Deploying containerized apps to production in Kubernetes with rigorous security practices requires minimizing what is installed on a container image…
Why JWT Tokens? JSON Web Tokens (JWT) are an open, URL-safe & industry-standard method of representing claims securely between two…
The cloud-oriented domain presents numerous styles of building automated solutions for various personal & business use cases. And there is…
When running production workloads that leverage enterprise services, like DNS, we expect these services to be reliable, available, and responsive….
What is Managed Identity? The password lifecycle can be tedious. Between securely storing, rotating regularly, and ensuring their complexity, they…
If you are familiar with Kubernetes, you must know Kubernetes installation is one of the challenging topics of Kubernetes. This…
Azure API Management (APIM) is a cloud service that allows organizations to manage and secure APIs (Application Programming Interfaces). It…
In Dynamics 365, it is common to extend the application’s capabilities to perform specific actions based on complex business logic….
Introduction Purchasing a new (or updated) website that requires directly editing HTML code to create (or update) content can be…
Recently in a project, there came a requirement where we had to monitor an Azure Storage queue for the count…