Are You Ready for Microsoft's Rock, Paper, Azure Challenge?

Microsoft is once again challenging developers in its Rock, Paper, Azure challenge, and they can win up to $5000 by coding a player "bot", hosting it on Windows Azure, and then competing in battles against other contestants for weekly prizes. The contest will be running from now until the middle of the month.

Developers who wish to enter the competition will need an Azure account, which can be as simple as a free Azure trial account. The prize-winning competition is only open to players within the United States, but entries will be accepted from contestants from other countries, and they will still appear on the leader board.

Microsoft is once again challenging developers in its Rock, Paper, Azure challenge, and they can win up to $5000 by coding a player "bot", hosting it on Windows Azure, and then competing in battles against other contestants for weekly prizes. The contest will be running from now until the middle of the month.

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Mobile application management (MAM) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed MAM provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, manages the complete app lifecycle, and enables multiple app distribution methods, including an intuitive, custom-brandable enterprise app store. But, not all mobile application management (MAM) is created equal. Use this …

  • Old Habits Die Hard: The report, which is in its fifth year, polled 1,100 senior IT security executives at large enterprises around the world and indicates an ongoing disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data. While 30 percent of respondents classify their organizations as 'very vulnerable' or 'extremely vulnerable' to data attacks (and the number of breaches continues to rise) the two top spending priorities are network …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date