Following on the heels of last week’s announcement, I am pleased to announce more news about our efforts to deliver a rich, connected set of data services on Azure, as part of our broader data platform.
Part 2 in a series of posts that will help you audit the life cycle of media assets (with sample code). Part 2 specifically focused on tracking assets as they are copied from Storage to VMs for media processing.
Greetings. Microsoft Press has recently released a free ebook (available in PDF, Mobi, and ePub) called Building Cloud Apps with…
Recovery plans in Azure Site Recovery can enable a one-click recovery of virtual machines to Azure. Read on how to build and customize them for your workloads.
The Storage Service was initially introduced in 2008, and since then we have released seven version updates, each refining the…
Today, we are excited to announce the release of Visual Studio 2013 Update 3 and Azure SDK 2.4 for .NET….
Addressing feedback on the usage of asynchronous calls in Android, we’ve released a major update in the Android SDK for Azure Mobile Services with futures support. With that, you can now easily perform multiple of those operations without having to deal with multiple nested callbacks. The changes are additive in most of the scenarios, but in some advanced scenarios we made a breaking change to make futures the default model used by the Azure Mobile Services Android SDK for dealing with asynchronous operations.
Auditing, geo-restore and geo-replication help deliver added data protection for your database.
This post provides sample code that can be used as a starting point for planning a monitoring system for your application built on top of Media Services.
The best mobile apps handle network interruptions gracefully, allowing users to be productive despite the lack of connectivity. Learn how you can use the offline sync feature of Azure Mobile Services to create responsive apps that work, even when the network doesn’t.
In a multi-tenant environment where customers share a number of IP addresses, it’s not uncommon to have malicious content on a site or two. In some case they may be result of compromise and in other cases this may be intentional.