Select Page
John_Barbare_0-1636495244009.png

Application Guard Deployment by MECM

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will be focusing on Application Guard and the correct configuration/deployment for Microsoft Endpoint Configuration ... continue reading
AMD logo

Azure high-performance computing at Supercomputing 2021

Customers around the world rely on Microsoft Azure to drive innovations related to our environment, public health, energy sustainability, weather modeling, economic growth, and more. Finding solutions to these important challenges requires huge amounts of focused computing power. Customers are ... continue reading
Graphic shows a repeating identity-based attack lifecycle pattern.

Protect your business from password sprays with Microsoft DART recommendations

Over the past year, the Microsoft Detection and Response Team (DART), along with Microsoft’s threat intelligence teams, have observed an uptick in the use of password sprays as an attack vector. This threat is a moving target with techniques and ... continue reading
HoussemDellai_0-1625825418350.png

Kubernetes Nodepools Explained

Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: What are nodepools ? What are System and User nodepools ? How to schedule application pods on a specific nodepool using Labels and nodeSelector ? ... continue reading
Understanding Microsoft Azure Virtual Machine sizes

Understanding Microsoft Azure Virtual Machine sizes

Having an on-premises infrastructure background, I’m used to scoping hardware by defining the specifications (CPU, memory etc) we’ll need to run the applications and expected concurrent users and allowing for some growth. Then we’d often buy a box that would ... continue reading
Customize Windows Sandbox

Customize Windows Sandbox

In this blog post, I will show you how you can set up, configure and customize Windows Sandbox in Windows 10 using advanced Windows Sandbox config files. Windows Sandbox is based on Hyper-V technology and allows you to spin up ... continue reading
Screenshot of a Microsoft Defender for Endpoint alert in the security center about a CoinMiner that was blocked.

Defending against cryptojacking with Microsoft Defender for Endpoint and Intel TDT

Cryptocurrency mining—once considered no more than a nuisance, a relatively benign activity that was a drain on machine resources—has been on the rise in recent years. This increase in cryptocurrency mining activity is driven by the increasing value of cryptocurrencies ... continue reading

Bring compute, storage, and intelligence to the edge with Azure Stack Edge

Dipti Pai joins Scott Hanselman to show how to run containerized and VM workloads to get quick, actionable insights at the edge—where data is created—using purpose-built hardware-as-a-service with Azure Stack Edge.[0:00:00]– Overview[0:00:55]– What is Azure Stack Edge?[0:04:09]– Azure Stack Edge ... continue reading
Enhanced notebook editor inside Azure Machine Learning studio with three users and IntelliSense.

Azure Machine Learning—what’s new from Build 2020

Machine learning (ML) is gaining momentum across a number of industries and scenarios as enterprises look to drive innovation, increase efficiency, and reduce costs. Microsoft Azure Machine Learning empowers developers and data scientists with enterprise-grade capabilities to accelerate the ML ... continue reading
Az Update: Azure Dedicated Host News, Azure Stack Edge with GPU and govern your hybrid servers

Az Update: Azure Dedicated Host News, Azure Stack Edge with GPU and govern your hybrid servers

With all the changes in Azure, it is sometimes hard to keep track, that's why I thought I would give you a quick update on two exciting things I learned this week. In this update, I want to share a ... continue reading