Filter
Telusuri layanan konsultan
Perbaiki penawaran dengan memilih filter dan menyortir opsi.
Microsoft Dynamics 365 Business Central Learn about the system and implementation stepsInlogicaThe training aims to provide critical information on how to carry out both organizational and financial challenges of implementing Microsoft Dynamics 365 Business Central.
+1
Applicable to:
Business Central
1 out of 60
Resource Management Business Central: 1-Hr AssessNew Technology ResearchReview Resource Management in Microsoft Business Central
+1
Applicable to:
Business Central
2 out of 60
Technicians in Business Central: 1-Hr AssessmentNew Technology ResearchYou will get a clear understanding of how your Technicians will use Microsoft Dynamics Business Central when out in the field on a project.
+1
Applicable to:
Business Central
3 out of 60
Securing Identities: 3 Days WorkshopINOVASYS FOR SYSTEMSMicrosoft funded Securing Identities is a workshop designed to assist Microsoft clients in getting the most out of their investment in Microsoft services.
+1
Applicable to:
Identity & Access Management
4 out of 60
System Access Request App: 3-Wk ImplementationAxxend CorporationA system designed to streamline an organization's resource allocation
+1
Applicable to:
Power Apps
5 out of 60
Best Practices Power BI: 1-Day WorkshopINKUBIT Business Solutions GmbHBest Practices - Power BI Dashboard in a Day (DiaD)
+1
Applicable to:
Power BI apps
6 out of 60
HR Support Chatbot: 3-Wk Proof of Concept.iSystemzChatbot answers FAQ, helps employees to get neccessary paper or scanned copies, get money compensations, etc.
+1
Applicable to:
Teams Custom Solutions
7 out of 60
threatscape_csi_engagementsTHREATSCAPE SECURITY SOLUTIONS LIMITEDThreatscape offers four security workshops through the Cybersecurity Incentives Program (CSI), providing product insights and next-step recommendations.
+1
Applicable to:
Threat Protection
8 out of 60
Systex Security Service Powered by Microsoft精诚(中国)企业管理有限公司
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection