You can customize SharePoint custom list, task list, issues log, list of announcements or a document library.
Group by feature is handy when having lots of metadata columns.
You have 2 dynamic filters present in SharePoint lists and libraries.
• Me – This will filters on a person field depends on the current user logged in
• Today – This will filters date field depends on today’s date
Some scenarios where you might be benefited from the dynamic filters above:
Upload button is the most basic option, which is on the library.
Option 2: Drag and Drop
You will find a new feature called Drag and Drop in SharePoint Online or SharePoint 2013.
This helps you to skip a step by saving the documents to the desktop instead, you can directly save them to SharePoint.
Below are the steps you should follow:
You will see a window that pops up; paste the URL of the SharePoint Site in the address window.
Bringing together the various perspectives and a variety of experiences, collaboration can bring out new products, new services and in turn new ways to increase the profit and drive revenue.
If the last few years Microsoft Office 365 has undergone various redesigning to emphasize team collaboration by incorporating cloud computing into various application.
No other platform epitomizes this concept more than the SharePoint
When deployed as a part of Office 365, SharePoint creates a virtual workplace feel where the employees can meet, collaborate and complete tasks.
Here are five different ways how SharePoint can help the teams to collaborate in a modern enterprise setting.
The primary feature of Microsoft SharePoint is its exclusivity.
Now get a load of QOP
DEF CON At the DEF CON hacking conference in Las Vegas on Saturday, infosec gurus from Check Point are scheduled to describe a technique for exploiting SQLite, a database used in applications across every major desktop and mobile operating system, to gain arbitrary code execution.
In a technical summary provided to The Register ahead of their presentation, Check Point's Omer Gull sets out how he and his colleague Omri Herscovici developed techniques referred to as Query Hijacking and Query Oriented Programming, in order to execute malicious code on a system.
Query Oriented Programming is similar in a way to return oriented programming in that it relies on assembling malicious code from blocks of CPU instructions in a program's RAM.
The difference is that QOP is done with SQL queries.
SQLite is built into all sorts of things, from web browsers to embedded devices to Android, Windows, iOS, various BSDs, and commercial software.