New solutions for Oracle WebLogic on Azure Virtual Machines

By Dustin Ward

We are announcing a major release for Oracle WebLogic Server (WLS) on Azure Virtual Machines. The release is jointly developed with the WebLogic team as part of a broad-ranging partnership between Microsoft and Oracle. Software available under the partnership includes Oracle WebLogic, Oracle Linux, and Oracle Database, as well as interoperability between Oracle Cloud Infrastructure…

Azure Cost Management and Billing updates – March 2021

By Dustin Ward

Whether you’re a new student, a thriving startup, or the largest enterprise, you have financial constraints, and you need to know what you’re spending, where, and how to plan for the future. Nobody wants a surprise when it comes to the bill, and this is where Azure Cost Management and Billing comes in. We’re always…

More performance and choice with new Azure HBv3 virtual machines for HPC

By Dustin Ward

HPC-optimized virtual machines featuring AMD EPYC 7003-series processors Today Azure advances the velocity at which we bring the latest technologies to our HPC customers and the compute performance we put at their fingertips. We are excited to announce Azure HBv3-series virtual machines (VMs) for high-performance computing (HPC) are generally available in the East US, South…

Digital event: Extend to the cloud with Azure VMware solution

By Dustin Ward

Find out how to easily shift your VMware workloads to the cloud on your own terms and modernize your investments. Join us on March 23, 2021, from 9:00 AM to 10:30 AM Pacific Time (UTC-8), for the Extend to the Cloud with Azure VMware Solution digital event—delivered in partnership with Intel and VMware—and get to…

Announcing preview of Azure Trusted Launch for virtual machines

By Dustin Ward

Persistent threats like bootkits and rootkits are sophisticated malware types that run with the same kernel-mode privileges as the operating system they infect. Using those privileges, they can hide themselves from diagnostic tools and antimalware, making them extremely difficult to detect and almost impossible to remove. That foothold is typically leveraged by malware to bypass…