Deep Dive: What is GIT?
First, What is Git? Git is a DevOps tool used for source code management. It is a free and open-source distributed version control system used to manage small and large projects efficiently. Git tracks...
View ArticleMeeting in the Metaverse: AIS Hosts Recruiting Event in AltspaceVR
We recently hosted a hiring event like none we have ever hosted before. Early in the year, we decided to go remote with an tevent and test a Virtual Reality-based format using AltspaceVR, the leading...
View ArticleOptimizing Terraform Projects Part Three: Terragrunt Example
Also in this series: Optimizing Terraform Projects Part One: Terragrunt and Terraform Registry Optimizing Terraform Projects Part Two: Increasing Reusability and Reducing Code Duplication of your...
View ArticleA Step-by-Step Kubernetes Implementation Tutorial
Kubernetes Implementations Steps To install and set up Kubernetes on Windows, load kubectl and install minicube. Minicube is a tool that enables us to run a single node cluster in a VM on a machine....
View ArticleTurn that ‘Power Apps’ App into a Mobile App!
Build Native Applications with Power Apps One of the more sought-after functionalities lacking in low/no-code solutions is the capability to package it as a native mobile app. Such functionality is...
View ArticleWhy Use Azure API Management Self-hosted Gateways?
Technology is ever-evolving and constantly offers us methods to improve procedures, create new products that solve problems, and challenge the status quo by emphasizing – there is always a better way...
View ArticleHow to Migrate Hyper-V VM’s to Azure
Preparation We must prepare our Azure to set the correct permissions and prepare the on-premises Hyper-V hosts and VMs for server assessment and migration. We need to create a new migration project on...
View ArticleTen Thought-Provoking Moments from Gartner IT Symposium/Xpo
This blog will share ten thought-provoking moments from the Gartner IT Symposium/Xpo 2022 conference. The event agenda was rich with overlapping sessions; my observations are based on sessions I could...
View ArticleZero Trust: The Key to Going Passwordless?
We hear an awful lot about Zero Trust security these days. For some, Zero Trust may be a relatively new concept; for others, it is a term that sounds simple enough but can come at a high cost. Today’s...
View ArticleAutomating Scheduled Tasks Using Azure Functions with Middleware
The cloud-oriented domain presents numerous styles of building automated solutions for various personal & business use cases. And there is no such thing as a correct or incorrect solution to these...
View ArticleAzure Functions and Twilio SendGrid API
Recently in a project, there came a requirement where we had to monitor an Azure Storage queue for the count of messages over a given period. We needed to have some notification/Alert system to inform...
View ArticleBenefits of a Customized Content Management System for Non-Technical Clients
Introduction Purchasing a new (or updated) website that requires directly editing HTML code to create (or update) content can be a daunting process for a client. After selecting a company for the...
View ArticleDynamics 365: Navigating Between Forms Using JavaScript
In Dynamics 365, it is common to extend the application’s capabilities to perform specific actions based on complex business logic. The most common way to do this is by utilizing JavaScript Functions...
View ArticleAzure API Management: B2B Security
Azure API Management (APIM) is a cloud service that allows organizations to manage and secure APIs (Application Programming Interfaces). It provides features that enable organizations to securely...
View ArticleDeploy Kubernetes Cluster Using kOps on AWS Cloud
If you are familiar with Kubernetes, you must know Kubernetes installation is one of the challenging topics of Kubernetes. This challenge occurs because a multitude of installation methods exist....
View ArticleUsing Managed Identity Enabled Virtual Machines with Azure DevOps
What is Managed Identity? The password lifecycle can be tedious. Between securely storing, rotating regularly, and ensuring their complexity, they add a hefty burden to IT teams. In comes the use of...
View ArticleConfiguring Azure Databricks Cluster(s) Domain Name Resolution When...
When running production workloads that leverage enterprise services, like DNS, we expect these services to be reliable, available, and responsive. It is assumed that when a client requests an...
View ArticleHow to Automate Scheduled Tasks using Isolated-Mode Azure Functions
The cloud-oriented domain presents numerous styles of building automated solutions for various personal & business use cases. And there is no such thing as a correct or incorrect solution to these...
View ArticleHow to Generate a JWT Token using .NET 6
Why JWT Tokens? JSON Web Tokens (JWT) are an open, URL-safe & industry-standard method of representing claims securely between two parties. JWT Tokens are used for authorization and for exchanging...
View Article.NET Diagnostics in Kubernetes Deployments
Deploying containerized apps to production in Kubernetes with rigorous security practices requires minimizing what is installed on a container image and what can be done in a running container. But...
View Article