Working Parents Day recognizes the hardworking moms and dads who put in long hours on the job and at home. It's not easy to find work-life balance, and when you have a family to take care of, it can seem even more elusive. The origins of the day suggest it's a time for kids to give back: do the dishes, clean up around the house, or cook dinner. Since we can't cook you dinner, we'd like to recognize your efforts with two of the most important lessons for working parents to master.
By Adrienne Hall, General Manager, Trustworthy Computing
Most people are familiar with the concept of an arms race. In the world of cybersecurity, this phrase is also in use. A cybersecurity “arms race” typically refers to escalating responses when one party creates a threat, and then a counter-measure is created to meet the new threat head on, resulting in a new baseline which then requires ever more sophisticated attacks in order to be successful. For better or worse many of the significant technological advancements that shape our modern world have been developed, yet we must also live in a world of constant vigilance. Those technologies that are successful often begin with a focus on functionality, then adoption, and eventually they move on to a maturity phase that commonly includes dealing with unexpected issues that arise from the choices made in previous stages.
As evidenced in past Microsoft cybersecurity reports, one of the most common ways in which a system is compromised by cybercriminal activity results from weak passwords. We’ve published a number of resources that can help guide employees on how to develop strong passwords with resources such as our recent “Security Tips & Talk blog” series: 5 passwords you should never use, and Create stronger passwords and protect them. While creating strong passwords is essential, organized crime is now driving a cyber “arms race” and it’s clear that counter measures organizations have implemented to better protect them are frequently playing catch up. Now more than ever is the time to adopt new counter measures that have become available including multi-factor authentication. Read more >>
When it comes to cloud computing, few issues are more important than your company’s choice in cloud provider. There are many different providers to choose from, and each have different capabilities, philosophies, payment models, security measures, and reputations.
In today's article in our Modernizing Your Infrastructure with Hybrid Cloud series,we’ll step through the process of setting up Windows Azure Pack for provisioning and delegating on-demand private clouds. Along the way, we’ll call out specific details that you'll find helpful to successfully build your own private cloud lab environment.
Service Management Portal in Windows Azure Pack
READ THE FULL ARTICLE HERE!
As I’ve been traveling and speaking to IT Pros about the great scalability, resiliency and offerings in our Microsoft Azure public cloud platform, there’s also been lots of interest around deploying our free Windows Azure Pack (WAP) to bring the power and consistency of the same self-service Azure portal user interface to on-demand Private Clouds provisioned in an on-premises datacenter.
In this article, we’ll step through the process of setting up Windows Azure Pack in a lab environment for provisioning and delegating VM private clouds. Along the way, I’ll call out the specific details that I found helpful to successfully build my own lab environment.