AKS Workload Identity
AKS workload identity is a feature of Azure Kubernetes Service (AKS) that enables you to use Azure Active Directory (AAD) to manage access to Azure resources from within a Kubernetes…
Cloud Distilled ~ Nithin Mohan
Everywhere, intelligence with cloud computing
Microsoft Corporation (NASDAQ: MSFT) is an American multinational corporation headquartered in Redmond, Washington, United States that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions. Established on April 4, 1975 to develop and sell BASIC interpreters for the Altair 8800, Microsoft rose to dominate the home computer operating system market with MS-DOS in the mid-1980s, followed by the Microsoft Windows line of operating systems.
Microsoft would also come to dominate the office suite market with Microsoft Office. The company has diversified in recent years into the video game industry with the Xbox and its successor, the Xbox 360 as well as into the consumer electronics and digital services market with Zune, MSN and the Windows Phone OS. The ensuing rise of stock in the company’s 1986 initial public offering (IPO) made an estimated three billionaires and 12,000 millionaires…
AKS workload identity is a feature of Azure Kubernetes Service (AKS) that enables you to use Azure Active Directory (AAD) to manage access to Azure resources from within a Kubernetes…
Azure Kubernetes Service (AKS) is a fully managed Kubernetes container orchestration service provided by Microsoft Azure. It allows users to quickly and easily deploy, manage, and scale containerized applications on…
Docker is a popular platform for developing, packaging, and deploying applications. In the previous blog, we provided an introduction to Docker and containers, including their benefits and architecture. In this…
Containers are a popular technology for developing and deploying applications. They provide an isolated runtime environment that runs an application and its dependencies, making it easier to package, deploy, and…
This is a final series to conclude and summarize the key topics covered in previous 8 blogs: DevSecOps is an approach to software development that emphasizes integrating security into every…
Continuing from our previous blog, let’s explore some more advanced topics related to DevSecOps implementation. Continuous Compliance Continuous compliance is a practice that involves integrating compliance requirements into the software…