PowerShell Basics: Retrieving Azure Key Vault Certificate

Microsoft’s Azure Key Vault manages cryptographic keys and certificates used by cloud applications and services. Some instances may require the use of said certificate stored in Azure Key Vault on a computer, or some hosted service. Use of PowerShell is the quickest way to accomplish this via the following steps: With the Azure PowerShell tools…


Build Intelligent Robots with EZ-Robot and Microsoft Cognitive Services

What if a robot could tell how you are feeling? Microsoft Cognitive Services is a set of APIs and SDK services that can enable developers to easily add features that can detect emotion, identify objects and understand language understanding into their applications. Imagine utilizing that same set of features in a robot. Enter Calgary based…


Step-By-Step: Configuring a site-to-site VPN Gateway between Azure and On-Premise

Using site-to-site VPN gateway can provide better continuity for your workloads in hybrid cloud setup with Azure. This post will demonstrate how to set up site-to-site VPN Gateway to enable this. Requirements  Before start make sure you have following in place. 1) VPN device: A VPN device is needed on-premise to create the VPN connection with…


Tackling the Dragon – Converting a Java Based Game to Universal Windows Platform

Ragnarök is Nigh. Hamilton Ontario based Thrive games have been working on their lead game, Dragon of Legends for sometime with aspirations of delivering their game to the Steam platform.  The game uncovers countless mysteries of the past as players battle across platforms in a vibrant 2D world inspired by Celtic and Norse mythology. Our…

1

Harnessing Chatbots via Xamarin.Forms to Automate Disaster Recovery Resource Obtainment

Recently Microsoft partnered with Robust Choice Cloud Solutions to create an intelligent solution that would enable two-way mass communication with citizens affected by natural disasters. Robust Choice Cloud Solutions Inc., is a Canadian startup company formed out of the University of British Columbia’s entrepreneurship center in 2013. Robust Choice emerged from years of cutting-edge academic…


Step-By-Step: Migrating Active Directory FSMO Roles From Windows Server 2012 R2 to 2016

With Windows server 2016 was released for public (GA), many businesses are working on migrating their services to the new offering. This post will walk you through the steps needed to migrate Active Directory FSMO roles running on Windows Server 2012 R2 to Windows Server 2016 Active Directory. The same steps are valid for migrating…


Teaching Drones to Aid Search and Rescue Efforts via Cognitive Services

InDro Robotics, a drone operating outfit based in Salt Spring Island British Columbia, recently connected with our team at Microsoft to explore how they could better enable their drones for search and rescue efforts. The team joined forces to create a Proof of Concept to test the ability of automatic object detection to transform search…


Step-By-Step: Securing a Xamarin app with Azure AD’s Multi-factor Authentication

In a recent collaboration between PCL and Microsoft, the team came together to digitally transform a manual onboarding process for contractors at local jobsites. The current paper-based process, with its triplicate impact forms, meant high costs for PCL in both form printing and the manual input hours clocked by the PCL Human Resources team.  Plans…

0

Step-By-Step: Getting Started with Azure Machine Learning

Artificial Intelligence (AI) study and use is on the rise.  Tools to enable AI are becoming more readily available, simpler to use and easier to implement.  What’s more is that the definition of AI itself has been broken down into ingredients that, when later applied into a recipe (or process), can provide multiple desired outcomes.  One of the…

0

Step-By-Step: Enabling Advanced Security Audit Policy via DS Access

Active directory, from a security perspective, is one of the more impactful services within an organization. Even small changes in Organization’s AD can cause a major business impact. Preventing any unauthorized access and unplanned changes in an AD environment should be top of mind for any system administrator. Should changes or unauthorized access happen within your AD environment, would you have enough…

0