Tatsuro Shibamura

My feedback

  1. 10 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura shared this idea  · 
  2. 7,854 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    201 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura commented  · 
    Tatsuro Shibamura commented  · 
    Tatsuro Shibamura commented  · 
  3. 540 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    20 comments  ·  Networking » Load Balancer  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 
  4. 52 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Container Instances  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 
  5. 217 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    9 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 
  6. 591 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  12 comments  ·  Networking » Content Delivery Network  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 
  7. 1,090 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    43 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 
  8. 3,323 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    132 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 
  9. 1,003 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    37 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 
  10. 3 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Monitor-Application Insights » SDK  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura shared this idea  · 
  11. 4,650 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    144 comments  ·  Storage » Blobs  ·  Flag idea as inappropriate…  ·  Admin →

    You can now use the Azure CDN to access blobs with custom domains over HTTPS. See the following article for instructions on how to do so: https://docs.microsoft.com/en-us/azure/storage/storage-https-custom-domain-cdn. Having talked to a number of customers, we concluded that this solution addresses many scenarios where the need for HTTPS access to blobs with custom domains exists.

    Native Azure Storage support for using SSL to access blobs at custom domains is still on our backlog. We would love to hear about your scenarios where using the Azure CDN is not an acceptable solution, either by posting on this thread or sending us an email at azurestoragefeedback@microsoft.com.

    Tatsuro Shibamura supported this idea  · 
  12. 3,818 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    127 comments  ·  Azure Cosmos DB  ·  Flag idea as inappropriate…  ·  Admin →

    Reopening this user voice item as our support for Skip/Take (Offset/Limit) was only limited to single partition queries.

    Update.

    The newly released .NET SDK v3 now includes support for x-partition queries using Offset/Limit. You can learn more about v3 SDK and try it and provide feedback on our github repo here.
    github.com/azure/azure-cosmos-dotnet-v3

    We will also be back-porting this functionality to our .NET v2 SDK. This work will begin shortly and we anticipate it to be released in September.

    Once that is released we will mark this feature as complete.

    Thank you for your patience and votes.

    Tatsuro Shibamura supported this idea  · 
  13. 371 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  5 comments  ·  Azure Search » Client SDK  ·  Flag idea as inappropriate…  ·  Admin →
    Tatsuro Shibamura supported this idea  · 

Feedback and Knowledge Base