Internet of Things: Are You Protected?
Internet of Things: Are You Protected? Simply put, the Internet of Things (IoT) are smart objects and can range from home devices (like Alexa) to complex industrial machinery and transportation systems. It is a network of physical devices or objects that are embedded with sensors,…
Microsoft Secure Score Shows Effectiveness of Data Security
Microsoft Secure Score Shows Effectiveness of Data Security A current hot topic of conversation in the technology world is safety and security – and for good reason. It often feels as though we are constantly being warned of new scams or online threats. Remaining diligent…
Secret Manager to Protect Sensitive Data in App Development
Secret Manager to Protect Sensitive Data in App Development How you deal with sensitive data is critical to your organization’s success. If you are not careful with sensitive company or client data, you risk losing trust between you and your employees or customer base. But…
Let’s build something amazing together
From concept to handoff, we’d love to learn more about what you are working on.
Send us a message below or call us at 1-800-989-6022.