Select Page
#Microsoft Azure virtual datacenter HUB-Spoke Model: A network perspective #Cloud #Azure #Security

#Microsoft Azure virtual datacenter HUB-Spoke Model: A network perspective #Cloud #Azure #Security

Microsoft Azure HUB-Spoke Model When you have your Microsoft Azure Architectural Design in place like a HUB-Spoke model this Microsoft documentation can help you with the Security and networking design in Microsoft Azure Cloud services. The Virtual Data Center (VDC) ... continue reading
High level diagram of an OpenShift for Windows 2 node cluster deployment

Managing Windows containers with Red Hat OpenShift Container Platform 3.11

Who is the new guy blogging? Before getting into the topic, I wanted to introduce myself. My name is Mike Kostersitz, I am Principal Program Manager and just joined the core networking team in the Cloud and AI organization. I ... continue reading
#Microsoft Azure Hub-Spoke model by Enterprise Design 2 of 4 Lift and Shift #Azure #Hyperv #VMware

#Microsoft Azure Hub-Spoke model by Enterprise Design 2 of 4 Lift and Shift #Azure #Hyperv #VMware

Microsoft Azure Hybrid Cloud Architecture HUB-Spoke Model Microsoft Azure Hub-Spoke model This blogpost about Microsoft Azure Hub-Spoke model by Enterprise Design 2 of 4 “Lift and Shift” is part of a Datacenter transition to Microsoft Azure Intelligent Cloud. It’s talking ... continue reading
Migration from SQL Server to Azure SQL Database Managed Instance

Migration from SQL Server to Azure SQL Database Managed Instance

Today we'll review how you can migrate databases, running on SQL Server, to a new Azure SQL Database Managed Instance. Azure SQL Database Managed Instance (aka "SQL MI") is a new deployment model of Azure SQL Database, providing near 100% ... continue reading
Tick Tock: Time to Dive Deep!

Tick Tock: Time to Dive Deep!

Looking at the Windows Time process and configuration there and back again As last we met, I am Tim Medina Sr PFE with Microsoft and we are coming to a conclusion of our three-part journey in time. First we took ... continue reading
Screenshot of obfuscated script

Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Consider this scenario: Two never-before-seen, heavily obfuscated scripts manage to slip past file-based detection and dynamically load an info-stealing payload into memory. The scripts are part of a social engineering campaign that tricks potential victims into running the scripts, which ... continue reading
Top 10 Networking Features in Windows Server 2019: #1 Container Networking with Kubernetes

Top 10 Networking Features in Windows Server 2019: #1 Container Networking with Kubernetes

Share On: Twitter This blog is part of a series for the Top 10 Networking Features in Windows Server 2019! -- Click HERE to see the other blogs in this series. This concludes our Top 10 List. We hope to ... continue reading

Help! I can’t connect to my SQL Server multi-subnet failover cluster

I get that kind of call or email from customers all the time. I have a generic response as follows… This has everything you need to know. https://docs.microsoft.com/en-us/sql/sql-server/failover-clusters/windows/sql-server-multi-subnet-clustering-sql-server?view=sql-server-2017 They don’t go into great detail about what to do if your ... continue reading
Attack inception: Compromised supply chain within a supply chain poses new risks

Attack inception: Compromised supply chain within a supply chain poses new risks

A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection (Windows Defender ATP) emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the vendor of a PDF editor application and one ... continue reading
Loading...