Developer Support

Advocacy and Innovation

Dynamics 365 Implementation Pt. 3 – Postman

With tools such as Postman, you can easily send HTTP requests to your APIs. This technique can help test the fields that are being added to the integration message to see if they pass or fail. This helps in the efforts to test if the integration message being sent will successfully get posted in Dynamics 365.

Understanding how Microsoft Azure keeps your data safe

When it comes to data, there is never a thing as too much security. With identify theft and breaches becoming a daily occurrence, ensuring sensitive information is protected is essential to business. Microsoft Azure has been designed from the ground-up to be one of the most secure places to store your information. Let me prove it!

AKS Series – Use Azure Storage Option as Persistent Volumes in AKS

One of the best practices with containers is not to persist data inside the containers for long term as containers are ephermal. These containers can be removed and rebuilt very often and may require storage that persists across pods beyond the application lifecycle. In this blog post, we will learn about how to create Persistent Volumes in AKS with Azure Files.

Planning the future for NoSQL Cassandra DB Applications on Azure

In this post, App Dev Manager Shany Wiesel explains the different deployment models for Apache Cassandra on Azure. Microsoft Azure is an open cloud platform that runs both Microsoft as well as non-Microsoft software which includes operating systems, application servers, messaging middleware as well as SQL and NoSQL databases from both ...

Exploring Feature Weights using R and Azure Machine Learning Studio

I find that machine learning experiment’s results are always interesting and somewhat unexpected in certain cases. On this comparison, the feature ranking results of PFI are often different from the feature selection statistics that are utilized before a model is created. This is useful in many cases, especially when training “black-box” models where it is difficult to explain how the model characterizes the relationship between the features and the target variable.

How to Encrypt SQL communication on the wire

While on-premises, most applications did not take advantage of securing communications to the database on the wire just because of the inherent isolation advantages of having the application ONLY on the internal LAN. However, as more and more of these applications start moving to the cloud, the security of data over the wire is rightfully starting to gain increased importance.