News & Blogs
News and Events
Latest From Our Blogs
Buyer’s guide: Comparing the leading cloud data platforms
Choosing the right data platform is critical for the modern enterprise. These platforms not only store and protect...
OpenAI launches stateful AI on AWS, signaling a control plane power shift
Stateless AI, in which a model offers one-off answers without context from previous sessions, can be helpful in the...
[Launched] Generally available: Azure Premium SSD v2 Disk Storage is now available in a third Availability Zone in New Zealan North
Azure Premium SSD v2 is now available in a third Availability Zone in New Zealand North. Azure Premium SSD v2 disk, a...
[Launched] Generally Available: DCesv6, DCedsv6, ECesv6, and ECedsv6 confidential VMs
The DCesv6, DCedsv6, ECesv6, and ECedsv6 series are Azure’s next generation of confidential Virtual Machines (VMs)...
Red Hat ships AI platform for hybrid cloud deployments
Red Hat has made its Red Hat AI Enterprise platform generally available, with the intent to provide an AI platform to...
Retirement: Managed NGINX Ingress with Application Routing Add-on Retiring November 2026
The upstream Ingress-NGINX project is being deprecated and will stop receiving updates after March 2026. Microsoft...
‘Silent’ Google API key change exposed Gemini AI data
Google Cloud API keys, normally used as simple billing identifiers for APIs such as Maps or YouTube, could be scraped...
FinOps for agents: Loop limits, tool-call caps and the new unit economics of agentic SaaS
The first time my team shipped an agent into a real SaaS workflow, the product demo looked perfect. The production...
[Launched] Generally Available: Azure Red Hat OpenShift is now available in Malaysia West, New Zealand North, and Mexico Central
Azure Red Hat OpenShift is now generally available in three additional Azure regions: Malaysia West, New Zealand...
Enterprise Spotlight: Data Center Modernization
The reliability cost of default timeouts
In user-facing distributed systems, latency is often a stronger signal of failure than errors. When responses exceed...
Sovereignty isn’t a toggle feature
Sovereignty, locality, and “alternative cloud” strategies are often treated as simple settings in hyperscaler...
Google’s Android developer verification program draws pushback
Google’s planned Android developer verification program, requiring Android apps to be registered by verified...
Lightrun unveils AI SRE to find and fix software production errors
Lightrun has announced Lightrun AI SRE, an AI-powered site reliability engineering (SRE) assistant designed to detect...
[In preview] Public Preview: Restrict usage of user delegation SAS to an Entra ID identity
We’re excited to announce the addition of enhanced secure authentication in Azure Storage that combines the...
The browser is your database: Local-first comes of age
Once upon a time, we had mainframes with simple, nonprogrammable consoles. All the power was centralized. Then, Gates...
The best new features of C# 14
Available as a part of .NET 10, which was released last November, C# 14 brings a plethora of new features and...
Three web security blind spots in mobile DevSecOps pipelines
We know that mobile development in 2025 was different. It shifted from a “front-end” concern to a massive, distributed...
Abandoned project linking Java, JavaScript makes a comeback
Once envisioned as a bridge between Java and JavaScript, the Detroit project never got off the ground. Now, there are...
[In preview] Public Preview: Secure ingestion and pod placement for Azure Monitor pipeline
We are announcing several capabilities in public preview with Azure Monitor pipeline. Secure Ingress to Azure Monitor...