CSE Developer Blog

Communicating with Man’s Best Friend, Part I – Dog Tracking
Communicating with Man’s Best Friend, Part I – Dog Tracking
With the arrival of commodity depth-capable cameras, specifically, the Microsoft Kinect, as well as high-performance machine learning algorithms, entirely new capabilities are made possible. Working with academic experts and others, we are attempting to track the movements, body language, and vocalizations of dogs. The overall goal of this ...
Leveraging HDInsight from On-Premises Hadoop
Leveraging HDInsight from On-Premises Hadoop
In big data solutions, compute is expected to takes place where the data resides, mainly due to the cost of moving very large scale data across clusters. However there exist scenarios where more compute capacity is needed than the on-premises cluster provides. To avoid moving large chunk of data around, the beneficial scenario consists of a ...
Parallelized Bulk Copy of Data from AWS to Azure
Parallelized Bulk Copy of Data from AWS to Azure
For various reasons, many customers want the ability to easily and efficiently move data from Amazon Web Services’ Simple Storage Service (S3) to Microsoft Azure storage. In this Case Study, you’ll see how to take the simple notion of cloud file-copy and make it fast and efficient using parallel techniques. There are several solutions ...
Bootstrap Enterprise Single Page Applications with Continuous Azure Integration
Bootstrap Enterprise Single Page Applications with Continuous Azure Integration
When developers embark on a new web application project, they often seek technical guidance for where to start, which technologies to use, how to work through platform integration issues, etc. New technologies are emerging at a record pace, so developers spend a lot of time and energy deciding which frameworks are the most trusted and well-...
Deis: Running a Heroku-Style Platform on Azure
Deis: Running a Heroku-Style Platform on Azure
Deis is a lightweight application platform that deploys and scales Twelve-Factor apps as Docker containers across a cluster of CoreOS machines. Practically speaking, it enables users to self-host a platform implementing the Heroku workflow without being dependent on Heroku. Prior to the coding engagement, installing the Deis platform on ...
Distributing Line of Business (LoB) Apps in Enterprises
Distributing Line of Business (LoB) Apps in Enterprises
In this post, you’ll learn how one large enterprise determined the best deployment mechanism to be used for distributing their Windows line of business application. Xerox executes signed service contracts with customers ensuring copiers, printers, and other devices continue operating with minimal downtime. As such, Xerox must execute well...
Background and floor removal from depth camera data
Background and floor removal from depth camera data
Computer vision is used in various industries to process camera data as part of an analytics pipeline. Examples of usage of computer vision range from automated surveillance camera systems in public spaces to quality and stability monitoring of paper machines. This document introduces a reusable pattern and set of algorithms for extracting ...
AllJoyn 101: Getting Started with AllJoyn using the Heatworks Model 1
AllJoyn 101: Getting Started with AllJoyn using the Heatworks Model 1
The problem that ISI Technology –- and all companies developing Internet-of-Things devices – faced was the challenge of adding network accessibility to their physical device. ISI chose AllJoyn as the protocol the Heatworks Model 1 would implement to enable it to work with a variety of other devices. During the Microsoft Ventures Redmond ...
Storing Data Securely in Azure Blob Storage
Storing Data Securely in Azure Blob Storage
When building applications which require data encrypted at rest and on-the-wire there may be significant complexity added to the software development process. Organizations building these types of applications must not only invest in the additional resources to write the code, but they must also ensure the implementation is actually secure...