Azure Storage — Routing Preferences now generally available

By Dustin Ward

Routing Preference for Azure Storage provide the flexibility to optimize traffic between clients external to Azure and your storage account for premium network reliability and performance over the Microsoft global network or for cost efficiency using the transit ISP network. You can now also publish route-specific endpoints for your storage account.

Batch image processing with Amazon Rekognition Custom Labels 

By Dustin Ward

AWS FeedBatch image processing with Amazon Rekognition Custom Labels  Amazon Rekognition is a computer vision service that makes it easy to add image and video analysis to your applications using proven, highly scalable, deep learning technology that requires no machine learning (ML) expertise to use. With Amazon Rekognition, you can identify objects, people, text, scenes,…

Adopting Kotlin at Prime Video for higher developer satisfaction and less code

By Dustin Ward

AWS FeedAdopting Kotlin at Prime Video for higher developer satisfaction and less code Choosing a programming language for a new project is a tough decision with long-lasting effects. This involves considering how well the languages integrate with the team’s existing technology stack, how mature the languages are, and what learning curve is required. For example,…

Digital event: Extend to the cloud with Azure VMware solution

By Dustin Ward

Find out how to easily shift your VMware workloads to the cloud on your own terms and modernize your investments. Join us on March 23, 2021, from 9:00 AM to 10:30 AM Pacific Time (UTC-8), for the Extend to the Cloud with Azure VMware Solution digital event—delivered in partnership with Intel and VMware—and get to…

Azure Defender for Storage powered by Microsoft threat intelligence

By Dustin Ward

This blog post was co-authored with Roy Levin, Senior Data Scientist With the reality of working from home, more people and devices are now accessing corporate data across home networks. This raises the risks of cyber-attacks and elevates the importance of proper data protection. One of the resources most targeted by attackers is data storage,…