Alternative way to protect your Application Insights “Instrumentation Key” in JavaScript

This post on Application Insights and protecting your instrumentation key comes to us from Premier Developer consultant Adel Ghabboun. Application Insights instrumentation key can be used in both Server and client side. Using the instrumentation key in the server side is secured and no one can see it. The opposite happens on the client side…

0

First Look Into Blockchain

There’s been a ton of buzz about Blockchain lately (Bitcoin anyone?) so what better time to highlight this video from Premier Developer consultant Razi Rais on understanding Blockchain technology. Since last year, I have been spending time with customers understanding how blockchain can help them improve/replace existing processes. It’s relatively a new technology but evolving…

0

Amazon Alexa Skills authenticated by Azure Active Directory and backed by ASP.NET Core 2.0 Web API hosted on Azure

This post is provided by Premier Field Engineer, Nathan Vanderby, who walks us through how to write an Alexa skill using .NET core and AAD. Amazon’s Echo devices and Alexa assistant need no introduction. In this post I lay out how you can write an Alexa skill and use a .NET core 2.0 API backend…


TFS 2017 – Sometimes we must look back before we can move forward! – Part 1

This is the first of a series of posts is provided by Senior Application Development Manager (ADM), Chuck Goodspeed, focusing on the challenges encountered in migrating/evolving TFS 2005/2008/2010 installations a full decade forward into TFS 2017 and/or VSTS. Experiences and situations encountered at multiple customer installations provide real-life NOT “out-of-the-box experiences”, [! OOB} which can…


Azure Application Insights Best Practices

In this post, Premier Developer consultant Adel Ghabboun outlines some best practices when using Application Insights. Here are some Azure Application Insights best practices you should consider when monitoring your application: It is always recommended to create multiple Application Insights resources to split telemetry for different environments, but do we have to? The answer is,…

0

Creating Developer’s Docker Linux Virtual Machine on Azure

This post on creating Linux virtual machines with Docker in Azure comes to us from Premier Developer consultant Razi Rais. For an upcoming developer event on Docker I had to create handful of Linux Ubuntu virtual machines on Azure with Docker and few additional software installed on it. I looked into couple of ways to…

0

Getting Started with Node.js, Angular, and Visual Studio Code

This step-by-step guide on getting started with Node.js and Angular comes to us from Premier Developer consultant Crystal Tenn. Here is a simple step by step guide to getting your Angular application setup with Visual Studio Code and Node. This guide will simply help you know what to install, the commands to run in PowerShell,…

0

A branching strategy for CI/CD using Git in VSTS

In this post from his blog, Premier Developer consultant Ilias Jennane discusses a strategy that can be used for branching and merging using Git in VSTS in a continuous integration/continuous deployment environment. When it comes to Branching and Merging strategies, the internet is full of examples and “best practices”. I personally don’t believe in a…

0

How to setup live streaming server using Azure Media Service in less than 30 mins

In this post, Senior App Dev Manager Randy Park walks us through Azure Media Services to setup a live streaming PoC. Background: A customer recently launched a global intranet portal with an audience distributed across the globe.  They expected an increase of the audience on a daily basis and leadership team requested one more interesting…


API Management: Quota versus Rate Limits

In this post, Senior App Dev Manager, Sanket Bakshi spotlights Azure API Management and how it can help with usage throttling. Azure API Management provides really good capabilities for usage throttling. This is useful in scenarios such as defending against a denial of service attack and protecting back-end services against a huge influx of requests…