Why do I Blog?
So that I don't have to rely on my awful memory when trying to recollect how I solved a problem.
Along the way, if it also helps others that would be awesome.
So that I don't have to rely on my awful memory when trying to recollect how I solved a problem.
Along the way, if it also helps others that would be awesome.
As LLMs become integral across industries, understanding and implementing proper security measures is crucial.
Mondrian algorithm provides an efficient way to achieve k-anonymity through multi-dimensional partitioning. Let's dive into how it works.
k-Anonymity is a fundamental privacy concept that helps protect individual privacy in datasets. Let's understand how it works.
Efficiently manage CI/CD workflows for forked GitHub repositories across multiple organizations with branching strategies and precise workflow triggers.
A practical guide to automating the management of Azure SQL Server firewall rules across multiple databases using PowerShell and Azure CLI.
Automate the capture and whitelisting of Azure Data Factory IPs in Snowflake for seamless data operations.
Learn how to securely store and retrieve sensitive data using Windows Data Protection API (DPAPI) in C#
TLS certificates for SQL Server will become increasingly common once developers start using newer Microsoft libraries. Here's how and why you should configure one.
Azure DevOps have disabled communications over TLS 1.0 and 1.1. Is your Deployment Group offline? Here's one quick fix for this.
Reading Windows registry keys using C# should be straight forward. Or is it?
Data in transit from SQL Server to client is not encrypted by default. Let's see how we can fix this.