OIDC authentication in ASP.NET Core introduces a multilayered system of session lifetimes. It’s not just…
Using tcpdump, Wireshark, and Understanding Encapsulation
Packet analysis starts with a simple question: What is really happening on the wire? Tools…
Aggregate Trusted Advisor Events in a Multi-Account AWS Setup
Trusted Advisor provides actionable insights across five categories: cost optimization, performance, security, fault tolerance, and…
Using DCEVM & Hotswap Agent for Java Development
Java developers often hit a frustrating wall during runtime changes. Restarting the entire application after…
SQL Managed Instance Maintenance: Best Practices
SQL Managed Instance brings the benefits of SQL Server to a fully managed cloud environment….
New AWS CDK Bootstrap Features and EKS Cluster Integration
The AWS Cloud Development Kit (CDK) has received a significant update in its bootstrap process….
Cisco CSR1000v NAT Instance Explained
The Cisco CSR1000v virtual router brings routing features to virtual environments, and one of its…
What I Learned Using AWS CDK Over the Past Year
A year with the AWS Cloud Development Kit (CDK) taught me more than just syntax…
Deploying IPv6 Web Apps on Azure: Key Considerations
IPv6 adoption is growing. Whether driven by exhaustion of IPv4 or the need to future-proof…
CloudFront Functions vs. Lambda@Edge: What You Need to Know
Deciding between CloudFront Functions and Lambda@Edge often comes down to what you’re trying to accomplish…