Select Page
Flowchart of microservice being implemented in an indivudal function app

Benefits of using Azure API Management with microservices

The IT industry is experiencing a shift from monolithic applications to microservices-based architectures. The benefits of this new approach include: Independent development and freedom to choose technology – Developers can work on different microservices at the same time and choose ... continue reading

Securing the future of AI and machine learning at Microsoft

Artificial intelligence (AI) and machine learning are making a big impact on how people work, socialize, and live their lives. As consumption of products and services built around AI and machine learning increases, specialized actions must be undertaken to safeguard ... continue reading
Windows Server 101: Hardening IIS via Security Control Configuration

Windows Server 101: Hardening IIS via Security Control Configuration

IIS, the web server that’s available as a role in Windows Server, is also one of the most used web server platforms on the internet. Hardening IIS involves applying a certain configuration steps above and beyond the default settings. The ... continue reading
Using PowerShell to import and export Azure Blueprints

Using PowerShell to import and export Azure Blueprints

I’ve previously written an overview of what Azure Blueprints are and why you’d use them, so if you are unfamiliar with them, check out Getting started with Azure Blueprints. As the Azure Blueprints service is still in Preview, you won’t ... continue reading
Step 4. Set conditional access policies: top 10 actions to secure your environment

Step 4. Set conditional access policies: top 10 actions to secure your environment

The Top 10 actions to secure your environment series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. In Step 4. Set conditional access policies, youll learn how to control access to your apps and ... continue reading
Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Configuration Manager: ‘The encryption type requested is not supported by the KDC’ Error When Running Reports

Introduction Hello, my name is Richard McIver and I’m a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager. I was recently working with a customer who suddenly started receiving a strange KDC error when attempting to run ... continue reading
p2s1.jpg

Step-By-Step: Creating an Azure Point-to-Site VPN

Site-to-Site VPN is the most common method organizations use to connect on-premises network to Azure vNet. This VPN connection is initiated in your edge firewall or router level. But what if you connecting from remote location such as home? We ... continue reading
Azure AD makes sharing and collaboration seamless for any user with any account

Azure AD makes sharing and collaboration seamless for any user with any account

Howdy folks, Azure AD B2B Collaboration provides customers with an easy way to share applications and collaborate with people from any organization, whether or not they have Azure AD or an IT department. We’ve been working to make B2B Collaboration ... continue reading
Screenshot of Azure Stream Analytics query script

Development, source control, and CI/CD for Azure Stream Analytics jobs

Do you know how to develop and source control your Microsoft Azure Stream Analytics (ASA) jobs? Do you know how to setup automated processes to build, test, and deploy these jobs to multiple environments? Stream Analytics Visual Studio tools together ... continue reading
Loading...