Missed Last week’s top posts? Dont Worry! Read our quick round-up below

Azure for Java developers – Tutorials, API Reference

Get started developing apps with Azure using the resources below to find great tutorials and tools for Java developers.

Read More

Azure AD authentication extensions for Azure SQL DB and SQL DW tools

With the latest SQL server tools release we extended the Azure AD authentication support for SQL DB and DW tools for token-based authentication (Universal authentication) with MFA support.

Read More

Top 10 Steps to Building a Better Password

As a longtime cybersecurity enthusiast, I’m intrigued whenever there is a huge headline-making, media-frenzied security breach. Eventually, my curiosity gives way to disappointment. The fight against cyber crime never ends, but winning a battle or two would be nice.

Read More

Why your team needs an Azure Stack Operator

Azure Stack is an extension of Azure, bringing the agility and fast-paced innovation of cloud computing to on-premises environments. With the great power of Azure in your own datacenter, comes the responsibility of operating the cloud – Azure Stack.

Read More

What’s new in Office 365 this week?

Getting your invoice via email instead of needing to sign in, an updated list of known safe websites, and knowing when a OneDrive folder is shared are new features in Office 365 this week.

Read More

How Azure Security Center aids in detecting good applications being used maliciously

We’ve written in the past about how Azure Security Center helps detect malicious activity on compromised VMs, including a post detailing a Bitcoin mining attack and one on an outbound DDoS attack. In many cases, attackers use a set of malicious tools to carry out these and other actions on a compromised machine. However, our team of security researchers have identified a new trend where attackers are using good application to carry out malicious actions. This blog will discuss the use of known hacker tools and those tools that are not nefarious in nature, but are being used maliciously, and how Azure Security Center aids in detecting their use.

Read More

Microsoft releases Cumulative Update Build 14393.1613 for Windows 10 Anniversary Update users

Microsoft today released Cumulative Update Build 14393.1613 to Windows 10 Anniversary Update users. This update does not include any new features, but it includes many bug fixes. For example, this update fixes the annoying issue where the UAC prompt appears hidden under other opened windows. Find the full change log below.

Read More

Reference Architecture for a high availability SharePoint Server 2016 farm in Azure

The Azure CAT Patterns & Practices team has published a new reference architecture for deploying and running a high availability SharePoint Server 2016 farm in Azure.

Read More

Azure Event Grid streamlines IoT event routing

The proliferation of connected devices is creating new opportunities for business – from connected cars and cities to sensors in manufacturing plants, on farms and more. As more companies turn to cloud-powered IoT solutions to transform their business, the more important “events” become to automating actions in IoT scenarios. An event can be a change in an IoT device, a click on a mobile app or a new data entry in a customer database. In the connected world, events set in motion a process, and are therefore significant to modern cloud applications. To manage such large quantities of data and devices, businesses face a critical need to be able to learn about and react to relevant events efficiently, and easily integrate their business applications.

Read More