CQRS (Command Query Responsibility Segregation) is an architectural pattern that separates the responsibilities of reading and writing data in a system. In traditional systems, a single model is used for both reading and writing data. In CQRS, the read and write models are separated, allowing for more optimized and scalable solutions. In CQRS, the write... Continue Reading →
Operations in an IT organization, Explained.
Operations in an IT company refer to the processes and systems responsible for delivering products or services to customers. This includes managing and organizing resources, such as people, technology, and facilities, to ensure the efficient and effective delivery of IT solutions. Operations also involve monitoring and improving the performance of these processes, as well as... Continue Reading →
Azure Sentinel, KQL and Azure Playbooks explained
Azure Sentinel is a cloud-native Security Information and Event Management (SIEM) and Security Orchestration Automated Response (SOAR) solution. It helps organizations to detect, investigate, and respond to security threats across their entire organization by collecting data from various sources and providing a unified view of the organization's security posture. Creating an Azure Sentinel workspace and... Continue Reading →
Azure ServiceBus (Quotas and limits) with Azure functions
Azure Service Bus is a fully managed enterprise integration message broker. It provides a reliable and secure platform for asynchronous transfer of data and state across services and devices. Service Bus allows you to send and receive messages between services and applications, even when they are offline. Service Bus has several features that enable you... Continue Reading →
Benchmarking in .NET – Explained
BenchmarkDotNet is a from the recent past, a very impressive valuable .NET library for benchmarking .NET code. It is designed to make it easy to write and run benchmarks for .NET code, and provides a range of features such as automatic warm-up, precision control, and support for multiple platforms. To use BenchmarkDotNet, you first need... Continue Reading →
Azure Blueprints vs Terraform
Azure Blueprints is a feature of Azure that enables organizations to define and manage infrastructure and resource governance patterns as a set of artifacts called blueprints. These blueprints can be used to consistently deploy and manage Azure resources across an organization, helping to ensure that all resources are compliant with the organization's governance policies and... Continue Reading →
Azure Virtual Network Manager
Azure Virtual Network (VNet) Manager is a cloud-based tool provided by Microsoft that enables users to manage and configure virtual networks in the Azure cloud. It allows users to create and configure virtual networks, as well as manage the resources and services within those networks. Using Azure VNet Manager, users can create virtual networks and... Continue Reading →
Azure Migrate, Databox and steps to migrate OnPrem DB into Azure
Azure Migrate is a cloud-based tool provided by Microsoft that helps organizations move their on-premises workloads to the Azure cloud. It provides a range of features to assist with the migration process, including assessment, planning, and migration of workloads. One of the main features of Azure Migrate is the assessment tool, which helps users determine... Continue Reading →
Azure Digital Twin and its use cases
Azure Digital Twin is a cloud-based platform service that enables users to model and simulate the physical environment and connected devices in the Internet of Things (IoT). It allows users to create a virtual representation of a physical environment, including the relationships and interactions between objects and devices within that environment. Using Azure Digital Twin,... Continue Reading →
Azure Web Application Firewall (WAF) explained
Let us understand OWASP first The Open Web Application Security Project (OWASP) is a nonprofit organization that works to improve the security of software and the internet. OWASP provides a range of resources, including guidelines, tools, and training materials, to help developers and organizations build and maintain secure applications. One of the main resources provided... Continue Reading →
You must be logged in to post a comment.