.NET MAUI: The Project Reunion

.NET MAUI (Multi-platform App UI) is the evolution of Xamarin.Forms. It introduces a single-project structure to target Android, iOS, macOS, and Windows. Single Project Structure No more `App.Android`, `App.iOS` projects. Resources (Images, Fonts) are shared automatically. The Handler Architecture MAUI ditches Renderers (slow, tightly coupled) for **Handlers**, which map virtual controls to native controls more […]

Read more โ†’

Windows 11 for Developers: WSLg

Windows 11 brings WSLg (Windows Subsystem for Linux GUI). You can now run Linux GUI apps (GEdit, IntelliJ, Cypress) directly on Windows. Architecture WSLg launches a companion system distro containing a Wayland server. It uses RDPRAIL to project the Linux window onto the Windows desktop. Sound and microphone work out of the box.

Read more โ†’
Posted in Uncategorized

Azure Web PubSub: Real-time WebSockets

SignalR is great, but sometimes you want raw WebSockets or support for other languages (Python, Java clients). **Azure Web PubSub** is a managed WebSocket service that supports native WebSocket clients and the PubSub subprotocol. Architecture The service handles the massive concurrent connections. Your server only handles events (Connect, Message) via Webhooks. Key Takeaways Supports standard […]

Read more โ†’

Hardening Kubernetes: Moving away from Pod Security Policies

Pod Security Policies (PSP) are deprecated in K8s 1.21. The industry is moving to Pod Security Standards (PSS) and Admission Controllers like OPA Gatekeeper or Kyverno. The New Standard Kubernetes now has built-in labels for namespaces to enforce security levels: Setting this label automatically rejects any Pod that tries to run as Root or mount […]

Read more โ†’
Posted in Uncategorized

Azure SQL Database Ledger: Blockchain power in SQL

Ledger functionality adds tamper-evidence to Azure SQL. It cryptographically links blocks of transactions together (like a blockchain), creating an immutable history. If a DBA tries to modify a row in the history table directly, the cryptographic verification fails. Creating a Ledger Table Verification You can run a stored procedure to verify the integrity of the […]

Read more โ†’