Select Page
Zero Trust part 1: Identity and access management

Zero Trust part 1: Identity and access management

Once in a while, a simple phrase captures our imagination, expressing a great way to think about a problem. Zero Trust is such a phrase. Today, Ill define Zero Trust and then discuss the first step to enabling a Zero ... continue reading
Customizable test cases in Azure Certified for IoT device catalog

Streamlined IoT device certification with Azure IoT certification service

For over three years, we have helped customers find devices that work with Azure IoT technology through the Azure Certified for IoT program and the Azure IoT device catalog. In that time, our ecosystem has grown to one of the ... continue reading
Powerful programming model

Taking a closer look at Python support for Azure Functions

Azure Functions provides a powerful programming model for accelerated development and serverless hosting of event-driven applications. Ever since we announced the general availability of the Azure Functions 2.0 runtime, support for Python has been one of our top requests. At ... continue reading
Prescriber360 logo

How pharma sales operations benefit from centralizing data and process integration

Pharmaceutical companies need to meet demanding sales goals, manage intricate regulatory compliance, and maintain a competitive hold on the market. However, current sales force automation (SFA) solutions for the life sciences industry are focused primarily on sales reps, which leaves ... continue reading
enable-replication-auto-update

Apply the latest Azure Site Recovery capabilities with automatic agent update

One of the biggest hassles faced by administrators while using services provided by cloud providers is the need to catch up with the latest release and stay up-to-date. This involves downloading the latest software and performing frequent upgrades. In an ... continue reading
Best practices for naming your Microsoft Azure resources

Best practices for naming your Microsoft Azure resources

When talking about Cloud infrastructure, you might have come across the phrase “Pets versus cattle.” It appeared around 2012 when Bill Baker used it to differentiate between servers that can never be down and servers that are easily replaceable (e.g ... continue reading
Azure Monitor: Detecting and Alerting on File Changes

Azure Monitor: Detecting and Alerting on File Changes

I am preparing for Microsoft Ignite | The Tour and have been playing around quite a bit with Azure Monitor and the Azure Automation state tracking capabilities. One of the features I've found impressive is the ability to track the ... continue reading
High level diagram of an OpenShift for Windows 2 node cluster deployment

Managing Windows containers with Red Hat OpenShift Container Platform 3.11

Who is the new guy blogging? Before getting into the topic, I wanted to introduce myself. My name is Mike Kostersitz, I am Principal Program Manager and just joined the core networking team in the Cloud and AI organization. I ... continue reading
The evolution of Microsoft Threat Protection, November update

The evolution of Microsoft Threat Protection, November update

At Ignite 2018, we announced Microsoft Threat Protection, a comprehensive, integrated solution securing the modern workplace across identities, endpoints, user data, cloud apps, and, infrastructure (Figure 1). The foundation of the solution is the Microsoft Intelligent Security Graph, which correlates ... continue reading

Developing hybrid applications with Azure Stack

More and more we hear from our customers that building hybrid applications is necessary for their business. While Microsoft Azure continues to be the platform of choice for building applications, Azure Stack and Azure together enable building hybrid applications. The ... continue reading