If someone asks me what the best and worst thing about SaaS software the answer is easy: it’s constantly changing….
Deploying containerized apps to production in Kubernetes with rigorous security practices requires minimizing what is installed on a container image…
Why JWT Tokens? JSON Web Tokens (JWT) are an open, URL-safe & industry-standard method of representing claims securely between two…
The cloud-oriented domain presents numerous styles of building automated solutions for various personal & business use cases. And there is…
When running production workloads that leverage enterprise services, like DNS, we expect these services to be reliable, available, and responsive….
What is Managed Identity? The password lifecycle can be tedious. Between securely storing, rotating regularly, and ensuring their complexity, they…
If you are familiar with Kubernetes, you must know Kubernetes installation is one of the challenging topics of Kubernetes. This…
Azure API Management (APIM) is a cloud service that allows organizations to manage and secure APIs (Application Programming Interfaces). It…
In Dynamics 365, it is common to extend the application’s capabilities to perform specific actions based on complex business logic….
Introduction Purchasing a new (or updated) website that requires directly editing HTML code to create (or update) content can be…