Microsoft Partners Cluster Reply, Solidsoft Reply, Valorem Reply and WM Reply, are participating in "Microsoft Ignite" with a single virtual stand where participants can discover all the latest on Microsoft solutions.
Reply announces it has become a Microsoft Azure Expert Managed Services Provider (MSP), which is a status awarded to only a small number of highly capable Microsoft managed services provider partners worldwide.
Microsoft Azure supports 4 different replication services, locally-redundant storage, zone-redundant storage, geo-redundant storage and read-access geo-redundant storage (also known as LRS, ZRS, GRS and RA-GRS respectively.)
Microsoft Azure Service fabric makes use of many new service application methods to allow new ways to develop code in a better, more efficient and more rounded way.
Solidsoft Reply, the Reply Group company creating enterprise strength solutions on-premises and utilising the Microsoft Azure cloud platform, takes part in Integrate 2018 in London.
Now that you have started using Microsoft Azure as the technology platform to run your business, have you thought about disaster recovery? Solidsoft Reply hosts an exclusive ½ day workshop: Disaster Recovery as a Service, where you will learn how Solidsoft Reply is using Microsoft Azure Site Recovery to provide a business continuity service to customers.
Retail is facing the challenge to change their existing business models, in order to stay competitive by offering convincing customer experiences and advanced services. Solidsoft Reply supported a major UK food retailer to achieve a comprehensive, connected and real-time view of stock, delivery and of their customers enabling the retailer to evolve their business in accordance with the customer needs.
In this article we the benefits of Microsoft Azure Active Directory B2C component which provides out of the box functionality for identity management. This eases the development and maintenance of applications that require login functionality and credentials management
Are you developing APIs and want to manage their full lifecycle? Concerned about usage, security and scaling your APIs? Azure API Management provides turkey solution to manage these concerns. Use the API Management portal in Azure to secure, publish and monitor your API Program.
Rotating access keys on a regular basis is good security practice. This post looks at how to simplify the task of updating Azure Service Bus shared access keys in BizTalk Send Ports and Receive Locations.
In this article we discuss Serverless computing suing Azure Functions which enables you to build applications without the worry of maintaining or provisioning Virtual Machines in the Cloud
In this article, we discuss the benefits of Microservices and how Microsoft Service Fabric simplifies the building and deploying of microservices-based applications.
Want to build Microservices on the Cloud? With Azure Service Fabric and Azure Container Service, Microsoft now provides you the choice to build Microservices with a Paas plaform using .Net or alternatively.
High-profile cyber-attacks have been making the news recently. In this article, we will look at the benefits of using Azure Security Centre to secure your cloud based solution and protect it from threats.
The choice between your cloud services provider is an important one, and making the right decision could save your business money in the long run. This post will help to highlight some of the features of two of the key players in the game: Amazon Web Services (AWS) and Microsoft Azure.
Building workflow or Integration based apps for the Cloud is a lot more easier now. With Azure's Logic App offering developers can now develop Simple or complex Workflow or Integration apps to be hosted on Azure. For more complex B2B scenarios developers can used the Enterprise Integration pack to integrate on-premises to Cloud business processes.
Solidsoft Reply, who are the Reply group Company who specialise in creating solutions on the Microsoft Azure cloud platform, has signed a multi-year agreement with the newly incorporated, not-for-profit Czech Republic National Medicines Verification Organisation.
Solidsoft Reply, the Reply group Company who specialise in enterprise strength solutions on the Microsoft Azure cloud platform, has signed an agreement to implement and operate the National Medicines Verification System in Lithuania.
When creating a virtual machine in Azure, Microsoft provide a set of images for you to use that your virtual machines get built from. These include simple images such as Server 2012 r2 with nothing installed up to images with different operating systems and various pieces of software already installed, such as Ubuntu, CentOS and many third party applications. There are other reasons why you may want to use a custom image.
There have been a number of new security enhancements recently to control and audit access to Azure SQL databases. These include Auditing, Dynamic Data Masking, Row-level Security, and Transparent Data Encryption. In this first part I give my assessment of auditing and dynamic data design and how likely I am to be using them.
Database management tools, such as SQL Server Management Studio (SSMS) are mature products in daily use by database professionals around the world. This makes me wonder why Microsoft bothered producing their Silverlight-based Azure SQL Database Management Portal.
What I fundamentally need to achieve for HADR is a database system that is, as much as possible, always available ('online and accessible'), complete ('no data loss'), and accurate ('no data corruption'). For the purpose of this discussion, I am ignoring backup strategies on the assumption that they exist primarily to roll back databases to a previous known state.
The data mining tools in SSAS (multidimensional mode) have been available since SQL Server 2000, and the range of data mining algorithms that are bundled are generally considered to be sufficient for most requirements.
I had planned to review Row-level Security and Transparent Data Encryption (TDE), but support for TDE has not been announced yet (even though I can see the relevant system tables in V12 databases). So in this part I will just be giving you my assessment of row-level security.