Select Page

What’s the difference between Group Policy and Azure Policy?

To understand the difference between Group Policy and Azure Policy, we need to start with the architecture differences regarding how devices are seen in a Windows Server domain versus in Microsoft Azure. Traditional Group Policy architecture is based on Users ... continue reading

Unlocking the promise of IoT: A Q&A with Vernon Turner

Vernon Turner is the Founder and Chief Strategist at Causeway Connections, an information and communications technology research firm. For nearly a decade, he’s been serving on global, national, and state steering committees, advising governments, businesses, and communities on IoT-based solution ... continue reading
IoT Central Government App templates

Democratizing Smart City solutions with Azure IoT Central

One of the most dynamic landscapes embracing Internet of Things (IoT) is the modern city. As urbanization grows, city leaders are under increasing pressure to make cities safer, accessible, sustainable, and prosperous. Underlying all these important goals is the bedrock ... continue reading

FedRAMP Moderate Blueprints helps automate US federal agency compliance

We’ve just released our newest Azure Blueprints for the important US Federal Risk and Authorization Management Program (FedRAMP) certification at the moderate level. FedRAMP is a key certification because cloud providers seeking to sell services to US federal government agencies ... continue reading
Deprovisioning In-Depth: Part 3 - Deletions

Deprovisioning In-Depth: Part 3 – Deletions

First published on MSDN on Apr 16, 2015 This is the third and final post in my series on deprovisioning. In case you missed them, check out post one (regular disconnectors) and post two (explicit disconnectors). In this post, I’ll ... continue reading
INfographic of the five app templates.

Building retail solutions with Azure IoT Central

Azure IoT Central is an IoT app platform for solution builders that simplifies the challenges of building and deploying scalable and affordable enterprise grade IoT applications. Across the retail industry, the use of connected devices to deliver business performance continues ... continue reading

Core Networking and Internet Standards

Internet Standards Constantly throughout the day, we (and devices on our behalf) all use the Internet: TCP, UDP, HTTP, TLS, DHCP, DNS, and countless other protocols that define the Internet or improve how it runs. How do these foundational protocols ... continue reading
Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Recent developments in security research and real-world attacks demonstrate that as more protections are proactively built into the OS and in connected services, attackers are looking for other avenues of exploitation with firmware emerging as a top target. In the ... continue reading

Guarding against supply chain attacks—Part 1: The big picture

Every day, somewhere in the world, governments, businesses, educational organizations, and individuals are hacked. Precious data is stolen or held for ransom, and the wheels of “business-as-usual” grind to a halt. These criminal acts are expected to cost more than ... continue reading
Microsoft Azure is helping organizations manage regulatory challenges more effectively

Measuring your return on investment of Azure as a compliance platform

Today we’re pleased to introduce the release of Microsoft Azure is Helping Organizations Manage Regulatory Challenges More Effectively, a new International Data Corporation (IDC) white paper based on original research by IDC and sponsored by Microsoft. IDC studied Azure customers ... continue reading