Select Page
Bizdata logo

Azure Managed Lustre—Parallel file system for HPC and AI workloads

Today, Microsoft is announcing the public preview of Azure Managed Lustre, a new addition to the storage offerings in our Azure HPC + AI solution. Lustre is an open-source parallel file system renowned for high-performance computing (HPC) and is adept ... continue reading
st1.png

Reporting on Storage Account Access Tier Statistics

I have a customer with some very large storage accounts – of course as the size of an account gets larger so does the cost. Customers can use Blob Lifecycle Management rules to control when blobs are moved to a ... continue reading
Wired for Hybrid - Episode 3 - What's New in Azure Networking - February 2023 Edition

Wired for Hybrid – Episode 3 – What’s New in Azure Networking – February 2023 Edition

Azure Networking is the foundation of your infrastructure in Azure. So, we’re happy to bring you a monthly update on What’s new in Azure Networking. In this blog post, we’ll cover what is new with Azure Networking. Public preview: Azure Firewall Basic Azure ... continue reading
Microsoft’s approach to SaaS Security and the core product pillars: discovery, SaaS Security posture management, information protection, threat protection and app to app protection.

Microsoft shifts to a comprehensive SaaS security solution

Software as a service (SaaS) apps are ubiquitous, hybrid work is the new normal, and protecting them and the important data they store is a big challenge for organizations. Today, 59 percent of security professionals find the SaaS sprawl challenging ... continue reading
Diagram showing Security Research Findings, Penetration Testing and Deep Security Reviews, and Threat Modeling as inputs into the Variant Hunting process. The outcomes from Variant Hunting are Long-term Controls and Systemic Improvements, Short-term mitigations and controls, and Standardized Controls in SDL.

Microsoft Azure Security expands variant hunting capacity at a cloud tempo

In the first blog in this series, we discussed our extensive investments in securing Microsoft Azure, including more than 8500 security experts focused on securing our products and services, our industry-leading bug bounty program, our 20-year commitment to the Security ... continue reading
WillAftring_0-1675864123425.png

Introduction to Network Trace Analysis 3: TCP Performance

Introduction to Network Trace Analysis 3: TCP Performance   Hello everyone, we are back with TCP performance. If you are reading this post I am going to assume you have read the previous post Introduction to Network Trace Analysis 2: Jumping ... continue reading

Microsoft and NVIDIA experts talk AI infrastructure

This post has been co-authored by Sheila Mueller, Senior GBB HPC+AI Specialist, Microsoft; Gabrielle Davelaar, Senior GBB AI Specialist, Microsoft; Gabriel Sallah, Senior HPC Specialist, Microsoft; Annamalai Chockalingam, Product Marketing Manager, NVIDIA; J Kent Altena, Principal GBB HPC+AI Specialist, Microsoft; ... continue reading
WillAftring_0-1675864123425.png

Introduction to Network Trace Analysis 03: TCP Performance

Introduction to Network Trace Analysis 03: TCP Performance   Hello everyone, we are back with TCP performance. If you are reading this post I am going to assume you have read the previous post Introduction to Network Trace Analysis 2: Jumping ... continue reading
Click to watch on YouTube.

Roundup of AI breakthroughs by Microsoft and NVIDIA

In terms of AI developments, 2022 proved to be a banner year. AI production and usage increased and both deep learning and machine learning models steadily conquered increasingly complex problems. But AI evolution goes beyond impressive production and adoption levels ... continue reading
Venn diagram showing how Adaptive Protection optimizes data protection automatically by balancing content-centric controls and people-centric context.

Introducing Adaptive Protection in Microsoft Purview—People-centric data protection for a multiplatform world

At Microsoft, we never stop working to protect you and your data. If the evolving cyberattacks over the past three years have taught us anything, it’s that threat actors are both cunning and committed. At every level of your enterprise, ... continue reading