Select Page
a block diagram depicting the componets and their layers and relationship based on the table above

Networking in Red Hat OpenShift for Windows

Hello again, Today we will be drilling into a more complex topic following the introduction to Red Hat OpenShift for Windows on premises two weeks ago. We will expand into the networking layer of the architecture that we have chosen ... continue reading

Get up to speed with Azure HDInsight: The comprehensive guide

Azure HDInsight is an easy, cost-effective, enterprise-grade service for open source analytics. With HDInsight, you get managed clusters for various Apache big data technologies, such as Spark, MapReduce, Kafka, Hive, HBase, Storm and ML Services backed by a 99.9% SLA ... continue reading
Resiliency continuium diagram

Disaster recovery of zone pinned Azure Virtual Machines to another region

Azure Availability Zones are unique fault-isolated physical locations, within an Azure region, with independent power, network, and cooling. Each Availability Zone is comprised of one or more datacenters and houses infrastructure to support highly available, mission critical applications with fault ... continue reading

Azure Data Lake Storage Gen2 preview – More features, more performance, better availability

Since we announced the limited public preview of Azure Data Lake Storage (ADLS) Gen2 in June, the response has been resounding. Customers participating in the ADLS Gen2 preview have directly benefitted from the scale, performance, security, manageability, and cost-effectiveness inherent ... continue reading

Best practices for naming your Microsoft Azure resources

When talking about Cloud infrastructure, you might have come across the phrase “Pets versus cattle.” It appeared around 2012 when Bill Baker used it to differentiate between servers that can never be down and servers that are easily replaceable (e.g ... continue reading
image

How to Protect your #Azure resources from Distributed Denial of Service #DDoS attacks #Cloud #SDN #VNET #Security #Alerts #Analytics

Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application’s resources, making the application unavailable to legitimate ... continue reading
flow chart for the various layers of security provided by Cosmos DB

How to develop secure applications using Azure Cosmos DB

Before we begin to discuss how to develop secure applications using Azure Cosmos DB, we should also highlight some of the different layers of security that Azure Cosmos DB offers. The following image illustrates these various layers of security: Azure ... continue reading

Create Azure SQL Managed Instance using Azure CLI

Azure command line interface (CLI) is a set of commands that you can use to create and manage Azure resources. In this post your will see how can you create Managed Instance using Azure CLI. The Azure CLI is Microsoft’s ... continue reading
DDOSDemoVNET

Holiday season is DDoS season

Is your business ready for the holiday season? As we approach the holiday season and bring in thoughts of good cheers, many companies are faced with an elevated risk of cyber-attacks. What makes the holidays such an enticing time for ... continue reading
Loading...