Today, we take a giant step toward making the dream of interoperability in healthcare real. Microsoft is announcing the general availability of Azure Health Data Services, a platform as a service (PaaS) offering designed exclusively to support Protected Health Information (PHI) in the cloud. Azure Health Data Services is a new way of working with […]
Join Microsoft Azure at NVIDIA GTC developer conference 2022
The convergence of HPC+AI has opened new pathways for companies and developers worldwide to develop innovative, transformative applications. While this presents a plethora of new business opportunities in fields like academic research, climate modeling, and energy sustainability, they also push the boundaries of compute, data, and process capabilities of the underlying infrastructure so they can […]
The anatomy of a datacenter—how Microsoft’s datacenter hardware powers the Microsoft Cloud
Leading hardware engineering at a company known for its vast portfolio of software applications and systems is not as strange as it sounds, as the Microsoft Cloud depends on hardware as the foundation of trust, reliability, capacity, and performance, to make it possible for Microsoft and our customers to achieve more. The underlying infrastructure that […]
5 reasons to attend the Azure VMware Solution digital event
Imagine getting more from your VMware workloads by easily extending them to the cloud—and optimizing your costs in the process. Azure VMware Solution, a jointly engineered Microsoft and VMware service, makes this possible. Azure VMware Solution lets you run your VMware infrastructure natively on Azure. Migrating your on-premises VMware investments and skills to Azure allows […]
Meet PCI compliance with credit card tokenization
In building and running a business, the safety and security of your and your customers' sensitive information and data is a top priority, especially when storing financial information and processing payments are concerned. The Payment Card Industry Data Security Standard (PCI DSS)1 defines a set of regulations put forth by the largest credit card companies […]
Introducing dynamic lineage extraction from Azure SQL Databases in Azure Purview
Data citizens including both technical and business users rely on data lineage for root cause analysis, impact analysis, data quality tracing, and other data governance applications. In the current data landscape, where data is fluidly moving across locations (on-premises to and across clouds) and across data platforms and applications, it is increasingly important to map […]
Technical leaders agree: AI is now a necessity to compete
AI is enabling new experiences everywhere. When people watch a captioned video on their phone, search for information online, or receive customer assistance from a virtual agent, AI is at the heart of those experiences. As users increasingly expect the conveniences that AI can unlock, they’re seen less as incremental improvements and more as the […]
Microsoft DDoS protection response guide
Receiving Distributed Denial of Service (DDoS) attack threats? DDoS threats have seen a significant rise in frequency lately, and Microsoft stopped numerous large-scale DDoS attacks last year. This guide provides an overview of what Microsoft provides at the platform level, information on recent mitigations, and best practices. Microsoft DDoS platform Microsoft provides robust protection against […]
Azure Cost Management and Billing updates – February 2022
Whether you're a new student, a thriving startup, or the largest enterprise, you have financial constraints, and you need to know what you're spending, where, and how to plan for the future. Nobody wants a surprise when it comes to the bill, and this is where Azure Cost Management and Billing comes in. We're always […]
Stay on top of database threats with Microsoft Defender for Azure Cosmos DB
Databases are constantly evolving to handle new use cases, incorporate more intelligence, and store more data, giving developers and organizations a wide range of database types to meet their varying needs. Because aspects including architecture, capabilities, configuration options, and authentication methods are unique to each database type, so are the security threats—requiring custom security measures […]