Select Page
COnsistent data

Five reasons to run SQL Server 2016 on Windows Server 2016 – No. 5: Consistent data environment across hybrid cloud environments

Have you ever seen a tree that simultaneously bears completely different species of fruit? It’s a real thing: apples, plums, oranges, lemons, and peaches all growing on the same tree. The growers have the advantage of a consistent environment (the ... continue reading
(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
What's New in Networking for Windows Server 2016?

Windows Server 2016 – Azure-Inspired Software Defined Networking (SDN) in YOUR Datacenter!

The Azure-inspired Software Defined Networking (SDN) stack that is built into Windows Server 2016 reduces the complexity and cost of network infrastructure. Not only that, you can now define your network infrastructure so that it is portable to your application ... continue reading
What's New in Networking for Windows Server 2016?

Windows Server 2016 – Azure-Inspired Software Defined Networking (SDN) in YOUR Datacenter!

The Azure-inspired Software Defined Networking (SDN) stack that is built into Windows Server 2016 reduces the complexity and cost of network infrastructure. Not only that, you can now define your network infrastructure so that it is portable to your application ... continue reading
java-malware-sample-email

Combating a spate of Java malware with machine learning in real-time

In recent weeks, we have seen a surge in emails carrying fresh malicious Java (.jar) malware that use new techniques to evade antivirus protection. But with our research team’s automated expert systems and machine learning models, Windows 10 PCs get ... continue reading
Hyper-V in Windows Server 2016

Massive Performance, Scale and Manageability Gains in Hyper-V with Windows Server 2016

In this episode, you'll learn about the huge performance and scale improvements made available with Hyper-V in Windows Server 2016. This video covers the specific performance enhancements, what kinds of new virtualization scenarios this makes available for business-critical workloads, such ... continue reading
Execution stages of the exploit package and corresponding functionality

Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005

On March 14, 2017, Microsoft released security bulletin MS17-013 to address CVE-2017-0005, a vulnerability in the Windows Win32k component that could potentially allow elevation of privileges. A report from a trusted partner identified a zero-day exploit for this vulnerability. The ... continue reading
figure-1

Five reasons to run SQL Server 2016 on Windows Server 2016 — No. 1: Security

This is the first blog in a five-part series. Keep an eye out for upcoming posts, which will cover cutting costs and improving performance of storage, BI, and analytics; improving uptime and reliability; reaching data insights faster by running analytics ... continue reading
tax-social-engineering-email-malware-4

Tax-themed phishing and malware attacks proliferate during the tax filing season

Tax-themed scams and social engineering attacks are as certain as (death or) tax itself. Every year we see these attacks, and 2017 is no different. These attacks circulate year-round as cybercriminals take advantage of the different country and region tax ... continue reading
nsis-old-vs-new

Ransomware operators are hiding malware deeper in installer packages

We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by changing the way they package malicious code. These ... continue reading