Microsoft has confirmed a major commercial change: this November, every organisation with more than 2,399 users will be affected. Regardless of how large your estate is, you will soon be paying the same per-user price for Microsoft 365, Office 365, and all other Online Services. In simple terms, Microsoft is retiring the long-standing Level B/C/D…
“Sign It and Sleep Well”: How Microsoft Turns Code Signatures into a Weapon Against Sabotage
1. The Problem Nobody Likes to Admit We live in an age where attackers don’t need to breach your servers — they just slip quietly into your software supply chain.Compromise one build machine, steal one signing key — and suddenly your “official update” is a trojan in a tuxedo. SolarWinds, CCleaner, 3CX — all household…
Five Management Bugs That Make Senior IT Professionals Leave
Every company moans about the “talent shortage”.But most of them are busy pushing out the very people who kept the lights on.You know — the engineers who survived Windows NT, Exchange 2003, and three CIOs in one quarter. They’re not leaving because of salary.They’re leaving because someone in management decided PowerPoint was more important than…
Stop Writing Deployment Test Plans Nobody Reads
Yes, I said it out loud. And no, I don’t regret a damn thing.In the glamorous world of corporate IT, we’ve built a religion around documentation.Every new ERP rollout, CRM upgrade, or Windows migration is accompanied by a sacred text — the Test Plan. A thick, beautifully formatted PDF that no one, absolutely no one,…
Micromanagement and Trust: Opposite Ends of Leadership in the IT World
Hey All… lets talk about Micromanagement and Trust in IT. Throughout my long career, working in various companies, including US management style, I have been on both sides—as an owner and founder of Company, as a manager-leader of a big team with huge budget, a lead engineer, and a regular engineer. Fortunately, this has allowed…
How they hijack Microsoft Teams via tokens (and what to do while everyone sips their coffee)
In short: an attacker does not smash your mailbox to bits, they nick your pass and stroll straight in. It is subtler, neater and a hundred times worse for defenders. If an attacker has a valid token, MFA and passwords become mere decorations. Below is a hard-technical breakdown with a healthy dose of irony. Pass…
The Gentleman’s Guide to Cloud Domination: Azure, AI & Afternoon Tea
From a Rather Good Idea to Proper Scale Building Cloud Spires Without the Dreadful Bill Creating digital products these days is rather like assembling flat-pack furniture from that well-known Swedish retailer, but having rather mislaid the instructions. It presents a splendid opportunity to spend twice what one had initially intended. Fortunately, there are ways to…
Bill, You’d Never Believe What Windows Is Doing Now (email#0 to young mr. B.Gates)
Dear Bill, I know you just start Microsoft, but you wouldn’t believe where Windows has ended up. It’s 2025, and Microsoft just dropped Windows 11 25H2. Relax — they didn’t reinvent the wheel again, just polished the spokes and painted the logo shinier blue. It’s the kind of update that arrives quietly, fixes a few…
Azure Leaderboard 2025: The Unsung Heroes of Microsoft Q&A
Every month, Microsoft quietly refreshes its Azure Leaderboard — a neat little Hall of Fame for people who spend their nights fixing strangers’ Azure problems before their own servers crash. It’s not a marketing stunt and it’s not a paid gig. It’s pure community obsession.And only non-Microsoft contributors qualify — the die-hard enthusiasts who keep…
Embedded HSMs in the Cloud? Yes, Microsoft Just Went There
TL;DR: Microsoft is moving from centralised HSM clusters to embedded hardware modules built straight into the host silicon. Lower latency, higher throughput, and a new level of “I actually own my keys” confidence. It’s a big shift — for engineers, not marketers. 1. Hook You thought your keys were safe in the cloud? Think again….