Tag: Azure Week

WebSocket, Redis and Go - Learn How to Build a Chat Application
WebSocket, Redis and Go – Learn How to Build a Chat Application
Blog Posts

The WebSocket protocol offers a bi-directional (both server and client can exchange messages) and full-duplex (server or client can send messages at the same time) communication channel that makes it suitable for real-time scenarios such as chat applications etc. The connected chat users (clients) can send messages to the application (WebSocket server) and can exchange messages with… READ MORE

Use Azure to Store SQL Server Backups Offsite
Use Azure to Store SQL Server Backups Offsite
Blog Posts

You always think your environment is setup correctly and that you’re able to recover in case of a disaster. You make backups, test your backups, setup DR solutions and in the end test the DR plan (very important). But, is your SQL Server Backups usable? But have you ever considered a situation where all your… READ MORE

Identity and Access Management
Identity and Access Management
Blog Posts

In non-cloud environments with static configurations, the focus has often been on firewalls and a traffic-centric approach for security. However, in the cloud, resources become dynamic, infrastructure and networking are shared, and users expect access to applications and data from any location at any time. Trying to manage your cloud security with firewall rules alone… READ MORE

Security Governance, Risk, and Compliance (GRC)
Security Governance, Risk, and Compliance (GRC)
Blog Posts

Implementation of Information Security Governance may be subject to multiple priorities and constraints, including financial constraints. To understand the situation for your organization specifically, consider the three major factors below: Governance: security for your organization must not only be correctly designed and applied but must also be tracked and audited. Risk: your organization will have… READ MORE

Build a Strong Cloud Perimeter with Conditional Access
Build a Strong Cloud Perimeter with Conditional Access
Blog Posts

Phew, another article about Conditional Access. That’s right, there a quite a few already. Fortunately, this topic never gets old. Here’s why: In the cloud there are no traditional network perimeters anymore. On-prem appliances are rendered useless as cloud services can be accessed world-wide. All you need is a valid set of credentials to sign-in.… READ MORE

Virtual Kubelet and Kubernetes in a Nutshell
Virtual Kubelet and Kubernetes in a Nutshell
Blog Posts

Today you will learn how to take a web app(it can be any programming language, we used Kotlin) and distribute it using Kubernetes (K8s) and Virtual Kubelet (VK). Well, if you don’t know yet why you should consider distributing your web app – read my post here. So, you are probably asking yourself “what is Kubernetes… READ MORE

Govern Azure Virtual Network (VNet) CIDR Ranges with Azure Policy
Govern Azure Virtual Network (VNet) CIDR Ranges with Azure Policy
Blog Posts

With everything becoming more cloudified, things can get a little more complicated when you need to Govern Azure. That is especially so for networking, even more so if you’re using hybrid networking and connecting your cloud networks to your on-premises networks, either through Site-to-Site (S2S) VPN, or ExpressRoute. If you’re responsible for the network, you want to… READ MORE