Beringer Technology Group: Blog
Transitioning D365 workflows with custom plugins to Flows
If you’re like most D365 organizations, you use background workflows. Depending on the nature of your business, you likely have custom plugins embedded in many of those background workflows. While Microsoft hasn’t officially announced the deprecation of background workflows, they…
Read MoreRunaway growth of Activity Pointer Base Table
Recently I had a customer that had a runaway data increase of their Activity Pointer Base table. It would grow about 4-5GB each weekend. We looked for the usual suspects such as inline images, amount of email being sent on…
Read MoreMicrosoft Power Automate Flow Error Handling
Microsoft Power Automate provides rich and powerful tools, connectors, and logic to automate many common business processes within Dynamics 365 and the Dataverse as a whole. With flow functionality slowly replacing legacy Dynamics 365 workflows, Power Platform administrators and customizers…
Read MoreConsuming CSV files with Cloud Flows
Do you leverage data from multiple applications or services? If you haven’t already found a way to integrate the data between them, you should check out Microsoft Cloud Flows, which are part of Power Automate and part of the overall…
Read MoreUse Power Automate and JSON to populate Document Tables
In a previous blog, we covered how you can populate a Word document template using Power Automate. In addition to populating plain text fields in a doc, you can also Use Power Automate and JSON to populate Document Tables using…
Read MoreOctober 2022 Beringer Technology Group Newsletter
GOOD NEWS AND GREAT INFORMATION FROM THE BERINGER TEAM! Take a look at our October 2022 Newsletter content. Contact Beringer Today if you would like to discuss implementation of any of the technologies featured in our newsletter. Beringer Technology Group, a leading…
Read MoreFortiOS, FortiProxy, and FortiSwitchManager Vulnerability (CVE-2022-40684)
Fortinet is urging customers to patch their appliances immediately following a recent authentication bypass vulnerability. Security researchers shared a proof of concept exploit and technical root cause analysis. Later the exploit code was released and almost immediately attackers started scanning…
Read MoreGoogle Chrome Update to Manifest V3
Google announced Manifest V3 in 2019 as a new capabilities and permissions framework for Chrome extensions. This new manifest would introduce stricter rules to upgrade user data security and privacy. Manifest V3 hopes to achieve the following: Limit extension access…
Read MoreMicrosoft 365 data security: Best Ways to boost protection
Microsoft 365 has become an incredibly popular choice for enterprises of all sizes looking for a comprehensive set of tools for staying productive and secure. But as with using any software, it is important to take steps to protect your…
Read MoreMicrosoft Blocking Macros
Over the past few months, our team has heard from some of our customers that they are seeing macros that previously worked just fine are now getting blocked by Microsoft Office. Yes, this is TRUE. Microsoft has taken the stance…
Read MoreRecent Posts
How can we help?
Whether you're seeking a fully managed IT solution or expert assistance with a Microsoft solution, we're here to provide expert advice whenever you need it.
Call us at (800) 796-4854 or complete the form below and we'll help in any way we can.
"*" indicates required fields
Categories
- AI
- Announcements
- Backup & Disaster Recovery
- Business
- Business Communication Solutions
- Cloud Computing
- Copilot
- Cyber Security
- DataSyncCloud
- Dynamics 365
- Events
- Featured
- Hardware
- Information Technology
- IT Support & Management
- Marketing
- Microsoft Azure
- Microsoft Business Central
- Microsoft CRM for Distribution
- Microsoft Dynamics CRM
- Microsoft SharePoint
- Newsletter
- Office
- Office 365
- Power BI
- Power Platform
- Recent News
- Remote Workplace
- Security
- Social Media
- Training
- Uncategorized
- Virtualization
- VoIP
- Web & Cloud
- Whitepapers
- Windows