Select Page
Portrait of man with a tie and plaid button down shirt sitting on a couch facing the camera, smiling with his hands folded.

SQL Server 2022: Intel® QuickAssist Technology overview

Part of the SQL Server 2022 blog series. In SQL Server 2008 Enterprise Edition, backup compression was introduced addingWITH COMPRESSION as an option in the T-SQL backup command. SQL Server backup compression provides the compressed backup option for all streaming SQL ... continue reading

Discover the latest innovations at Azure Open Source Day 2023

This post has been coauthored by Nikisha Reyes-Grange and Katie Fritsch. “Tech companies born with an open-source mentality get it. It’s our ability to work together that makes our dreams believable, and ultimately achievable; we must learn to build on ... continue reading
Hugging face

Exploring open-source capabilities in Azure AI

This post was co-authored by Richard Tso, Director of Product Marketing, Azure AI Open-source technologies have had a profound impact on the world of AI and machine learning, enabling developers, data scientists, and organizations to collaborate, innovate, and build better ... continue reading
Protecting Android clipboard content from unintended exposure

Protecting Android clipboard content from unintended exposure

Considering mobile users often use the clipboard to copy and paste sensitive information, like passwords or payment information, clipboard contents can be an attractive target for cyberattacks. Leveraging clipboards can enable attackers to collect target information and exfiltrate useful data ... continue reading
High-level diagram explaining the data flow is given below: This picture describes Azure WAF protecting backends hosted in Azure, other clouds and on-premises from traffic originating from malicious actors as well as legitimate users. A WAF triggered log is analyzed by the Sentinel Notebook and an automated exclusion is applied for a confirmed false positive.

Azure WAF guided investigation Notebook using Microsoft Sentinel for automated false positive tuning

With special thanks to Pete Bryan, Principal Security Research Manager, Microsoft Security. The SQL injection attack remains one of the critical attacks in the OWASP Top 10, and it involves injecting a SQL query via the input data field into ... continue reading

6 ways to improve accessibility with Azure AI

There are over one billion people in the world living with disabilities, and many face barriers to employment, education, and societal inclusion. In 2021, Microsoft launched a new five-year initiative to address these challenges by focusing on three priorities: developing more ... continue reading

Monitoring Storage Replication – Part 1

Introduction   Hi folks! My name is Felipe Binotto, Cloud Solution Architect, based in Australia. We all know how frustrating it can be to receive a call about a storage account not replicating or being unable to fail over. To ... continue reading

Accessing Microsoft Graph Data with Powershell

  Hi Mike Resnick here, as Azure AD Graph and Azure AD powershell modules heading for a well deserved retirement, I’m fielding a lot of similar “How to “questions around Azure based process automation and Microsoft Graph.  Based on these conversations ... continue reading
Automate provisioning and governance of your on-premises applications

Automate provisioning and governance of your on-premises applications

I’m excited to announce the general availability of provisioning to on-premises applications using Microsoft Entra Identity Governance. You can now automate provisioning and manage the lifecycle of users in on-premises applications, without requiring any custom code.       Many of you ... continue reading

Secure your application traffic with Application Gateway mTLS

I am happy to share that Azure Application Gateway now supports mutual transport layer security (mTLS) and online certificate status protocol (OCSP). This was one of the key questions from our customers as they were looking for more secure communication ... continue reading