Scheduled jobs are common in software systems, most of them perform some kind of a network or data related activity, outside the main execution context and triggered based on a timer event. There are several options available in Azure to implement scheduled jobs. Serverless options Azure Scheduler Azure Batch Custom code in VMs Before digging … Continue reading Schedule Jobs in Azure
Cloud has the proven promise of great opportunities for organizations & ISVs. Modern cloud platforms have low entry barriers and huge array service offerings beyond traditional enterprise application requirements. Cloud and the services provide intact environment to SaaS application providers with cutting edge innovation, agility and computational and storage scale for the global reach.
We keep the credentials and other secrets of the application in the source files. These secrets are visible to developers and being pushed to the source control. In order to avoid this, we can keep the secrets in centralized key management systems - but the credentials of the centralized key management system should be kept in the source files, resulting that at least one credential being placed in the source files. Let's see how to overcome this using Azure Managed Service Identity
Like a developer with little business context getting obsessed with the recent conference he attended and want to convert the systems to the great technology he saw there; the business stakeholders with little technical context love the the promise of high productivity and low cost of LCDPs As developers we favor the engineering feast of the solution more than the business solution. - I accept this; this does not mean we do not care the business, we do and make our fullest effort to solve the business problems but we do not like to do it at the stake of losing the passion of coding. - I know there can be many arguments on this point
Introduction First let me begin with 'What is meant by Shadow IT ?'. In a broader view shadow IT is, any sort of IT usage without the direct governance of IT department of your organization. Sometimes this remains as a violation of the company policies, but the proliferation of the cloud SaaS applications and BYOD … Continue reading Shadow IT – Tradeoff between frictionless user experience and being responsible with AAD V2
Part 1 of this series : Getting started with Azure Stream Analytics. In this post we will combine the reference data from Azure Storage and process the query and write the output events to the Service Bus. These events will be picked by the Azure Logic Apps and the responsible person to maintain the pipe … Continue reading Complex Event Processing (CEP) with Azure Stream Analytics : JOIN with Reference Data
Introduction Azure Stream Analytics is a Complex Event Processing (CEP) Platform as a Service (PaaS) in Azure. In the series of this blog posts we’ll examine a scenario which helps us understand the CEP capabilities of the Azure Stream Analytics. Before we begin, let’s have a basic understanding of what CEP is. CEP is any … Continue reading Complex Event Processing (CEP) with Azure Stream Analytics : Getting Started with Streaming Data
What is the different between ASP.NET Core Dependency Injection Singleton, Transient and Scoped.