Last week, Microsoft released a new update that adds pod sandboxing support to its Azure Kubernetes Service (AKS). The new feature allows organizations to run modern applications on AKS in an isolated and secure environment. Microsoft explained that it’s a standard practice to use Kubernetes for hosting and managing modern applications in cloud environments. However,…
Aidan Finn discusses App Services on Linux, what this service is, how it differs to the Windows Server offering, and what you can do with the Linux alternative.
Aidan breaks down some Azure features that allow you to obtain better disk performance with virtual machines.
Learn about the new features and changes to Hyper-V in the recent 1709 semi-annual channel release of Windows Server.
Microsoft is continuing to build out its security services with a new offering for MacOS and new features for ATP as well.
As Microsoft continues to evolve its business in a world without Windows, the company wants to be known as the productivity kings, not the developer of operating systems.
PowerShell MVP Jeff Hicks continues his exploration of the information stream in v5 and demonstrates how to use Write-Host as a wrapper.
Some people worry that Exchange Online mailboxes could be compromised by ransomeware and people will be forced to pay BitCoin to decrypt their messages. It’s certainly a possibility, but out-of-the-box solutions exist if you’re unlucky enough to be infected. That is, if you’ve done the necessary up-front planning to prepare for the worst to happen.,
Microsoft has officially unveiled Windows Nano Server, but what does the news mean for system administrators? Russell Smith provides his thoughts in his latest commentary.
Last Update: Jan 05, 2024
Sometimes you need to backup a virtual machine that needs to remain in a running state. Volume Shadow Copy Service allows volumes to be backed up while applications continue to write to those volumes. In order to perform this task properly, you must first register the Hyper-V VSS writer with Windows Server Backup. The following article explains how this is accomplished.