Emerging Technologies

Emerging technologies include a variety of technologies such as educational technology, information technology, nanotechnology, biotechnology, cognitive science, psychotechnology, robotics, and artificial intelligence.

Azure in Germany–a complete EU cloud computing solution

With my earlier article Azure in China, it came in to my interest to look for any other country/region specific independent cloud data center requirements.  I came across Azure for US Govt(Similar to Amazon Govt Cloud) instance and Azure Germany…
Read more

Azure in China

Microsoft Azure presence in China is always a question when there is a need for any customer to deploy azure applications specifically for Chinese Regional customers. Recently I had an interaction with a Microsoft Certified Trainer, who carelessly said Azure…
Read more

Introducing Azure IoT Edge

During Build! 2017 Microsoft has announced the availability of Azure IoT Edge, which would bring in some of the cloud capabilities to edge devices/networks within your Enterprise. This would enable industrial devices to utilize the capabilities of IoT in Azure…
Read more

Azure CosmosDB – a multi-model, multi-API for highly scalable applications

Azure Cosmos DB is the next generation globally distributed multi model database from Microsoft. Cosmos DB has been built from scratch in mind with efficient global distribution and horizontal scalability aspects as the core. Azure Cosmos DB guarantees single-digit-millisecond latencies…
Read more

IoT Central–Microsoft’s SaaS solution for IoT

Microsoft has today released their IoT SaaS offering for customers and partners called as “Microsoft IoT Central”.  IoT Central enables powerful IoT scenarios without requiring cloud solution expertise and also simplifies the development process and makes customers to make quick…
Read more

IoT Security–Essentials–Part 01

Security(Cyber Security) is an essential requirement for any IoT platform or devices or end users and the communication infrastructure.  In order to achieve or design best possible security solutions,  to avoid some external entity or hacker gaining access to your…
Read more