Select Page
Deep dive: How Azure AD Kerberos works

Deep dive: How Azure AD Kerberos works

If you have ever explored the differences between Active Directory (AD DS) and Azure Active Directory (Azure AD), you would have found that Azure Active Directory doesn't support the Kerberos authentication protocol, but Active Directory does. Kerberos is used to ... continue reading
Azure Container Apps - CI/CD deployments (Video Demo)

Azure Container Apps – CI/CD deployments (Video Demo)

Azure Container Apps is a container orchestration platform for deploying modern applications and microservices. With Azure Container Apps you can deploy your containerized apps without the need to take on the overhead of managing the infrastructure of the underlying systems ... continue reading
PaulHarrison_0-1640716009126.png

Recurring Active Directory Checks

Q: I just had an Active Directory (AD) or Active Directory Security health assessment from Microsoft, and they found some stuff I didn’t know about, or they found other items I knew to check for but forgot about. While I ... continue reading
EDF Energy logo

Updates to Azure Files: NFS v4.1, higher performance limits, and reserved instance pricing

Azure Files offers fully managed, simple, secure, and serverless enterprise-grade cloud file shares. On the Azure Files team, our mission is to expand Azure Files to more platforms and workloads. We recently took a huge step in workload expansion by ... continue reading
Deploy Bicep files by using GitHub Actions

Deploy Bicep files by using GitHub Actions

Recently, I did a live streaming session for the New York City Microsoft Reactor in which I took concepts from the Quickstart: Deploy Bicep files by using GitHub Actions doc and put them into action. In this session I create ... continue reading
Introducing Azure AD custom security attributes

Introducing Azure AD custom security attributes

This public preview of Microsoft Azure Active Directory (Azure AD) custom security attributes and user attributes in ABAC (Attribute Based Access Control) conditions builds on the previous public preview of ABAC conditions for Azure Storage. Azure AD custom security attributes ... continue reading
EricLong_26-1638290905142.png

Simple and Central Azure Virtual Network Management Using the New Azure Virtual Network Manager

If you’re in charge of creating or maintaining the infrastructure or security of a large and complex Azure network environment, comprised of many virtual networks (VNets), Network Security Groups (NSGs), and virtual machines (VMs) spread across several Azure regions and ... continue reading
Azure Load Testing architecture overview

Introducing Azure Load Testing: Optimize app performance at scale

Today, we are announcing the preview of Azure Load Testing. Azure Load Testing is a fully managed Azure service that enables developers and testers to generate high-scale load with custom Apache JMeter scripts and gain actionable insights to catch and ... continue reading
 Dual ToR support through smart cable and SONiC switches.

SONiC opens more opportunities for network innovation

SONiC, as an open-source operating system for network devices, has been growing rapidly in the last five years. According to Gartner Market Guide for Data Center Switching published early this year, they predict, “By 2025, 40 percent of organizations that ... continue reading
Three icons representing data at rest, in transit, and in use.

Adopting a Zero Trust approach throughout the lifecycle of data

Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero ... continue reading