Posted in: Blog

Microsoft Edge – Understand the Security Feature

In recent years, malicious attacks on applications such as browsers and document readers have become more common and keeping up with new threats is even harder. Software isolation seeks to contain the damage in the event an application is successfully compromised by an exploit. Microsoft Edge and Microsoft Defender Application Guard (formerly Windows Defender Application […]

Posted in: Blog

How to Consume Cognitive Services from a container

Once your Cognitive Services are deployed, applications consume from the containerized Cognitive Services endpoint rather than the default Azure endpoint. Your sample application can be a list of documents representing health worker notes. The application will use the correct Cognitive Services library to consume a prediction from the containerized endpoint. In this case, you will […]

Posted in: Blog

How to Secure a Hosting Container

Security of your Cognitive web hosting services endpoints is critical to keep sensitive data protected and avoid a nefarious person using resources that cost you money. Azure Cognitive Web Hosting Services, which are not containerized, require you to authenticate with a subscription key by default. However, when running as a container those permissions are not […]