This blog post was co-authored by Dinesh Chandnani, Principal Group Engineering Manager, Microsoft.
Standing up a data pipeline for the first time can be a challenge and decisions you make at the start of a project can limit your choices long after the initial deployment has been rolled out. Often what is needed is a playground in which to learn about and evaluate the available options and capabilities in the solution space. To that end, we are excited to be announcing that an internal Microsoft project known as Data Accelerator is now being open sourced.
Data Accelerator started in 2017 as a large-scale data processing project in Microsoft’s Developer Division that eventually landed on streaming on Apache Spark for reasons of scale and speed... Read More
Transparency is an important part of public safety projects. Officials must know what is happening in real time, as well as be able to collaborate with others involved in the project. To create a collaborative and transparent environment, security officials are reinventing their approach to public safety, especially regarding the protection of public buildings. While keeping public buildings safe, smart, and secure is a top priority, it’s also a constant challenge.
Recent advancements in cloud computing, intelligent edge, artificial intelligence, and data analytics create many new opportunities for Internet of Things (IoT) devices to improve public safety... Read More
We are pleased to announce the general availability of the new Azure HDInsight management SDKs for .NET, Python, and Java.
Highlights of this release
- More languages: In addition to .NET, you can now easily manage your HDInsight clusters using Python or Java.
- Manage HDInsight clusters: The SDK provides several useful operations to manage your HDInsight clusters, including the ability to create clusters, delete clusters, scale clusters, list existing clusters, get cluster details, update cluster tags, execute script actions, and more.
- Monitor HDInsight clusters: Manage your HDInsight cluster's integration with Azure Monitor logs. HDInsight clusters can emit metrics into queryable tables in a Log Analytics workspace so you can monitor all of your clusters in one place...
Microsoft Azure is uniquely positioned to help you meet your compliance obligations. Customers need to identify risks and conduct a full risk assessment before committing to a cloud service, as well as comply with strict regulations to ensure the privacy, security, access, and continuity of their cloud environment and downstream customer data in cloud.
Source: Azure Blog
Source Link: Azure resources to assess risk and compliance
This article is the second in a four-part series designed to help companies maximize their ROI on the Internet of Things (IoT). In the first post, we discussed how IoT can transform businesses. In this post, we share insights into how to create a successful strategy that yields desired ROI.
The Internet of Things (IoT) holds real promise for fueling business growth and operational efficiency. However, many companies experience challenges applying IoT to their businesses.
In an earlier post, we discussed why and how to get started with IoT, recommending that companies shift their mindset, develop a business case, secure ongoing executive sponsorship and budget, and seize the early-mover advantage. In this post, we’ll cover the six elements of crafting an IoT strategy that will yield ongo... Read More
Today’s announcement of the Token Taxonomy Initiative (TTI) is a milestone in the maturity of the blockchain industry.
The initiative brings together some of the most important blockchain platforms from the Ethereum ecosystem, Hyperledger and IBM, Intel, R3, and Digital Asset in a joint effort to establish a common taxonomy for tokens. Also joining are other standards bodies like FINRA, enterprises like J.P. Morgan, Banco Santander, and ING and companies pushing the boundaries in blockchain like ConsenSys, Clearmatics, Komgo, Web3 Labs, and others.
Over the past year, the Azure Blockchain engineering team has been working to understand the breadth of token use cases and found that a lack of industry standards was driving confusion amongst our enterprise customers and partners... Read More
Azure and Sylabs announced today a new collaboration which enables Singularity container images to be stored in registries supporting the Open Container Initiative (OCI) Distribution Specification. Singularity version 3.0 defines a new secure Singularity Image Format (SIF).
Azure Container Registry supports storing Helm, CNAB, and other cloud native artifacts in OCI distribution based registries, by working with the OCI Registry as Storage (ORAS) project as a common library to enable various artifact types to be stored. Leveraging the same common library, Singularity Image Format container images can now be stored in Azure Container Registry and other OCI distribution-based registries.
“Compliance with standards emerging from the Open Containers Initiative (OCI) has been a matter of emphas... Read More
Enabling government to advance the mission
Today we’re announcing a significant milestone in serving our mission customers from cloud to edge with the initial availability of two new Azure Government Secret regions, now in private preview and pending accreditation. Azure Government Secret delivers comprehensive and mission enabling cloud services to US Federal Civilian, Department of Defense (DoD), Intelligence Community (IC), and US government partners working within Secret enclaves.
In addition, we’ve expanded the scope of all Azure Government regions to enable DoD Impact Level 5 (IL5) data, providing a cost-effective option for L5 workloads with a broad range of available services... Read More
AzCopy v10 (Preview) now supports Amazon Web Services (AWS) S3 as a data source. You can now copy an entire AWS S3 bucket, or even multiple buckets, to Azure Blob Storage using AzCopy.
Customers who wanted to migrate their data from AWS S3 to Azure Blob Storage have faced challenges because they had to bring up a client between the cloud providers to read the data from AWS to then put it in Azure Storage. This meant the scale and speed of the data transfer was limited to the client in the middle adding to the complexity of the move.
We have now addressed this issue in the latest release of AzCopy using a scale out technique thanks to the new Blob API... Read More
This post is co-authored by Tim Burrell, Principal Security Engineering Manager and Dotan Patrich, Principal Software Engineer.
As cyberattacks become more complex and harder to detect. The traditional correlation rules of a SIEM are not enough, they are lacking the full context of the attack and can only detect attacks that were seen before. This can result in false negatives and gaps in the environment. In addition, correlation rules require significant maintenance and customization since they may provide different results based on the customer environment.
Advanced Machine Learning capabilities that are built in into Azure Sentinel can detect indicative behaviors of a threat and helps security analysts to learn the expected behavior in their enterprise... Read More