Tags » Microsoft Visual Studio

Summary Build Developer Conference 2015: Day 1

Windows 10 gets demoed on Arduino and Raspberry Pi
This was hinted yesterday during the demo of HoloLens on a Raspberry Pi robot, but today Microsoft went a little further in its demo that ran its Windows 10 OS on… 137 more words

Windows Phone

Microsoft Visual Studio’s App Development Project with IMSA Ready for Launch

DAYTONA BEACH, FL – April 30, 2015 – (Motor Sports Newswire) – Microsoft Visual Studio and the International Motor Sports Association (IMSA) are set to unveil a new cutting-edge mobile app for race fans this weekend after months of hard work. 695 more words


Microsoft Releases Visual Studio 2015 Release Candidate With Support For Universal Apps

Microsoft is launching the release candidate of Visual Studio 2015 today at its Build developer conference in San Francisco. As expected, this new release includes a number of bug fixes and UI polish, but more importantly, it now supports Universal Apps that can run on any Windows 10 device, including phones, tablets, PCs, Xbox and Microsoft’s HoloLens augmented reality project. 207 more words


Microsoft Launches Visual Studio Code, A Free Cross-Platform Code Editor For OS X, Linux And Windows

At its Build developer conference, Microsoft today announced the launch of Visual Studio Code, a lightweight cross-platform code editor for writing modern web and cloud applications that will run on OS X, Linux and Windows. 425 more words


Azure Key Vault – Step by Step (BYOK) – Part 2

Create and configure a key vault

Let’s get back to key vaults. During this preview, the management interface to Azure Key Vault is Azure PowerShell. Derick installs the… 444 more words


Azure Key Vault - Step by Step (BYOK) - Part 1

What is Azure Key Vault?

Azure Key Vault—currently in Preview—helps safeguard cryptographic keys and secrets used by cloud applications and services. By using Azure Key Vault, you can encrypt keys and secrets (such as authentication keys, storage account keys, data encryption keys, .PFX files, and passwords) by using keys that are protected by hardware security modules (HSMs). 373 more words