Elastic and Microsoft Azure: Unified Observability for Spring Boot applications

By Dustin Ward

Today, we are announcing the availability of Elastic integrations for unified observability of Spring Boot applications on Azure. You can seamlessly ship Microsoft Azure Spring Cloud logs and metrics into Elastic, instrument Spring Boot applications, and monitor every step of your cloud journey. You also get a holistic view across Spring Boot applications and other…

Accelerate your websites with Azure Static Web Apps enterprise-edge

By Dustin Ward

Site performance is crucial when creating applications on the modern web. It has a direct impact on user experience, search engine rankings, and user conversion rates. With Azure Static Web Apps, we’re committed to building a platform that helps you deliver the best results for your users at a global scale. It provides streamlined full-stack…

3 ways to enhance your cloud journey: break, prepare, and optimize your apps in Azure

By Dustin Ward

At our Microsoft Ignite conference this week, we’re sharing new ways to continue to enhance your cloud adoption journey. First, we are excited to announce the preview of Azure Chaos Studio—a fully managed experimentation service to help you track, measure, and mitigate faults with controlled chaos engineering, systemically improving the resilience of your cloud applications. Second, we…

Powering all your applications from cloud to edge with Azure infrastructure

By Dustin Ward

Organizations are transforming from cloud to edge, migrating and optimizing existing workloads, building new cloud-native apps, unlocking new scenarios at the edge, and combining these strategies to meet a diverse set of business needs. Microsoft is committed to helping at every step of the way with continuous technology innovation. Today, we’re announcing product updates and enhancements across the…

Key foundations for protecting your data with Azure confidential computing

By Dustin Ward

The exponential growth of datasets has resulted in growing scrutiny of how data is exposed—both from a consumer data privacy and compliance perspective. In this context, confidential computing becomes an important tool to help organizations meet their privacy and security needs surrounding business and consumer data. Confidential computing technology encrypts data in memory and only…