Azure Container Apps Preview: First Impressions

Azure Container Apps (ACA) entered public preview. It is essentially “Kubernetes without the Kubernetes”. Under the hood is AKS, but you never see it. Managed KEDA ACA has built-in autoscaling using KEDA scalers. Scale on HTTP requests, Azure Storage Queues, or Kafka topics—all with YAML configuration. This configuration scales from 0 to 30 replicas based […]

Read more →

Kubernetes 1.23: What’s New

K8s 1.23 is the last release before Dockershim removal. Key changes: FlexVolume Deprecation CSI (Container Storage Interface) is now the only supported way to add storage drivers. If you have custom FlexVolume plugins, migrate immediately. HorizontalPodAutoscaler v2 Stable HPA v2 allows scaling on custom metrics (e.g., queue depth from Prometheus). This is now GA.

Read more →

Azure Front Door Premium: Enterprise WAF Configuration

Azure Front Door Premium combines a global CDN with a fully managed Web Application Firewall (WAF). In the aftermath of Log4Shell, proper WAF configuration is no longer optional—it is a fundamental security control. In this comprehensive guide, I will walk through deploying Azure Front Door Premium with an enterprise-grade WAF policy, including managed rulesets, custom […]

Read more →

TypeScript 4.6: Complete Feature Guide

TypeScript 4.6, released in February 2022, brings significant improvements to type inference, control flow analysis, and developer experience. As someone who has migrated multiple enterprise Angular and React applications to each TypeScript release, I will provide a comprehensive analysis of every notable feature and its practical applications. Control Flow Analysis for Destructured Variables This is […]

Read more →

SBOM: Software Bill of Materials Explained

In the wake of Log4Shell and SolarWinds, the software industry is grappling with a fundamental question: what is actually inside our software? The answer comes in the form of Software Bill of Materials (SBOM)—a formal, machine-readable inventory of every component, library, and dependency that comprises a software product. In this comprehensive guide, I will explain […]

Read more →

Log4Shell Aftermath: Building Secure Logging Pipelines

Log4Shell (CVE-2021-44228) was not just another vulnerability—it was a paradigm shift. A single user-controlled string in a log message could trigger Remote Code Execution (RCE) on any Java application using Log4j 2.x. The root cause was not a bug but a dangerous design feature: JNDI lookups in log message formatting. In this comprehensive guide, I […]

Read more →