Select Page
Click to download SQL Server 2022 public preview.

Introducing the SQL Server 2022 blog series

Introducing a new blog post series to highlight new features and enhancements available with SQL Server 2022.SQL Server 2022, now in public preview, is our most Azure-enabled release yet, with continued innovation across performance, security, and availability.With connections to Azure ... continue reading
Model of AB testing in MLOPs.

MLOPs Blog Series Part 3: Testing scalability of secure machine learning systems using MLOps

The capacity of a system to adjust to changes by adding or removing resources to meet demand is known as scalability. Here are some tests to check the scalability of your model. System testing System tests are carried out to ... continue reading
Apply Azure Policy to Azure Arc-enabled Servers in a Hybrid environment

Apply Azure Policy to Azure Arc-enabled Servers in a Hybrid environment

If you have connected your non-Azure Servers with Azure Arc, and you can now see them via the Azure portal and other management tools (like Azure PowerShell), a good next step is to apply some Azure Policies to them. This ... continue reading

4 breakthrough ideas for compliance and data security

Compliance management will never be easy, but there are ways to make it simpler and more transparent. Every year, organizations confront a growing volume and diversity of data and ever-evolving industry and government regulations. But the answer to more data, ... continue reading
Network ATC on Azure Stack HCI

Network ATC on Azure Stack HCI

Update: Network ATC is now publicly available with Azure Stack HCI 21H2 As you may be aware, Microsoft announced the general availability of the Azure-connected Hyper-Converged Infrastructure, Azure Stack HCI. Previously Azure Stack HCI was built off Windows Server which ... continue reading

Microsoft Defender for Office 365 receives highest award in SE Labs Enterprise Email Security Services test

In today’s evolving threat landscape, email represents the primary attack vector for cybercrime, making effective email protection a key component of any security strategy.1 In Q1 2022, Microsoft participated in an evaluation of email security solutions, carried out by SE ... continue reading
Integration of two modules represented by two circles overlapping in the center.

MLOPs Blog Series Part 2: Testing robustness of secure machine learning systems using machine learning ops

Robustness is the ability of a closed-loop system to tolerate perturbations or anomalies while system parameters are varied over a wide range. There are three essential tests to ensure that the machine learning system is robust in the production environments: ... continue reading

See how 3 industry-leading companies are driving innovation in a new episode of Inside Azure for IT

I had the awesome opportunity to talk with a few people innovating with some of the most exciting next-generation tech in our latest episode of the Inside Azure for IT fireside chat series. Many of us, myself included, spend a ... continue reading
Asus logo

Securing your IoT with Edge Secured-core devices

A recent study conducted by Microsoft in partnership with Ponemon Institute included a survey of companies that have adopted IoT solutions and 65 percent of them mentioned that security is a top priority when implementing IoT. Attacks targeting IoT devices ... continue reading
Learn Microsoft Azure for system administrators & solution architects with Azure Skills Navigator

Learn Microsoft Azure for system administrators & solution architects with Azure Skills Navigator

If you’re wanting to learn the foundations of Microsoft Azure (including cloud computing concepts, Azure’s structure, and its product range), you might start out with training materials like the Azure Fundamental learning paths on Microsoft Learn. These will also give ... continue reading