Select Page
Why it is important to create Azure support requests

Why it is important to create Azure support requests

Why is it so important to create a support request when something is wrong with your workloads in Azure? Imagine a situation - you are a CSP partner, and you've just moved workloads of your customer from your or their ... continue reading

PowerShell Standard Library: Build single module that works across Windows PowerShell and PowerShell Core

This is the first of a series of blog posts that will help you take advantage of a new NuGet package PowerShellStandard Library 5.1.0. This package allows developers to create modules that are portable between Windows PowerShell 5.1 and PowerShell ... continue reading

Increased Windows Modules coverage with PowerShell Core 6.1

During the May 2018 Community Call and a tweet a few weeks later, we mentioned that PowerShell team was spending significant time in the Windows codebase. We even demoed using the Active Directory PowerShell Module from PowerShell Core 6 during ... continue reading
Microsoft System Center Operations Manager Management Pack to configure Operations Management Suite

Microsoft System Center Operations Manager Management Pack to configure Operations Management Suite

We have updated Operations Management Suite connection onboarding wizard in System Center Operations Manager to communicate with the new APIs. For configuring new connections to Operations Management Suite with System center Operations Manager, you need to import the product version ... continue reading

Parse HTML and pass to Cognitive Services Text-to-Speech

Summary: Having some fun with Abbott and Costello’s “Who’s on first?” comedy routine, and multiple voices with Bing Speech. ------------------------------- Hello everyone! The last few posts, I showed you all about the Cognitive Services Text-to-Speech API. You learned about the ... continue reading
Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Much of cybercrime today is fueled by underground markets where malware and cybercriminal services are available for purchase. These markets in the deep web commoditize malware operations. Even novice cybercriminals can buy malware toolkits and other services they might need ... continue reading

Windows PowerShell and the Text-to-Speech REST API (Part 5)

Summary: Send and receive content to the Text-to-Speech API with PowerShell. Q: Hey, Scripting Guy! Could you give a buddy a hand in getting the last pieces together for the Text-to-Speech API? —SR A: Hello SR, No problem at all ... continue reading
Screenshot of Bing Speech

Windows PowerShell and the Text-to-Speech REST API (Part 4)

Summary: Send and receive content to the Text-to-Speech API with PowerShell. Q: Hey, Scripting Guy! I was playing with the Text-to-Speech API. I have it almost figured out, but I’m stumbling over the final steps of formatting the SSML markup ... continue reading
Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

Cybersecurity Reference Architecture: Security for a Hybrid Enterprise

The Microsoft Cybersecurity Reference Architecture describes Microsofts cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help ... continue reading
HTTP headers table

Windows PowerShell and the Text-to-Speech REST API (Part 3)

Summary: Use Windows PowerShell to access the Cognitive Services Text-to-Speech API. Q: Hey, Scripting Guy! I was reading up on how we could use PowerShell to communicate with Azure to gain an access token. I’ve been just itching to see ... continue reading