Select Page
ResNet50 results were generated using NC24r_v3 and NC96ads_A100_v4 virtual machine sizes.

Accelerate your AI applications with Azure NC A100 v4 virtual machines

Real-world AI has revolutionized and changed how people live during the past decade, including media and entertainment, healthcare and life science, retail, automotive, finance service, manufacturing, and oil and gas. Speaking to a smart home device, browsing social media with ... continue reading
Learn Live: Azure Hybrid Cloud Study Hall

Learn Live: Azure Hybrid Cloud Study Hall

Join us for the new Azure Hybrid study hall series. This fourteen-party weekly series will answer your questions live, walk through how to configure, deploy, manage your hybrid cloud resources using services and hybrid cloud technologies, and walk-through Microsoft Learn ... continue reading

Accelerate graphics-heavy workloads using NVads A10 v5 Azure

Back in 2019 when Azure launched the first GPU-partitioned (GPU-P) virtual machine (VM) offerings in the public cloud, our customers loved it and asked for a similar offering on NVIDIA GPUs. Our customers wanted the flexibility to choose the GPU ... continue reading
University College of London Hospitals logo

Azure confidential computing with NVIDIA GPUs for trustworthy AI

Many industries such as healthcare, finance, transport, and retail are going through a major AI-led disruption. The exponential growth of datasets has resulted in growing scrutiny of how data is exposed—both from a consumer data privacy and compliance perspective. For ... continue reading
John_Barbare_0-1636495244009.png

Application Guard Deployment by MECM

Introduction This is John Barbare and I am a Sr Customer Engineer at Microsoft focusing on all things in the Cybersecurity space. In this blog I will be focusing on Application Guard and the correct configuration/deployment for Microsoft Endpoint Configuration ... continue reading
Graphic shows a repeating identity-based attack lifecycle pattern.

Protect your business from password sprays with Microsoft DART recommendations

Over the past year, the Microsoft Detection and Response Team (DART), along with Microsoft’s threat intelligence teams, have observed an uptick in the use of password sprays as an attack vector. This threat is a moving target with techniques and ... continue reading
HoussemDellai_0-1625825418350.png

Kubernetes Nodepools Explained

Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: What are nodepools ? What are System and User nodepools ? How to schedule application pods on a specific nodepool using Labels and nodeSelector ? ... continue reading
Understanding Microsoft Azure Virtual Machine sizes

Understanding Microsoft Azure Virtual Machine sizes

Having an on-premises infrastructure background, I’m used to scoping hardware by defining the specifications (CPU, memory etc) we’ll need to run the applications and expected concurrent users and allowing for some growth. Then we’d often buy a box that would ... continue reading
Customize Windows Sandbox

Customize Windows Sandbox

In this blog post, I will show you how you can set up, configure and customize Windows Sandbox in Windows 10 using advanced Windows Sandbox config files. Windows Sandbox is based on Hyper-V technology and allows you to spin up ... continue reading
Screenshot of a Microsoft Defender for Endpoint alert in the security center about a CoinMiner that was blocked.

Defending against cryptojacking with Microsoft Defender for Endpoint and Intel TDT

Cryptocurrency mining—once considered no more than a nuisance, a relatively benign activity that was a drain on machine resources—has been on the rise in recent years. This increase in cryptocurrency mining activity is driven by the increasing value of cryptocurrencies ... continue reading