Published inLevel Up Coding·PinnedMember-onlyIntegrating Azure OpenAI and Azure Speech Services to Create a Voice-Enabled Chatbot with Python and GPT-4Artificial intelligence (AI) is changing the way businesses operate, and many organizations are looking for ways to leverage AI to improve their operations and gain a competitive advantage. …ChatGPT7 min readChatGPT7 min read
PinnedMember-onlyI am privileged to host a Cloud Skills Challenge on Azure security with Microsoft!I am privileged to host a Cloud Skills Challenge on Azure security with Microsoft! Challenge How it works Benchmark your progress against friends and coworkers. It's always better when we learn together. Set a…learn.microsoft.com This challenge will help you learn the fundamentals of Azure security and better understand the cloud. …Cybersecurity2 min readCybersecurity2 min read
PinnedMember-onlyI’m thrilled to share that I have been featured by Microsoft as a Skilling Champion!Hey everyone! I’m thrilled to share that I have been featured by Microsoft as a Skilling Champion! It is an honor to be one of the top performing Microsoft MVPs! 🥳🥳🥳 Skilling is important because it helps equip individuals with the knowledge and technical skills necessary for a successful career…Programming1 min readProgramming1 min read
Published inLevel Up Coding·PinnedMember-onlyEverything you need to know to develop cloud-native apps with Microsoft Azure Cloud!If you’re developing your cloud-native applications, I highly recommend you check out this Application Architecture Guide from Azure Architecture Center. ⬇️⬇️⬇️ 👉 𝐀𝐫𝐜𝐡𝐢𝐭𝐞𝐜𝐭𝐮𝐫𝐞 𝐬𝐭𝐲𝐥𝐞𝐬 ✅ N-tier: divides an application into logical layers and physical tiers.Azure4 min readAzure4 min read
Published inLevel Up Coding·PinnedMember-onlyDesigning a System with Azure Cloud Services — A Guide on How to Choose the Right Azure Cloud Services for Your SystemDesigning a system is not easy and often involves different technologies. At the same time, the Azure cloud offers a lot of options for different services, so you may often face the question of how to choose the right service for your system. So, I’ve broken down a common system…Programming5 min readProgramming5 min read
May 26Member-onlyKeep improving your skill set with Microsoft LearnAre you ready to delve into the cutting-edge realms of AI, Cloud development, Data platform, .NET, DevSecOps, and more? The tech landscape is constantly evolving, presenting us with endless possibilities for growth and advancement. …Azure2 min readAzure2 min read
May 24Member-onlyExploring the Transformative Potential: Exciting Updates Unveiled at Microsoft Build 2023!Exciting updates from Microsoft Build 2023! The event showcased a wide range of technologies and advancements in AI, data, security, Azure services, and more. Let’s explore the highlights and discover their transformative potential. 🔷 𝐀𝐧 𝐀𝐈 𝐆𝐮𝐢𝐝𝐞 𝐭𝐨 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐁𝐮𝐢𝐥𝐝 𝟐𝟎𝟐𝟑 Microsoft Build 2023 offers a wide range of technical sessions…Azure2 min readAzure2 min read
May 22Member-onlyBoost Your Cybersecurity Defense: Unveiling Microsoft’s Latest Insights for #MicrosoftDefenderStrengthen your cybersecurity game with the latest insights from Microsoft! Discover how #MicrosoftDefender offers robust protection across various platforms, from APIs to DevOps, as well as combating spear phishing and securing your AWS/GCP workloads. Check out these informative articles to learn more: 🔷 𝐕𝐚𝐥𝐢𝐝𝐚𝐭𝐢𝐧𝐠 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐃𝐞𝐟𝐞𝐧𝐝𝐞𝐫 𝐟𝐨𝐫 𝐀𝐏𝐈𝐬 𝐀𝐥𝐞𝐫𝐭𝐬 Microsoft Defender…Cybersecurity2 min readCybersecurity2 min read
May 10Member-onlyImplementing Zero Trust Principles in Azure Hub-Spoke Virtual Networks: A Guide to Ensuring Security and ComplianceTake a look at these informative articles from Microsoft on how to apply Zero Trust principles (Verify explicitly, Use least privileged access, Assume breach) to hub-spoke virtual networks in Azure. 🔷𝐕𝐞𝐫𝐢𝐟𝐲 𝐞𝐱𝐩𝐥𝐢𝐜𝐢𝐭𝐥𝐲 👉 Create an application security group for each virtual machine role https://lnkd.in/gs97tBqZ 👉 Secure traffic and resources within the VNet https://lnkd.in/g_viDX6Q 👉 Secure…Cybersecurity2 min readCybersecurity2 min read
Published inLevel Up Coding·May 1Member-onlyEnabling Sign-In Risk-Based Multifactor Authentication: A Step-by-Step Guide Using Azure AD Identity Protection and Conditional Access PolicyUsers’ behavior is typically trackable, and if it deviates from the norm, it may be risky to grant them access without additional security measures, such as blocking or requiring multifactor authentication. The purpose of this post is to guide you through the process of enabling sign-in risk-based multifactor authentication using…Cybersecurity3 min readCybersecurity3 min read