Select Page

Unlock your free Azure replica for SQL Server with DH2i

Are you aware that you may be entitled to a free SQL Server license in the cloud for disaster recovery? Recently-announced licensing benefits enable this scenario, and a third-party offering from DH2i can help you set up this configuration to ... continue reading

Unlock your free Azure replica for SQL Server with DH2i

Are you aware that you may be entitled to a free SQL Server license in the cloud for disaster recovery? Recently-announced licensing benefits enable this scenario, and a third-party offering from DH2i can help you set up this configuration to ... continue reading

Native Commands in PowerShell – A New Approach – Part 2

Native Commands in PowerShell A New Approach – Part 2 In my last post I went through some some strategies for executing native executable and having them participate more fully in the PowerShell environment. In this post, I’ll be going ... continue reading
image002.png

Endpoint Configuration Manager – Site Server High Availability

Overview Endpoint Configuration Manager (Current Branch), supports high availability configurations through various options, which include but are not limited to the following: Any standalone primary site can now have an additional passive mode.* site server Remote content library* SQL Server ... continue reading
Defending Exchange servers under attack

Defending Exchange servers under attack

Securing Exchange servers is one of the most important things defenders can do to limit organizational exposure to attacks. Any threat or vulnerability impacting Exchange servers should be treated with the highest priority because these servers contain critical business data, ... continue reading
Desired State Configuration code: How to troubleshoot the extension

Desired State Configuration code: How to troubleshoot the extension

Hello folks! If you have made it this far, know I think you’re amazing and one of a kind! If you are just tuning in now and would like to see the full blog series daisy chained together, take note ... continue reading
Architecture diagram showing Azure Container Registry connectivity to other Azure services over Private Link.

Azure Container Registry: Securing container workflows

Securing any environment requires multiple lines of defense. Azure Container Registry recently announced the general availability of features like Azure Private Link, customer-managed keys, dedicated data-endpoints, and Azure Policy definitions. These features provide tools to secure Azure Container Registry as ... continue reading
Failover Clustering Networking Basics and Fundamentals

Failover Clustering Networking Basics and Fundamentals

My name is John Marlin and I am with the High Availability and Storage Team here and today I want to talk about Failover Clustering and Networking. Networking is a fundamental key with Failover Clustering that sometimes is overlooked but ... continue reading

Minimize disruption with cost-effective backup and disaster recovery solutions on Azure

A top of mind concern among our customers is keeping their applications and data workloads running and recoverable in the case of unforeseen events or disasters. For example, COVID-19 has presented daunting challenges for IT, which are only compounded by ... continue reading

Cost optimization strategies for cloud-native application development

Today, we’ll explore some strategies that you can leverage on Azure to optimize your cloud-native application development process using Azure Kubernetes Service (AKS) and managed databases, such as Azure Cosmos DB and Azure Database for PostgreSQL. Optimize compute resources with ... continue reading