Namaste! Welcome to my blog, where you’ll find a diverse range of carefully crafted articles. These articles fall into two major categories:

  1. Articles that deepen your understanding of core engineering principles, System Engineering, Product/Program management, and Risk Assessment strategies. Technology is an ever-evolving force that shapes and revolutionizes our world, and I’m excited to explore it with you. #Architecting, #ProductDevelopment, #SystemEngineering and #Cybersecurity

  2. Articles that share valuable insights and initiatives that have the power to create a meaningful difference in the world. Whether it’s exploring new destinations, discussing social issues, or celebrating the magic of music, you’ll find thought-provoking content here.#Travel, #SocialResponsibility, and #Music:

Life is an extraordinary mixture of experiences, emotions, and growth, and I’m here to share and learn together! 📚

About me!

I know by name DEEKU, and I work as an R&D Software Specialist. Played diversified roles like Cloud Migration Consultant, Techncial Architect and cybersecurity SME. I believe in leading by example and making sure technical issues must be balanced with the needs of customers and the organizational interest.

Unlocking Knowledge 🎓
Certified: SAFe® 5 Product Owner/Product Manager.
Certified: Azure Security Engineer Associate.
Certified: Azure Cloud Infrastructure.
ISO 14971 and IEC 62304.

Join me on this inspiring journey of positive change and exploration.

LinkedIn


Read the Blog


Enhancing IoT Security and Reliability - Importance of loading user profiles

Enhancing IoT Security and Reliability - Importance of loading user profiles

Overview When developing IoT solutions for customers, managing device security and user profiles is critical, especially when running processes with elevated privileges or performing system-level tasks. Suppose you are developing a small application that needs to make configuration changes on IoT devices. In such cases, you might write code to run system-level commands or scripts to manage tasks like network settings, certificate installations, or device-specific configurations. However, simply executing these commands without considering the user context or security requirements can lead to unpredictable results.

.NET 8 Services: Extensions.Resilience and Extensions.Http.Resilience

In today’s world, businesses demand applications that can handle millions of users while ensuring minimal downtime. High-scale and high-availability services are crucial for modern cloud-based applications. .NET 8 brings significant improvements in this space with Extensions.Resilience, which simplifies implementing resilience patterns like retries, circuit breakers, and rate limiters. Understanding Resilience in High-Scale Systems Resilience refers to an application’s ability to recover from failures and continue operating smoothly. Failures can be due to network outages, hardware crashes, database timeouts, or API failures.

AZ-104 - Topic 03 -Securing Data Access with Microsoft Entra Conditional Access Policies

Scenario Since I come from the healthcare industry, I’d like to use a healthcare-related example to explain Microsoft Entra Conditional Access. In healthcare, safeguarding patient data is of utmost importance. Imagine a hospital’s IT team managing remote access for administrators who need to log in securely from various locations. How can they ensure that only authorized personnel access sensitive data while minimizing security risks? This is where Microsoft Entra Conditional Access becomes essential.

AZ 305- Azure Solutions Architect Expert - Topic 02 - Secure Remote Access to Web Applications Using Azure AD Application Proxy and Enterprise Applications

Scenario Hospitals often face challenges when providing secure remote access to internal applications without VPN access. This article explores how to enable Single Sign-On (SSO) for remote staff accessing an on-premises web application using Azure AD Application Proxy and Azure AD Enterprise Applications. A hospital has an Azure Active Directory (Azure AD) tenant synced with its on-premises Active Directory. The hospital uses an internal web application called PatientRecordsApp, which is hosted on-premises and uses Integrated Windows Authentication (IWA) for secure access.

AZ 305- Azure Solutions Architect Expert - Topic 01 - Secure Data Integration Between Partner Organizations Using Azure Logic Apps and Third-Party OAuth 2.0

Overview The AZ-305 Microsoft Azure Architect Design certification is a crucial step for cloud professionals aiming to validate their skills in designing secure, scalable, and reliable Azure solutions. This exam evaluates a candidate’s ability to design identity and security, data storage, business continuity, and infrastructure solutions using Microsoft Azure technologies. A commonly tested topic in the AZ-305 exam involves designing secure access for third-party organizations while ensuring minimal disruption to the existing architecture