This blog gives an overview of how to run Chocolatey commands on a remote Azure VM using Custom Script Extension.
To help combat emerging threats, Microsoft employs an innovative Assume Breach strategy and leverages highly specialized groups of security experts, known as the Red Team, to strengthen threat detection, response and defense for its enterprise cloud services.
Last week we introduced breakthrough visualization experiences for the business continuity capabilities in Azure SQL Database. Setting up and administering your geo-replication is easier and more intuitive than ever before.
In this blog post, I want to explain how to use a capability in SQL Server called Integrated Change Tracking to efficiently sync data changes from SQL Server to Azure Search.
We’ve released a number of great enhancements to further improve the DocumentDB management experience. Our October 23rd portal update lights up several new capabilities!
We have made available a new prototype. The purpose of preview versions moving forward is to allow you to have early access to potential new features to test and provide feedback on.
Event Hubs is a new capability now commercially available in Microsoft Azure Service Bus that provides a platform-as-a-service solution.
Today at the annual PASS Summit conference, we announced a new preview of Azure SQL Database coming later this year that represents another major milestone for our database-as-a-service.
Last week we announced PowerShell support for recovery between two Hyper-V sites managed by Azure Site Recovery. The ASR cmdlets can be used to enable protection for virtual machines and performing recovery operations on virtual machines or recovery plan containing virtual machines.
Azure Media Services just announced the public preview of its Live streaming service. This tutorial will show you how to set up live streaming with Azure Media Services .NET SDK.
Just as Azure continues to release new cloud services at a rapid pace, it is also driving innovation in data protection, threat defense, network security, and identity and access management.