Build your IoT devices with Windows for IoT: a comprehensive platform for every device developer

Embedded computing has been around for a number of years. Recent advances in computing such as artificial intelligence, more powerful sensors, and container technology are unlocking new scenarios and creating new paradigms for device developers. As Artificial Intelligence (AI)/Machine Learning (ML) become mainstream, device builders can enable intelligent edge- devices that gather data and analyze […]

The post Build your IoT devices with Windows for IoT: a comprehensive platform for every device developer appeared first on Windows Blog.

Continue reading Build your IoT devices with Windows for IoT: a comprehensive platform for every device developer

Make distance learning fun with Kahoot! and Microsoft Teams

 
We’re thrilled to announce the new Kahoot! integration with Microsoft Teams – bringing Kahoot! challenges directly inside Team for your students to learn and collaborate. Kahoot! is a game-based learning platform that makes it easy to create, s… Continue reading Make distance learning fun with Kahoot! and Microsoft Teams

Lenovo introduces new Windows 10 detachable laptops

Lenovo has propelled its latest consumer lineup forward by introducing two LTE-supported Windows 10 detachables: the Lenovo Yoga Duet 7i and the Lenovo IdeaPad Duet 3i.   The Lenovo Yoga Duet 7i, which weighs in at 2.55 pounds (including its folio case), is the first-ever Yoga PC with a detachable, backlit Bluetooth (5.0) keyboard to […]

The post Lenovo introduces new Windows 10 detachable laptops appeared first on Windows Blog.

Continue reading Lenovo introduces new Windows 10 detachable laptops

When programs assume that the system will never change, episode 1, redux

Back in episode 1, we learned about programs that grabbed undocumented resources from system files. Today’s case is similar, but the culprit is not a program that shipped to customers. Rather, it’s a customer who is using icons from the system in their own internal deployments.
The customer reported that at some point between Windows 7 and t Continue reading When programs assume that the system will never change, episode 1, redux

Monitoring & Alerting – Operations in the Cloud

In this post, App Dev Manager John Tran discuss monitoring considerations and options for Azure.

Monitoring is a core tenant of DevOps. Monitoring our applications provides a health signal, gives us a performance baseline, and helps to notify us when things go wrong. Implementing a robust monitoring plan is important regardless of wheth Continue reading Monitoring & Alerting – Operations in the Cloud

AAD Auth Error – Login failed for user ‘<token-identified principal>’

An error may appear when trying to login to Azure SQL DB using AAD authentication
 
===================================Cannot connect to SERVENAME.database.windows.net.===================================Login failed for user ‘<token-identified … Continue reading AAD Auth Error – Login failed for user ‘<token-identified principal>’

Desired State Configuration Extension and the Replica Domain Controller ARM Template

By now, you have probably examined my code (if not, please click the link). If you are familiar with ARM Templates, the code should seem relatively straightforward. There is one piece that may seem foreign though: the Desired State Configuration (or DS… Continue reading Desired State Configuration Extension and the Replica Domain Controller ARM Template