Monitoring our systems is key to a healthy, predictable, and stable environment. Learn how Azure Monitor helps simplify monitoring of Azure solutions including data platforms such as Azure SQL.
With tools such as Postman, you can easily send HTTP requests to your APIs. This technique can help test the fields that are being added to the integration message to see if they pass or fail. This helps in the efforts to test if the integration message being sent will successfully get posted in Dynamics 365.
When it comes to data, there is never a thing as too much security. With identify theft and breaches becoming a daily occurrence, ensuring sensitive information is protected is essential to business. Microsoft Azure has been designed from the ground-up to be one of the most secure places to store your information. Let me prove it!
Throughout a typical Dynamics project, various environments are setup to prevent the existing environments from being affected by the changes being pushed to an environment. This is the model most firms follow when they have mastered the release sequence in their CI/CD.
One of the best practices with containers is not to persist data inside the containers for long term as containers are ephermal. These containers can be removed and rebuilt very often and may require storage that persists across pods beyond the application lifecycle. In this blog post, we will learn about how to create Persistent Volumes in AKS wi...
In this post, App Dev Manager Shany Wiesel explains the different deployment models for Apache Cassandra on Azure.
Microsoft Azure is an open cloud platform that runs both Microsoft as well as non-Microsoft software which includes operating systems, application servers, messaging middleware as well as SQL and NoSQL databases from both commer...
I find that machine learning experiment’s results are always interesting and somewhat unexpected in certain cases. On this comparison, the feature ranking results of PFI are often different from the feature selection statistics that are utilized before a model is created. This is useful in many cases, especially when training “black-box” models whe...
While on-premises, most applications did not take advantage of securing communications to the database on the wire just because of the inherent isolation advantages of having the application ONLY on the internal LAN. However, as more and more of these applications start moving to the cloud, the security of data over the wire is rightfully starting ...