Select Page

How to extend your existing SQL Server Failover Cluster Instance to the Cloud for Disaster Recovery

I get asked this question all the time, so I figured it was time to write a blog post, record a video and write some code to automate the process so that it completes in under a minute. First, some ... continue reading

How to secure your hybrid work world with a Zero Trust approach

We are operating in the most complex cybersecurity landscape we’ve ever seen. Sophisticated and determined attackers are the norm. And we all are preparing for the next great disruption—hybrid work. Security has never been more important, and as I shared ... continue reading
Algorithmic improvements boost TCP performance on the Internet

Algorithmic improvements boost TCP performance on the Internet

Improved network performance over the Internet is essential for edge devices connecting to the cloud. Last mile performance impacts user perceived latencies and is an area of focus for our online services like M365, SharePoint, and Bing. Although the next ... continue reading
Azure Backup Center: Monitor and operate

Azure Backup Center: Monitor and operate

Hello Folks, We are ITPro, Operation Specialist, Cloud Architects, backup admins…. Regardless of what label we tie ourselves to, we have a responsibility to ensure the proper operation and protection of the environments we are charged with. Included in those ... continue reading
Azure Backup Center – Your one-stop for all things backups.

Azure Backup Center – Your one-stop for all things backups.

Hello Folks, We live in a world where the only constant is change. Actually… There might be one thing that has not changed for IT pros and operation folks… The need for an appropriate backup strategy. Today, in this world ... continue reading
Enterprise-scale foundation architecture

Leverage enterprise-scale reference implementations for your cloud adoption

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure In the last couple of blog posts, we followed Tailwind Traders1 on their cloud journey and how the IT team is looking to adopt Azure as part of their ... continue reading
Attack diagram showing stages of an attack and how the threat actor tracking model caught the initial stages so the affected organization could stop the attack

Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting

As seen in recent sophisticated cyberattacks, especially human-operated campaigns, it’s critical to not only detect an attack as early as possible but also to rapidly determine the scope of the compromise and predict how it will progress. How an attack ... continue reading
Azure Security Centre Regulatory compliance

Deploy key design principles with enterprise-scale architecture

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure Tailwind Traders1 is a retail company that is looking to adopt Azure as part of its IT strategy. The IT team is familiar with deploying infrastructure on premises and ... continue reading
Enterprise-Scale with hub and spoke architecture

Scale cloud adoption with modular designs for enterprise-scale landing zones

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure Tailwind Traders1 is a retail company that is looking to adopt Azure as part of its IT strategy. The IT team is familiar with deploying infrastructure on-premises and is ... continue reading

Advancing Azure business continuity management

“Microsoft Azure has always been committed to providing highly reliable, available, and recoverable services to our customers. This customer-focused passion is reflected at every level in the Microsoft Azure Business Continuity Management (BCM) program. At the direction of the Microsoft ... continue reading