Azure Automation Runbooks with Azure AD Service Principals and Custom RBAC Roles
A guide to using Azure AD Service Principals and custom RBAC roles for secure, automated VM management in Azure Automation Runbooks.
A guide to using Azure AD Service Principals and custom RBAC roles for secure, automated VM management in Azure Automation Runbooks.
A personal reflection on the excitement and technical significance of SpaceX's historic Falcon 9 rocket landing, which could revolutionize spaceflight economics.
Explores whether blockchain technology can provide resilient, robust, and scalable infrastructure for essential societal data.
A developer explains why they are abandoning the XMPP protocol for instant messaging, citing the fragmentation and decline of open, federated IM networks.
Analyzes the pseudorandom number generator defined in NZ Flag Referendum law, comparing it to the Wichmann-Hill algorithm and noting a potential flaw.
A guide to improving PowerShell's ValidateScript attribute by creating custom validation functions for better error messages and user experience.
A graduate reflects on their 5-year computer engineering master's at Linköping University, covering courses, projects, and personal growth.
Explains why applying closed-source, meeting-heavy workflows to open source projects leads to failure and advocates for asynchronous, transparent collaboration.
A weekly roundup of browser updates, bug fixes, performance tools, and web development resources from June 2015.
Explains how to apply continuous integration (CI) and automated testing to website content using tools like Travis CI and HTML Proofer.
Explains the distinct missions and approaches of two U.S. government tech modernization groups: 18F and the U.S. Digital Service (USDS).
A monthly roundup of browser development news, bug reports, and web platform updates from December 2015.
Explores the Shadow DOM feature of web components, focusing on its role in style encapsulation and component isolation for web development.
A February 2015 roundup of browser bugs, workarounds, new features like WOFF2 in Firefox 35, and developer tools for debugging and accessibility.
Debunks the myth that open source software is inherently insecure, comparing it to proprietary alternatives and explaining its security advantages.
Analyzing ESA conference abstracts using LDA topic modeling to identify scientific communities and trends through text-mining techniques.
A reflection on the challenges of data science in academia, discussing the 'brain drain' of data skills and the need for systemic change.
A technical note confirming that the Intel Celeron J1900 CPU supports Extended Page Tables (EPT) for virtualization, contrary to Intel's official documentation.
A primer on PostgreSQL connection pooling, covering framework-level and standalone poolers to optimize database performance and manage connections.
Explores the statistical power of monotonicity vs. smoothness assumptions in modeling, analyzing their asymptotic and finite-sample impacts.