M365 Show Podcast

Mirko Peters

Welcome to the M365 Show — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365 Show brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

  1. Stop Feeding Copilot Lies: The IA Blueprint

    قبل ٤ ساعات

    Stop Feeding Copilot Lies: The IA Blueprint

    Your AI isn’t broken — your information architecture is. In this cinematic, noir-style deep dive, we explore why Microsoft 365 Copilot delivers inconsistent answers, why search feels haunted, and why users keep wandering your intranet like detectives without a map. The truth is simple: AI mirrors the system it’s born into, and most intranets are cities built without streets. If your search is noisy, your hubs are sprawling, and Copilot keeps “guessing,” this episode is your blueprint for fixing it. Episode Summary AI accuracy isn’t an AI problem — it’s an IA problem. This episode walks you through the digital city of your tenant and exposes the patterns that break Copilot’s grounding: overshared sites, metadata deserts, hub sprawl, navigation loops, and content with no authority. We break down: Why structure determines what Copilot can retrieveWhy semantics determine whether it understands meaningWhy governance determines whether you can trust the outcomeAnd we explore real “case files” pulled from the field — from leaky permissions to policy libraries with no fingerprints. Cold Open — The City Breathes in Static A noir introduction that sets the tone: rain, humming servers, flickering monitors, and an AI that “stopped making sense.” But the AI isn’t confused — the intranet is. Pages drift. Metadata vanishes. Search tightens its filters. Users wander through loops. And the detective (you) is called in to diagnose the rot. The Real Problem — A City Without Streets An intranet without Information Architecture is a city without: StreetsDistrictsSignsNamesPages multiply. Navigation collapses. Search thresholds rise. Content gets crawled but never indexed. Users think the AI is failing, but in truth: ✔️ The index can’t trust your content ✔️ Copilot can’t ground its answers ✔️ Stale and duplicate pages become “ghosts” ✔️ Drift destroys authority and structure This section explains why chaos in IA always becomes chaos in AI. What Information Architecture Really Is — The Skeleton Under Neon IA isn’t design fluff. It’s physics. It defines the shape of your digital city: Structure Clear site hierarchyPurposeful hubsHonest library boundariesNavigation that reflects realitySemantics Labels that match human languageContent types that assign meaningTerm Store taxonomies that unify vocabularyMetadata as fingerprintsRelationships Pages linked by purpose, not whimNavigation that tells the truthNo dead ends, no loops, no blind alleysWhen the structure fits the content, the index breathes — and Copilot grounds. Why IA Matters for AI — Stop Feeding Copilot Lies Most teams think prompt engineering will fix AI mistakes. But prompts are just flashlights. IA is the map. In this section, we break down how Copilot actually works: It follows hub boundariesIt respects content types and metadataIt ranks authoritative documents firstIt depends on clean page structure to parse meaningIt amplifies your search schema — good or badIf your IA is weak, Copilot doesn’t hallucinate — it guesses. And guesses feel like lies. Case File I — Overshared Sites: Doors Unlocked in the Dark A collaboration site left open. Anonymous links that never died. Guests walking hallways uninvited. And Copilot, following signals, pulling content it should never have touched. This section covers: How oversharing corrupts AI groundingWhy search exposes permissions flawsHow to fix your sharing postureHow SharePoint Advanced Management becomes the detective bureauWalls matter. AI respects them if you build them. Case File II — Metadata Deserts: A Library Without Names A policy library with: No content typesNo metadataNo ownersSix “final” copiesFilenames that lieCopilot couldn’t find the source of truth because nothing declared itself as truth. This section explains: Why metadata is the legal system of your intranetHow classifiers can auto-assign types and fieldsHow search ranking boosts sources of recordWhy authority collapses without lifecycle governanceMetadata isn’t busywork — it’s evidence. Case File III — Hub Sprawl & Broken Navigation: A Map Drawn by Ghosts Departments built hubs like neighborhoods built by ghosts: Duplicate “Resources” pagesEndless loopsRedundant nav labelsNo highways connecting districtsCopilot followed the broken map and stitched answers from the wrong districts. This section teaches: How to design a small, intentional hub hierarchyHow to build global navigation with integrityHow to scope search and Copilot retrievalHow to eliminate legacy ghosts and navigation rotWhen the map is honest, AI walks straight. The Blueprint — Build the Digital City for AI Three chapters. In this exact order. 1. Structure: Define the Districts Enterprise hubFunctional hubsRegional/Product hubsGlobal navigationPurposeful libraries2. Semantics: Name the Inhabitants Content types with fields that matterHuman labelsA unified Term StoreMetadata automation & classifiersSearch schema aligned to IA3. Governance: Keep the Streets Lit Clear permissionsSensitivity labelsLifecycle policiesPage templatesSearch health monitoringThis is the true foundation of Copilot accuracy. Viva Connections — Downtown, Where Paths Converge Viva Connections becomes the front door to the city: Personalized dashboardAdaptive cards as task kiosksGlobal nav that follows youScoped search verticalsAudience-targeted newsPermissions-aware surfacingWhen downtown is clean, users stop wandering. And Copilot grounds itself in what users actually see. The Copilot Grounding Checklist — Case Resolution A practical, repeatable checklist teams can use to audit their tenant: Scope retrieval to hubsEnforce content typesLock the Term StoreApply metadata automaticallyWire search schema correctlyStandardize page patterns Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٣٢ من الدقائق
  2. Copilot's Data Blindness: The Custom Agent Fix

    قبل ١٦ ساعة

    Copilot's Data Blindness: The Custom Agent Fix

    (00:00:00) Copilot's Blindness and the Solution (00:00:35) The Limitations of Out-of-the-Box Copilot (00:01:35) Grounding Copilot with Knowledge and Tools (00:03:12) Building a Custom Agent in Copilot Studio (00:04:10) Configuring Tools and Orchestration Rules (00:06:50) Implementing Governance and Safety Measures (00:08:11) Toolkit for VS Code: Surgical Precision (00:09:01) Implementing the Plugin and Function (00:14:20) Pairing Studio with Toolkit for Best Results (00:18:10) Licensing and Security Considerations Microsoft 365 Copilot doesn’t know your business—it only knows the tiny slice of your work graph it can see. Outlook threads. Teams chats. SharePoint files. That’s it. No Salesforce. No ServiceNow. No proprietary APIs. No pipeline. No incidents. No truth. In this episode, you’ll learn why Copilot is blind by default—and how to give it sight by building a custom enterprise agent grounded on your real systems with governed identity, audited actions, and end-to-end visibility. We walk step-by-step through Copilot Studio and Teams Toolkit for VS Code to show how low-code and pro-dev combine into a single strategy: controlled access, precise tooling, and zero hallucination. By the end, you’ll know exactly how to build an agent that sees, reasons, acts—and obeys your rules. What You’ll Learn 🔍 Why Copilot Is Blind Out of the Box Copilot only “sees” Microsoft 365: email, chat, files.External systems—Salesforce, ServiceNow, internal APIs—are invisible without explicit access.Blindness leads to hallucinations, incorrect summaries, and missing insights.🧠 The Architecture Behind Visibility Copilot doesn’t “understand”—it fetches through approved paths.You control vision through:Knowledge sources (SharePoint libraries, internal docs, public URLs)Tools (connectors, actions, APIs)No token = no access.No grounding = no truth.Path 1: Copilot Studio — Declarative Agents for Fast Enterprise Wiring Build an agent that: Grounds itself on Salesforce, ServiceNow, and internal APIsCites sourcesRefuses to guessAudits every tool callObeys DLP and identity boundariesWhat we configure: Identity & instructionsPrioritized knowledgeSalesforce & ServiceNow connectorsA governed custom REST API toolTool orchestration rules (renewal → Salesforce; ticket → ServiceNow; limits → API)Clarifying-question logic for ambiguityGuardrails: PII masking, policy refusal, “ask before answer” when confidence is lowThe result? A governed, predictable, enterprise-safe agent that never hallucinates and never wanders. Path 2: Teams Toolkit for VS Code — Pro-Dev Precision and Control When you need: Strict input validationCustom schemasConditional Access enforcementLow-latency backend executionCaching, retries, and SLA-aware designWhat you build: A Copilot plugin with OpenAPI specHandlers that call Salesforce, ServiceNow, and internal endpointsNormalized JSON responses with minimal projectionsPolicy-aware middlewareCorrelation-ID loggingAzure deployment with Managed Identity + Key VaultThe result? A hardened, auditable capability Copilot can call with total reliability. Studio vs Toolkit: When to Use Which Use Studio → fast wiring, governed orchestration, citations, maker-friendly maintenanceUse Toolkit → strict logic, enterprise constraints, custom schemas, performance-sensitive actionsUse both together → Studio orchestrates; Toolkit executes the truthThis hybrid pattern is the enterprise sweet spot. Enterprise Constraints That Can Break Your Build Licensing for Copilot, Studio, and premium connectorsAdmin approvals for OAuth apps and connectorsDLP policies blocking external systemsConditional Access restrictionsData residency limitationsLeast-privilege scoping for Salesforce/ServiceNow/APILogging, audit, and governance requirementsIgnore these… and your demo fails live. Step-by-Step: Build Your First Enterprise Agent We walk through: Creating the agent in StudioHardening instructionsAdding and ranking knowledgeWiring Salesforce, ServiceNow, and internal API toolsSetting orchestration and confidence rulesTesting Activity Map flowsEnabling audit, DLP, permissionsPublishing to a pilot groupAnd yes—we show the mistakes most teams make and how to avoid them. Key Takeaways Copilot doesn’t know. It fetches.Vision comes from the paths you approve.Studio gives you the blueprint.Toolkit gives you the precision.Together, they turn a blind assistant into a governed enterprise agent with real sight. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٢٥ من الدقائق
  3. The Intranet Is A Lie: Why AI Cannot Fix Your SharePoint Sprawl

    قبل يوم واحد

    The Intranet Is A Lie: Why AI Cannot Fix Your SharePoint Sprawl

    (00:00:00) The Silent Internet (00:00:13) AI's Blindness to Messy Data (00:01:11) The Walled Garden and Its Limitations (00:03:23) The First Creature: Permission Drift (00:10:29) The Second Creature: Orphaned Teams (00:15:43) The Third Creature: Rotting Data (00:20:20) The Fourth Creature: Shadow Sites (00:24:42) The Fifth Creature: Hallucinations (00:28:59) The Governance Ritual (00:37:44) Call to Action and Next Episode Preview Your intranet’s silence is not peace—it’s warning. In this episode, we uncover why AI tools like Microsoft 365 Copilot, search, and enterprise agents don’t read your intentions… they read your residue: broken permissions, ROT data, orphaned Teams, shadow sites, and a sprawl that’s been quietly expanding for years. You’ll learn the five governance binds—Information Architecture, Lifecycle, Sensitivity Labels, DLP, and Retention—and why your AI will hallucinate until these foundations are clean. Through vivid metaphors, real admin stories, and before/after Copilot examples, this episode reveals how to stop your digital workplace from lying to you. What You’ll Learn in This Episode 1. Why AI Reflects Your Mess, Not Your Mind AI grounds answers in whatever SharePoint, OneDrive, Teams, and Outlook expose.Outdated PDFs, drafts buried in deep folders, and mislabeled content create confident but incorrect responses.Clashing permissions cause Copilot to miss the “real” document entirely.2. The Lie of the Intranet Your intranet isn’t a garden—it’s an archive that remembers every bad choice.Overly complex metadata drives users back to folder chaos, causing ROT data to multiply.External systems (Confluence, Jira, Google Drive) remain invisible to AI, creating gaps the model tries to “fill.”Meet the Four Creatures Hiding in Your SharePoint Creature One: Permission Drift — Doors That Open Themselves How inherited permissions break quietly over years.Nested groups and old guest accounts create shadow access.The fix: “Who can access?” vs. “Who should?”—run the diff and close the cracks.Creature Two: Orphaned Teams — Rooms With No Stewards Teams with no owners remain active through connectors and bots.Inactive ≠ safe. Sync paths, guests, and flows keep leaking information.A 90-day activity audit and required two-owner model restores stewardship.Creature Three: ROT Data — The Fog That Feeds Hallucinations Duplicate versions, “Final_v7,” outdated copies… this is Copilot’s swamp.ROT hides the authoritative source and buries search precision.Use content inventory, duplicate detection, lifecycle rules, and sane metadata.Creature Four: Shadow Sites — Strays Wandering From the Cold Unmapped subsites and microsites confuse search ranking and user trust.Content sprawl creates parallel truths.Hub-and-spoke IA, naming conventions, and required purpose fields bring strays home.The Hallucination: When Copilot Wears Your Face Hallucinations happen when the model is working in the dark.Over-restriction starves grounding; over-permissiveness floods it.Measure:Citation PrecisionAnswer VarianceAccess MismatchCleaning the ground—not tweaking prompts—reduces hallucinations. The Five Governance Binds That Hold the House Together 1. Lean Information Architecture Hubs as anchors.Two required fields: Purpose + Content Type.Content types named in human language: Policy, SOP, Record, Reference, Working Doc.2. Lifecycle Management Create → Attest → Archive → DisposeOwners confirm purpose, labels, guests, and connectors every 180 days.3. Sensitivity Labels Labels as circuits, not stickers.They enforce sharing rules, indexing rules, and inheritance across the structure.4. Data Loss Prevention (DLP) Controls at the exit points: alerts, blocks, business-justified overrides.Protects against accidental exfiltration—not just malicious actors.5. Retention Time as governance.Working (30 days), Reference (180 days), Records (7+ years).Disposition reviews create audit-ready evidence.Real Admin Stories A policy hidden behind broken permission inheritance caused Copilot to cite a 2019 PDF.After IA cleanup, collapsing inheritance, and aligning labels—same prompt, new accurate citations.Clearing ROT reduced a 12-result search page down to 2 authoritative results.Orphaned Teams with active connectors leaked logs until the room was archived.Immediate Actions (Do These Before Turning On More AI) Run a permissions diff on your top five hubs.Disable ad-hoc item links on all Confidential and above labels.Enforce two owners per Team/Site with 180-day attestation.Publish two required metadata fields: Purpose + Content Type.Apply default retention to your three highest-volume libraries.Archive one orphaned Team end-to-end and measure the Copilot improvement. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٣٨ من الدقائق
  4. Stop Building Apps in Teams: It's the SharePoint Graveyard All Over Again

    قبل يوم واحد

    Stop Building Apps in Teams: It's the SharePoint Graveyard All Over Again

    (00:00:00) Stop Building Apps in Teams (00:00:34) The ACE Trap: Quick Wins and Long-Term Consequences (00:05:27) The Five Governance Failures of ACEs (00:11:43) Reference Architecture for Governed ACEs (00:17:18) The Decision Tree for ACE Approval (00:21:19) The Governance Checklist for ACEs (00:25:24) Final Thoughts and Call to Action Stop building apps in Teams. You already feel it: Teams is becoming the new SharePoint graveyard — same chaos, better emojis. “Quick” Adaptive Card Extensions (ACEs) seem harmless, but they quietly create a compliance landfill while leaving your Viva dashboard full of orphaned cards. In this episode, you’ll learn: Why SPFx ACEs rot fast even when they “work”The five governance failures that always appearA reference architecture that doesn’t implodeA decision tree to say “no” without being the villainA checklist you can deploy today to stop dashboard decayBy the end, you’ll know exactly how to use SharePoint, Viva, and Power Platform the right way — with real ALM, strong governance, and fewer 2 a.m. incidents. 💀 The ACE Trap: Why “Quick Apps” Become Long-Term Risk “Just a SharePoint list.” “Just JSON.” “Just a rotating announcement.” That’s the trap. ACEs demo beautifully but age like milk because: They hide logic in lists with no versioningThey have no built-in lifecycle or ownership trackingThey surface unlabeled or unmanaged content in TeamsThey multiply unpredictably across departmentsThey store schema in places with no governance guardrailsThe result? A sprawl of cards, ghost owners, inconsistent schemas, broken automations, and compliance gaps that leaders find after the screenshot goes viral. ⚠️ The Five Governance Failures (You See Them Every Time) 1. App Sprawl Every team builds “their” card. No portfolio view. No prioritization. The dashboard becomes a digital flea market. 2. Orphaned Owners The contractor leaves. The card doesn’t. Nobody knows who maintains it, updates it, or sunsets it. 3. Data Silos Each ACE uses its own schema and its own list. Analytics break, consistency dies, and schema drift becomes inevitable. 4. Compliance Gaps Content appears in Teams mobile without labels, retention, or DLP. Broadcast channel + unmanaged data = a quiet compliance nightmare. 5. Broken Lifecycle No expiry. No archiving. No governance. Stale outage notices and forgotten campaigns haunt your dashboard forever. Each failure compounds. Together, they recreate SharePoint 2013 chaos — except now it’s pushed directly to everyone’s pocket. 🏗️ The Reference Architecture That Doesn’t Rot The fix is simple but non-negotiable: ✔ Treat the ACE as a skin — not an application. All business logic, schema, and lifecycle live below the card in governed systems. Layers that keep you clean: Governed data storage (SharePoint content types or Dataverse tables)Canonical content contracts (Announcement, Event, Alert)Proper ALM via SPFx repo + CI/CD + non-production environmentsPurview labels + retention at the data layer, not the cardDLP enforcement on the content sourcePlacement governance (slots, schedules, expiration rules)Telemetry + monitoring so failing cards are automatically pulledThe ACE renders; the platform governs. 🧭 The Decision Tree: Block or Allow That Teams App This is how you say “no” with receipts: Is there a governed data contract? If not → BLOCK.Is the data stored in a labeled, retention-enabled site/table? If not → BLOCK until migrated.Are there two named owners? If not → BLOCK.Does the ACE write data? If yes → MOVE to Power Apps or web app.Is there a placement record + expiry? If not → BLOCK.Are Purview/DLP requirements met? If not → BLOCK.Is there telemetry + rollback? If not → BLOCK.If all green → limited rollout → then expand after a clean telemetry window. 📋 Governance Checklist (Fast, Brutal, Effective) Run this at intake, pre-prod, and quarterly reviews: Catalog entry existsTwo owners assignedContract schema validatedGoverned data store onlyRead-only verifiedPlacement scoping + expiryLabels + retention enforcedTelemetry wiredNo manual package deploymentsAccessibility + localization compliantRollback plan readyNo duplicates in the portfolioFail two items? Freeze deployment. 🏁 The One Rule That Saves You The ACE is a skin. Govern everything under it — not inside it. Stick to that rule and your dashboard stays clean. Break it, and you’re rebuilding SharePoint’s graveyard one card at a time. 📣 CTA Want the full governance kit — checklist PDF, architecture diagram, and the ACE decision tree? Subscribe and watch the next episode, where we rebuild a real ACE the right way and show how to avoid the rot from day one. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٢٦ من الدقائق
  5. AI Agents Are The New Shadow IT

    قبل يومين

    AI Agents Are The New Shadow IT

    (00:00:00) The Shadow in the Machine (00:00:24) The Rise of Shadow Agents (00:00:31) The Mess We've Created (00:01:09) The Hidden Dangers of Unmanaged Agents (00:02:01) The True Cost of Shadow Data (00:04:00) The Case for Governed Agents (00:07:05) The Real-World Impact of Poor Agent Management (00:10:39) The Blueprint for Governed Agents (00:10:48) The Importance of Identity and Least Privilege (00:12:17) Data Protection and Monitoring Shadow IT didn’t die — it automated. Your “helpful” agents are quietly moving data like interns with keys to the vault, while you assume Purview, Entra, and Copilot Studio have you covered. Spoiler: they don’t. In this episode, we expose how agents become Shadow IT 2.0, why delegated Graph permissions blow open your attack surface, and how to redesign your governance before something breaks silently at 2 a.m. Stay to the end for the single policy map that cuts agent blast radius in half — and a risk scoring rubric you can deploy this month. 🧨 The Mess: How Agents Become Shadow IT 2.0 Business urgency + IT backlog = bots stitched together with broad Graph scopes.Agents impersonate humans, bypass conditional access, and run with rights no one remembers granting.Browser-based tools and MCP bridges create hidden exfil paths your legacy allowlist can’t see.Overshared SharePoint data fuels “leakage by summarization.”Third-party endpoints mask destinations, leaving you blind during incidents.Result: autonomous smuggling tunnels disguised as productivity. 💡 The Case For Agents (When They’re Built Right) Agents crush toil when: They have narrow scope and clear triggersThey run under Entra Agent ID, not a humanThey operate on labeled data with Purview DLP enforcing the boundariesThey’re monitored with runtime visibility via Global Secure AccessThey live inside solution-aware Power Automate environmentsDone right, agents behave like reliable junior staff — fast, predictable, auditable. ⚠️ The Case Against Agents (How They Break in Real Life) Delegated Graph becomes “tenant-wide read.”Shadow data in old SharePoint sites surfaces through Copilot.Unmanaged browsers ignore DLP entirely.Zombie flows run without owners.Third-party connectors hide egress, killing investigations.No access reviews = identity drift.Every one of these expands your blast radius — silently. 🏗️ Reference Architecture: Governed Agents on Microsoft 365 Your governed stack should include: Identity Every agent gets an Entra Agent IDBlueprint-based permissionsConditional access per agent typeAutomatic disable on sponsor departurePermissions Graph app roles, not delegatedSharePoint access scoped to named sitesExplicit connector allow/deny listsData Purview auto-labelingEndpoint + browser DLP for AI/chat domainsEncryption-required labels for sensitive dataNetwork Global Secure AccessURL/API allowlistsMCP server controlsLifecycle Solution-based ALMQuarterly access reviewsDeprovision on inactivityThis is the skeleton you operate — not duct tape. 🛠️ Operational Playbook: Policies, Auditing & Incident Flow Inventory all agents + connectors weeklyEnforce a registry-first modelPeer-review flows before promotionManaged solutions in test + prodDLP, SIEM, and Insider Risk integratedDefined incident flow: triage → isolate → revoke → postmortemNo more “we discovered the blast radius after the blast.” 🔥 Risk Scoring Rubric (0–30) Score agents across: IdentityData classificationPermissionsNetwork controlsMonitoringLifecycle governance0–8: High risk — fix now 9–16: Medium — 30-day sprint 17–25: Low 26–30: Model agent — template it Numbers end arguments. ⚡ Counterpoints & Rebuttals “This slows innovation.” → Blueprints make it faster.“Delegated Graph is simpler.” → So is leaving the server room open.“Network inspection breaks agents.” → Only the brittle ones.“Users route around controls.” → Endpoint DLP meets them where they work.Smart friction beats catastrophic friction. 🏁 Conclusion Agents aren’t the threat — unaccountable access is. The three bolts that keep the wheels on: IdentityLabelsLeast privilegeDo these next: Create your first 3 agent blueprintsPush DLP to endpoints & browsersRun the risk scoring rubric on your top 10 agentsSubscribe for the next episode where we tear down a real agent and rebuild it the right way. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٢٤ من الدقائق
  6. Your Power App Is A Lie

    قبل يومين

    Your Power App Is A Lie

    (00:00:00) The Fragility of Power Apps (00:00:04) The Hidden Dangers of Low-Code Development (00:00:29) The Anatomy of App Failure (00:01:09) The Silent Killers of App Performance (00:02:35) The Cycle of Patching and Drift (00:04:13) Mapping the App's Dependency Graph (00:08:13) The Power of Local Truth and Guardrails (00:13:42) Components and Contracts: Building Scalable Apps (00:18:18) The Importance of Governance and Testing (00:22:57) Implementing a Refactor Plan and Governance Template Your Power App works—until it doesn’t. No error. No warning. Just silence. Low-code wasn’t sold as “fragile,” but that’s exactly what you get when you copy-paste formulas, skip environments, and bury dependencies where no one can see them. In this episode, we expose why Power Apps fail without telling you, where the fractures hide, and the one local-scope pattern (With) that stops the bleed. By the end, you’ll know how to restructure your screens, components, and ALM so drift disappears and reliability becomes predictable. Section 1 — The Anatomy of Fragility: Why Your App Actually Fails Power Apps don’t break loudly—they degrade quietly. You only notice after users complain, “It just spins.” Common Failure Modes Formula Drift: Copy-pasted logic across screens evolves separately and silently diverges.No Environment Boundary: Studio “Play” ≠ testing. Dev changes leak into prod instantly.Hidden Dependencies: Collections, globals, and shadow connectors impersonating your identity.Token Thinking: “It worked once” becomes your QA strategy until a schema rename destroys everything.Identity Drift: Permissions become patchwork; app sharing turns into chaos.Delegation Traps: Search, In, StartsWith—harmless at 500 rows, catastrophic at 50,000.Latency Creep: Dataverse + SharePoint joins push work client-side and burn your performance budget.Silent Error Swallowing: Patch failures vanish into thin air; users double-submit and duplicate rows explode.The Real Pattern Every Power Apps failure is a broken contract: Screen → Control → Formula → Data → Permission. When no contract exists, drift fills the vacuum. Section 2 — Forensics: Tracing the Access Paths & Failure Modes You can’t fix an app you can’t see. This section teaches you to run forensic discovery like an engineer—not a guesser. Forensic Steps Map critical flows (Submit, Approve, Report).Inventory every dependency: tables, connectors, roles, variables, component props.Surface invisible state: every Set, UpdateContext, Collect, and App.OnStart cache.Diff formulas: normalize and hash to reveal divergence across screens.Build the dependency graph: see where trust, data, and identity assumptions connect.Rehearse failure: throttle connectors, rename fields, expire tokens, break a flow connection.Define your health model: clear red/yellow/green thresholds for your top user paths.Instrument telemetry: correlation IDs, durations, outcomes, without PII.This is where ghosts lose power—because you finally see them. Section 3 — The Fix Starts Local: With() as the Guardrail The turning point. With() introduces local scope, single truth, named intent, and eliminates formula drift. Why With() Works Containment: No global side effects.Clarity: Input → Transform → Payload → Output.Predictability: One exit path, memoized work, no duplicated logic.Performance: Heavy calls cached once, not recalculated per row.Safety: Schema coercion and type normalization happen in one place.Patterns You’ll Learn Build query models inside With() blocksConstruct patch payloads with explicit typesRoute all success/failure through a single result objectMemoize expensive transforms for stable performanceGuard inputs to prevent delegation failuresWhen a screen stabilizes under With(), everything else becomes possible: components, ALM, reuse. Section 4 — Beyond the Screen: Components, UDFs & Enhanced Component Properties Scalability begins when you stop cloning screens and start shipping contracts. Component Rules No globalsExplicit inputs/outputsLogic passed through ECP behavior slotsNo hidden connector callsNo host-assumed variablesTheme applied through tokens—not hex codes inside controlsUDFs (User Defined Functions) Use them for: Model normalizationType coercionPayload constructionTelemetry formattingGuard checksAvoid them for: Side effectsHidden connector callsGlobal state mutationTogether, Components + UDFs give you repeatable, enforceable patterns across apps. Section 5 — Real ALM: Solutions, Branches & Safe Releases This is where hobby apps become software. ALM Requirements Solutions-only for Test & ProdThree environments: Dev → Test → ProdBranches for all changesPR reviews with formula diffs, delegation checks, and accessibility lintConnection references instead of personal connectionsEnvironment variables for URLs, endpoints, flagsPipelines enforcing import, smoke tests, and approvalsRollback paths with versioned managed solutionsDev is messy. Prod is sacred. Solutions are the boundary. Section 6 — Proof Under Stress: Testing, Monitoring & Controlled Chaos Resilience isn’t proven on happy paths. You’ll Learn to Test UDF-level assertionsComponent harness screensSynthetic E2E flowsToken expiry drillsSchema rename simulationsThrottling scenariosConnectivity chaosA Power App that survives this will survive in production. Section 7 — The Refactor Plan A practical, step-by-step playbook to stabilize any Power App: Inventory screens, variables, connectorsIdentify driftReplace global logic with With()Extract componentsIntroduce UDFsAdopt theme tokensMove into solutionsAdd pipelines & checksAdd monitoring & SLOsEnforce governanceThis plan turns chaos into clarity. Section 8 — Governance Template: Rules That Make Failure Rare Governance isn’t bureaucracy—it’s guardrails that prevent midnight outages. The Rules: Naming by scope: app., scn., cmp., fn.With() for any formula > 2 linesNo Set() or globals inside componentsNo copy-paste formulas across screensDelegation-aware queries onlyTelemetry on all critical pathsManaged solutions only in Test/ProdNo personal connections—everPR checklist required for every changeMonitoring dashboards mandatoryThis is how you make failure rare, predictable, and reversible. Conclusion + CTA Your Power App doesn’t fail because it’s low-code; it fails because it’s ungoverned. Scope your formulas with With(), encapsulate truth into components, move into solutions, and validate everything under stress. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٢٦ من الدقائق
  7. STOP Using Power BI Themes That Lie

    قبل ٣ أيام

    STOP Using Power BI Themes That Lie

    (00:00:00) The Power of Theme in Power BI (00:00:00) The Hidden Dangers of Color Themes (00:00:18) The Five Invisible Failures (00:00:37) Contrast: The First Line of Defense (00:01:11) The Four Laws of Contrast (00:01:59) Redundancy: The Secret to Visibility (00:02:23) The Containment Procedure for Alerts (00:04:57) The Matrix Matrix: Subtotals in Disguise (00:06:17) The Subtotal Containment Protocol (00:09:40) Tooltips: The Hover Hazard Most creators treat Power BI themes as “brand colors,” but those hues can bury alerts, erase subtotals, distort slicer states, and hide KPIs in plain sight. This episode exposes five invisible theme failures and delivers a ruthless, pass/fail validation protocol to guarantee clarity, accuracy, and accessibility across any report. 1. The Accessibility Reactor — Contrast for Alerts Is Failing Your alerts aren’t “subtle”—they’re disappearing. Low contrast turns KPIs into decorative noise. Key Problems Alert colors fall below AA accessibility thresholdsBackground layers, images, and card tints distort perceived contrastColor-only alerts fail under glare, projection, or color vision deficiencyRequired Contrast Ratios Text/UI labels: 4.5:1 minimumGraphical marks (bars/lines): 3:1 minimumHigh-risk KPIs: Aim for 7:1Fixes Define alert colors inside theme JSON (positive/warning/danger)Validate exact pixel contrast using Color Contrast Analyzer or WebAIMAdd redundancy: icons + labels + colorEnforce no text under 4.5:1, everStrengthen line/grid contrast so visuals remain readable in motionResult Instantly recognizable alerts, reduced cognitive load, and faster decision-making. 2. Matrix Subtotal Leak — Aggregates Are Camouflaged Subtotals and grand totals often look identical to detail rows, causing executives to miss critical rollups. Symptoms Equal weight and color between detail rows and subtotalsZebra striping or drill indents misleading the eyeTotals disappearing at 80% zoomFixes Explicitly style subtotal + total selectors in theme JSONAdd background bands, stronger text weight, and a divider lineEnsure totals meet 3:1 contrast (4.5:1 for grand totals)Right-align numbers, reduce noise, and clarify unitsPass/Fail Protocol Subtotals identifiable in 1 second at 80% zoomDivider visibly separates detail vs. aggregateNo conditional formatting overriding subtotal visibility3. Tooltip Chaos Plasma — Hover Context Lost Translucent tooltips, low-contrast text, and inconsistent styles create confusion at the exact moment users seek clarity. Common Failures Header and value tones too faintPane transparency letting chart noise bleed throughReport page tooltips violating contrast rulesTooltip DAX slowing the interactionFixes Set tooltip title/value/background styles in theme JSONEnforce 4.5:1 contrast on all tooltip textUse opaque backgrounds with visible shadowsKeep tooltip content minimal and high-signalOptimize queries for sub-150ms renderingPass/Fail Legible over dense visualsTitle/value hierarchy obvious in 0.5sNo KPI name truncationNo background noise leaking through4. Card Visual Uranium — Hierarchy Out of Control Card visuals carry enormous perceptual weight. Without governance, they become mismatched, chaotic, and misleading. Common Issues Inconsistent font sizes across pagesLabels and values using identical weightPoor contrast or ghost-gray labelsTruncated numbers and wrapping textKPIs relying solely on color to indicate stateFixes Lock font sizes, families, and value:label ratio (1.8–2.2x)Enforce 4.5:1 contrast for both label & valueStandardize number formats (K/M/B, decimals)Align cards across the grid for visual rhythmConstrain width to prevent sprawl or wrappingPass/Fail Instant distinction between value and labelNo wrapping/overflowNo card deviates from governed style5. Slicer State Deception — Selected vs. Unselected Lies If users can’t tell what filters are applied, the entire report becomes untrustworthy. Common Failures Selected, unselected, hover, and disabled states look nearly identicalDate range chips unclearNo redundant checkmarks or iconsHidden reset/filter summaryFixes Define all four states explicitly in theme JSONUnselected: neutralSelected: strong tint + high-contrast textHover: outline/elevation, not mimicryDisabled: desaturated but still readableAdd checkmarks or icons for state redundancyInclude a clear “Reset filters” buttonAdd filter summary text at top of reportEnsure keyboard/screen reader accessibilityPass/Fail State recognizable at 3 feetAll text/icon contrast ≥4.5:1Reset discoverable instantlyHover never impersonates selectedThe Validation Protocol — The Ultimate Governance System 1. Build the Validation Report A single PBIX with: Cards, KPIsMatrix (deep hierarchy)Line/column visuals with gridlinesAll slicer typesTooltips (standard & report page)Light & dark backgroundsDense background image for stress tests2. Automated Tests Contrast sweep: Pixel-level testing for each FG/BG pairHierarchy audit: Subtotal visibility & one-second recognition testTooltip readability: Background noise, opacity, truncationRender performance: Sub-150ms hover response3. Theme JSON as Controlled Code Validate against schemaStore in Git/Azure DevOps with versioningRequire PR reviews including screenshots + validation PBIXBlock overrides in governed workspaces4. Deployment Workflow Design → Peer Review → Validation Report PASS → PR Approval → Tenant Deployment → Changelog No AA contrast failures permitted. Conclusion Your Power BI theme is not decoration—it’s data truth governance. Get the theme wrong and your visuals lie. Get the containment right and every insight becomes sharper, faster, and undeniable. Call to Action Adopt the validation report. Enforce contrast gates in PR reviews. Move to governed, versioned organizational themes. Subscribe for the upcoming deep-dive: full CI/CD theme governance, automated testing, and organizational deployment. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٢٧ من الدقائق
  8. The Knot in the Cloud - Document Management in Dynamics with M365 (Part 2 - Echoes at the Edge)

    قبل ٣ أيام

    The Knot in the Cloud - Document Management in Dynamics with M365 (Part 2 - Echoes at the Edge)

    (00:00:00) The Power of Auto Labeling (00:00:22) The Nature of Auto Labeling (00:01:04) Setting Up Auto Labeling Systems (00:02:06) The Role of Training and Simulation (00:03:01) The Enforcement and Explainability of Auto Labeling (00:03:36) Copilot: The Witness with Guardrails (00:04:27) The Benefits of Auto Labeling (00:04:52) A Real-World Scenario: Contract Management (00:05:36) The Importance of Governance and Cadence (00:10:02) The Eight Principles of Copilot In Part 1 of our Dark-inspired tech-universe journey, we descend into the shadows where data, memory, and digital architecture begin to blur. This episode sets the stage for an unfolding narrative across timelines—past configurations, present misalignments, and future consequences that loop back on themselves in unexpected ways. We explore how systems behave like the interconnected worlds of Winden: every action has a counterpart, every signal a ghost, every missing event a paradox waiting to be resolved. As we unravel the first thread of the digital knot, we confront questions of identity, origin, and causality inside modern cloud ecosystems. Across multiple segments, we examine the way technical decisions ripple through time—how forgotten settings return like echoes, how automation becomes destiny, and how system failures resemble temporal fractures rather than simple bugs. The conversation moves through dark forests of logic, old databases that refuse to die, and journeys that collapse under their own contradictions. This first chapter is not about solving the mystery—it is about recognizing that the mystery exists. That every log file hides a timeline. That every failed workflow is a loop. That every architectural oversight is a bootstrap paradox waiting to trap us again. Here, at the edge of the digital tunnel, we begin to understand: Nothing is forgotten. Everything is connected. And every journey eventually leads back to its source. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support. Follow us on: LInkedIn Substack

    ٢ س ٤٠ د

حول

Welcome to the M365 Show — your essential podcast for everything Microsoft 365, Azure, and beyond. Join us as we explore the latest developments across Power BI, Power Platform, Microsoft Teams, Viva, Fabric, Purview, Security, and the entire Microsoft ecosystem. Each episode delivers expert insights, real-world use cases, best practices, and interviews with industry leaders to help you stay ahead in the fast-moving world of cloud, collaboration, and data innovation. Whether you're an IT professional, business leader, developer, or data enthusiast, the M365 Show brings the knowledge, trends, and strategies you need to thrive in the modern digital workplace. Tune in, level up, and make the most of everything Microsoft has to offer. Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-show-podcast--6704921/support.

قد يعجبك أيضًا