Modeling IoT Data in Azure Times Series Insights Preview

The Time Series Model (TSM) within Azure Time Series Insights Preview enables IoT architects to create custom models to contextualize IoT telemetry data. Using these models, end users can compute, correlate, explore, and analyze their IoT telemetry dat… Continue reading Modeling IoT Data in Azure Times Series Insights Preview

Self-service application access management for the Power Platform using the Power Platform!

Providing access to a canvas application built on Power Apps is actually very easily done.  Simply share the application to a security group, and all of those group members will have access to it.
 
https://docs.microsoft.com/en-us/powerapps/… Continue reading Self-service application access management for the Power Platform using the Power Platform!

Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Astaroth is back sporting significant changes. The updated attack chain maintains Astaroth’s complex, multi-component nature and continues its pattern of detection evasion.
The post Latest Astaroth living-off-the-land attacks are even more invisible bu… Continue reading Latest Astaroth living-off-the-land attacks are even more invisible but not less observable

Defending the power grid against supply chain attacks—Part 2: Securing hardware and software

The hardware and software companies who supply utilities must implement better security of their build and update environment to reduce the risk of an attack on critical infrastructure.
The post Defending the power grid against supply chain attacks—Par… Continue reading Defending the power grid against supply chain attacks—Part 2: Securing hardware and software

Helping IT admins set up secure work from home using Microsoft Endpoint Manager

A new endpoint management blog series has been published in the Enterprise Mobility + Security Blog  to help IT admins quickly enable remote work, where suddenly hundreds of people are using personal PCs and mobile devices at home or are sharing w… Continue reading Helping IT admins set up secure work from home using Microsoft Endpoint Manager

New, simpler way to sign-in to Azure Database for PostgreSQL – Single Server using Azure AD

Once you start having a large amount of databases, or more than one engineer on the team, management of your database users and their associated passwords can become a problem. It’s difficult to keep track of who has access and apply security policies … Continue reading New, simpler way to sign-in to Azure Database for PostgreSQL – Single Server using Azure AD

Coyote: Making it easier for developers to build reliable asynchronous software

For developers, writing bug-free software that doesn’t crash is getting difficult in an increasingly competitive world where software needs to ship before it becomes obsolete. This challenge is especially apparent with online cloud services, which are often dictated by aggressive shipping deadlines. Cloud services are distributed programs comprising multiple back-end systems that continuously exchange asynchronous […]

The post Coyote: Making it easier for developers to build reliable asynchronous software appeared first on Microsoft Research.

Continue reading Coyote: Making it easier for developers to build reliable asynchronous software