Essential Technical Definitions for Solution Architects

When I started learning Cloud being a webdev and software architect background. I came across many IT lingo, jargons, abbreviations that I did know about them. In this post, I am writing all those in one place. I hope this will help you as well on your cloud Azure/AWS/GCP Solution Architect journey!

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service. RADIUS was developed by Livingston Enterprises in 1991 as an access server authentication and accounting protocol.

EAPOL

Extensible Authentication Access Protocol over LAN

MAC

Media Access Control Address: It uniquely identifies the device in the network. 48-bit hexadecimal number that is hard-coded on a NIC.

ROI

Return on Investment

ISV

independent software vendor

SAN

SAN: storage area network (SAN) By default, Azure VMs are assigned drive D to use as temporary storage

  • This drive assignment causes all other attached storage drive assignments to increment by one letter.
  • For example, if your on-premises installation uses a data disk that is assigned to drive D for application installations, the assignment for this drive increments to drive E after you migrate the VM to Azure.
  • To prevent this automatic assignment, and to ensure that Azure assigns the next free drive letter to its temporary volume, set the storage area network (SAN) policy to OnlineAll:

ARR

Application Request Routing (ARR) is a feature where when a client (or browser) request to any Azure based website, a cookie will be created and stick to the first time request received web site instance.

PIP

A virtual machine running in Azure can now be associated with a direct and publicly accessible IP address that sticks to the VM for its lifetime.

NSG

A network security group (NSG) contains a list of security rules that allow or deny network traffic to resources connected to Azure Virtual Networks (VNet). NSGs can be associated to subnets or individual network interfaces (NIC) attached to VMs.

NIC

A Network Interface (NIC) enables an Azure Virtual Machine to communicate with internet, Azure, and on-premises resources. When creating a virtual machine using the Azure portal, the portal creates one network interface with default settings for you.

RBAC

Role-based access control (RBAC) is a policy-neutral access-control mechanism defined around roles and privileges. The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments.

CMDB

Configuration Management Database

Rack

A Rack has servers (Virtual Machines) in a data-center.

SKU

Stock Keeping Unit (SKU) Learn more about SKU types in Azure

HPC

High performance Computing

BeeGFS

(formerly FhGFS) is a parallel file system, developed and optimized for high-performance computing.

PBS

Portable Batch System (or simply PBS) is the name of computer software that performs job scheduling.

SPARK

Apache Spark is a fast and general engine for large-scale data processing. It has a Scala, Java, and Python API and can be run either on either a single node or multi-node configuration. For both cases, it is recommended to have exclusive access of the node in Slurm.

SLURM

Simple Linux Utility for Resource Management (SLURM) is a free and open-source job scheduler for Linux and Unix-like kernels, used by many of the world’s supercomputers and computer clusters.

In order to run an application using a spark context it is first necessary to run a Slurm job which starts a master and some workers.

VPN

Virtual Private Network (VPN). In Azure VPN is a type of Virtual Network Gateway.

ER

ExpressRoute (ER) lets you extend your on-premises network into the Microsoft cloud over a private connection with the help of connectivity provider.

DMZ

A demilitarized zone (DMZ) is a perimeter network that protects an organization’s internal local-area network (LAN) from untrusted traffic.

VIP

Virtual IP address aka front-end. VIP is an IP address that doesn’t correspond to an actual physical network interface.

DIP

A dynamic IP (DIP) pool is a range of IP addresses.

BGP

“Border Gateway Protocol (BGP)” is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet.

LSN

Local Site Network (LSN)

IKE

Internet Key Exchange

LNG

The Local Network Gateway (LNG) typically refers to your on-premises location. Learn…

CIDR

Classless Inter-Domain Routing (CIDR). It is an IP address assigning method that improves the efficiency of address distribution. It is also known as supernetting that replaces the older system based on classes A, B, and C networks. By using a single CIDR IP address many unique IP addresses can be designated.

Apache

The Apache HTTP Server, colloquially called Apache (ə-PATCH-ee) is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0. Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation.

Hadoop

Apache Hadoop is a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving massive amounts of data and computation. It provides a software framework for distributed storage and processing of big data using the MapReduce programming model.

All the modules in Hadoop are designed with a fundamental assumption that hardware failures are common occurrences and should be automatically handled by the framework.

A small Hadoop cluster includes a single master and multiple worker nodes. The master node consists of a Job Tracker. A slave or worker node acts as both a DataNode and Task Tracker. All machines are connected by SSH.

HDFS

Hadoop distributed file system (HDFS) The Hadoop distributed file system (HDFS) is a distributed, scalable, and portable file system written in Java for the Hadoop framework. Hadoop splits files into large blocks and distributes them across nodes in a cluster.

chkdsk

Checks the file system and file system metadata of a volume for logical and physical errors. If used without parameters, chkdsk displays only the status of the volume and does not fix any errors. If used with the /f, /r, /x, or /b parameters, it fixes errors on the volume.

  • Open Command prompt in windows and run chkdsk

  • If you want to run chkdsk on D drive and fix issues then run chkdsk d: /f

NFS

Network File System (NFS)

NTFS

New Technology File System or simply NTFS is a proprietary journaling file system developed by Microsoft in 1993. Starting with Windows NT 3.1, it is the default file system of the Windows NT family.

HFS

Hierarchical File System (HFS) developed by Apple for MAC OS in 1998. One file size up to 2GB only.

EXT

Extended File System (EXT). The extended file system, or ext, was implemented in April 1992 as the first file system created specifically for the Linux kernel.

VMFS

Virtual Machine File System (VMFS)

SMB

Server Message Block (SMB)

SFTP

Secure File Transfer Protocol

FQDN

Fully Qualified Domain Name (FQDN)

DMS

Azure Database Migration Service

NoSQL

NoSQL databases (aka “not only SQL”) are non tabular, and store data differently than relational tables. NoSQL databases come in a variety of types based on their data model. The main types are document, key-value, wide-column, and graph. They provide flexible schemas and scale easily with large amounts of data and high user loads.

Cassandra

Apache Cassandra is a free and open-source, distributed, wide-column store, NoSQL database management system designed to handle large amounts of data across many commodity servers, providing high availability with no single point of failure.

Gremlin

Gremlin is a graph traversal language and virtual machine developed by Apache TinkerPop of the Apache Software Foundation. Gremlin works for both OLTP-based graph databases as well as OLAP-based graph processors.

CSP

Cloud Service Provider (CSP)

CSO

Cloud Service Offering (CSO)

CSR

Certificate Signing Request

DISA

Defense Information Systems Agency (DISA) is a U.S combat support agency that connects the U.S military and government though IT and communications support. Originally known as the defense communications industry (DCA), the agency was created in 1960, partially in response to communication issues during WWII.

CC SRG

Cloud Computing Security Requirement Guide

FedRAMP

The Federal Risk and Authorization Management Program (FedRAMP) provides a standardized approach to security authorizations for Cloud Service Offerings. The Federal Risk and Authorization Management Program (FedRAMP) was established in 2011 to provide a cost-effective, risk-based approach for the adoption and use of cloud services by the federal government. FedRAMP empowers agencies to use modern cloud technologies, with an emphasis on security and protection of federal information.

https://www.fedramp.gov/program-basics/

FedRAMP Plus

FedRAMP+ is the concept of leveraging the work done as part of the FedRAMP assessment, and adding specific security controls and requirements necessary to meet and assure DoD’s critical mission requirements. A CSP’s CSO can be assessed in accordance with the criteria outlined in this SRG, with the results used as the basis for awarding a DoD provisional authorization.

DoD

The Department of Defense (DoD) is responsible for providing the military forces needed to deter war and protect the security of our country. The major elements of these forces are the Army, Navy, Marine Corps, and Air Force, consisting of about 1.3 million men and women on active duty.

NIST

The National Institute of Standards and Technology (NIST) is a non-regulatory government agency that develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations in the science and technology industry.

IWA

Integrated Windows Authentication (IWA)

CA

Certificate Authority (CA) like Entrust, Thwate, Verisign

DNS

Domain Name System (DNS) is the phonebook of the Internet.

UDR

User Defined Routing (UDR)

NAT

Network Address Translation (NAT)

SSH

Secure Shell (SSH) protocol used to communicate machines. It encrypts the data while sending data to other machine. It works on applciation layer (layer-7) of OSI model.

Telnet

Teletype Network (Telnet) developed in 1969. Plain text communication between machines. Good for LAN since data in not encrypted. Not good for sensitive data. It works on applciation layer (layer-7) of OSI model.

SNAT

Source Network Address Translation (SNAT) allows traffic from a private network to go out to the internet. Virtual machines launched on a private network can get to the internet by going through a gateway capable of performing SNAT. The device performing NAT changes the private IP address of the source host to public IP address.

DNAT

Destination Network Address Translation (DNAT) : Destination NAT changes the destination address in the IP header of a packet.

NVA

Network Virtual Appliances (NVAs): An NVA(Network Virtual Appliance) is typically used to control the flow of network traffic from a perimeter network, also known as a DMZ, to other networks or subnets.

ILB

Internal Load Balancer(ILB) is a security enhancement over the current public load balancing that is offered in Azure.

HA Ports

High Available Ports: High availability (HA) ports is a type of load balancing rule that provides an easy way to load-balance all flows that arrive on all ports of an internal Standard Load Balancer.

NAS

Network Attached Storage (NAS)

RAID

Redundant Array of Inexpensive/independent Disks(RAID). It was created in 1988 as a means to combat the rising cost of disk drives. You’ll often hear RAID as it relates to network attached storage or “NAS”. You know in movies when you see the “mainframe” and it’s rows and rows of hard drives backing up all of the evil corporation’s information? That’s NAS, and that’s RAID in action. RAID Wikipedia

ALE

Annual Loss Expectancy

ALE = SLE x ARO

SLE

Single Loss Expectancy

ARO

Annualized Rate of Occurrence

CIA

CIA - Confidentiality, Integrity and Availability. The CIA Triad is actually a security model that has been developed to help people think about various parts of IT security.

IPS

Intrusion Prevention System

IDS

Intrusion Detection System

WAF

web application firewall (WAF)

LDAP

Lightweight Directory Access Protocol “Address Book” of user accounts used to authenticate users. Identifies level of acess, group membership etc.

SQL

Structured Query Language(SQL)

FQDNs

fully qualified domain names (FQDNs)

DNAT

Destination Network Address Translation (DNAT)

WAP

Wireless Access Point (WAP)

ICMP

Internet Control Message Protocol (ICMP) is one of the protocols of the TCP/IP suite. The ICMP echo request and the ICMP echo reply messages are commonly known as ping messages.

DDoS

Distributed denial of service (DDoS) Learn More. In a distributed denial-of-service (DDoS) attack, an attacker attempts to overwhelm a targeted server or network with junk network traffic — somewhat like bombarding a restaurant with fake delivery orders until it cannot provide service to legitimate customers.

Workgroups

A workgroup is a collection of computers that each maintain their own security information. Here the security is distributed, not centralized.

Domains

A domain is a collection of computers where security is handled centrally.Each domain has one or more domain controllers.

ICMP

Internet Control Message Protocol (ICMP) is a control protocol, meaning that it designed to not carry application data, but rather information about the status of the network itself. The best known example of ICMP in practice is the ping utility, that uses ICMP to probe remote hosts for responsiveness and overall round-trip time of the probe messages.

URL

Universal Resource Locator (URL)

OSI Layers

Open System Interconnection (OSI)

  • Software Layer
    • Application Layer
    • Presentation Layer
    • Session Layer
  • Heart of OSI
    • Transport Layer
  • Hardware Layer
    • Network Layer
    • Data Link Layer
    • Physical Layer

🏆 Pro Tip

Top Down: All People Seems To Need Data Processing.
Bottom Up: Please Do Not Through Sausage Pizza Away.

Protocol

In networking, a protocol is a specified way of formatting data so that any networked computer can interpret the data.

Protocols and their ports:

  • HTTP = 80
  • FTP = 21 and 22
  • SMTP = 58
  • SMTP = 25
  • DNS = 53
  • SSL = 443

UDP

User Datagram Protocol (UDP) is a connection-less transportation protocol. UDP is used to pass the actual user data. Communication is datagram oriented, so the integrity is guaranteed only on the single datagram. Datagrams reach destination and can arrive out of order or don’t arrive at all. It’s generally used for real time communication, where a little percentage of packet loss rate is preferable to the overhead of a TCP connection. It is an Transport layer (layer-4) protocol. UDP, the User Datagram Protocol, does not set up these dedicated connections.

TCP

Transmission Control Protocol (TCP) TCP is a connection oriented transportation protocol. TCP is used to pass the actual user data. It guarantees that all sent packets will reach the destination in the correct order. TCP, the Transmission Control Protocol, sets up dedicated connections between devices and ensures that all packets arrive.

SSL

Secure Sockets Layer (SSL) now it is deprecated. It is session layer protocol. It is presentation and session layer protocol. It lies between Transport and application layer.

TLS

Transport Layer Security (TLS) provides communications security over a computer network. It is presentation and session layer protocol. It lies between Transport and application layer.

IP

Internet Protocol (IP)

IPSec

Internet Protocol Security (IPSec): IPsec is a group of protocols that are used together to set up encrypted connections between devices. IPsec is often used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come from. IPsec uses UDP because this allows IPsec packets to get through firewalls.

IPsec is not one protocol, but a suite of protocols. Internet Protocol (IP) is not part of the IPsec suite, IPsec runs directly on top of IP. The following protocols make up the IPsec suite:

Authentication Header (AH): The AH protocol ensures that data packets are from a trusted source and that the data has not been tampered with, like a tamper-proof seal on a consumer product. These headers do not provide any encryption; they do not help conceal the data from attackers.

Encapsulating Security Protocol (ESP): ESP encrypts the IP header and the payload for each packet — unless transport mode is used, in which case it only encrypts the payload. ESP adds its own header and a trailer to each data packet.

Security Association (SA): SA refers to a number of protocols used for negotiating encryption keys and algorithms. One of the most common SA protocols is Internet Key Exchange (IKE).

Reference: https://www.cloudflare.com/learning/network-layer/what-is-ipsec/

Packet

All data sent over a network is broken up into smaller pieces called packets, and all packets have two parts: the payload and the header. The payload is the packet’s actual contents, the data being sent. The header has information about where the packet comes from and what group of packets it belongs to. Each network protocol attaches a header to each packet.

Tunelling

Encapsulating packets within other packets is called “tunneling”.

To understand why this is called “tunneling,” we can change the analogy slightly. If a car needs to pass from Point A on one side of a mountain to Point B on the other side, the most efficient way is to simply go through the mountain. However, ordinary cars are not capable of going straight through solid rock. As a result, the car has to drive all the way around the mountain to get from Point A to Point B.

But imagine that a tunnel was created through the mountain. Now, the car can drive straight from Point A to Point B, which is much faster, and which it could not do without the tunnel.

GRE

Generic Routing Encapsulation, or GRE, is a protocol for encapsulating data packets that use one routing protocol inside the packets of another protocol. “Encapsulating” means wrapping one data packet within another data packet, like putting a box inside another box. To understand how this works, think about the difference between a car and a ferry. A car travels over roads on land, while a ferry travels over water. A car cannot normally travel on water — however, a car can be loaded onto a ferry in order to do so.

Reference: https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/

IPV

Internet Protocol Version (IPV). IPv6 is more advanced and has better features compared to IPv4.

NTP

Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

TDS

The Tabular Data Stream (TDS) Protocol is an application-level protocol used for the transfer of requests and responses between clients and database server systems. a TDS session is established when the transport-level connection is established and the server receives a request to establish a TDS connection. It persists until the transport-level connection is terminated (for example, when a TCP socket is closed).

OLTP

Online Transactional Processing (OLTP)

OLAP

Online Analytical Processing (OLTP)

SMTP

Simple Mail Transfer Protocol (SMTP) to send emails.

DDL

Data Definition Language (DDL)

K-ISMS

Korea-Information Security Management System (K-ISMS)

B2C

Business-To-Consumer (B2C)

ISV

Independent Software Vendor (ISV) - also known as a software publisher, is an organization specializing in making and selling software, as opposed to computer hardware, designed for mass or niche markets.

LOB

line-of-business (LOB) - used only for your company or your employees.

ITSM

IT Service Management (ITSM) Few ITSM tools are ServiceNow, System Center Service Manager, Provance, Cherwell. You can use IT Service Management Connector in Azure to connect your own ITSM tools.

SIEM

Security Incident and Event Monitoring (SIEM) - Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.

VNet

Virtual Network: This is Private network on Azure Cloud.

VPC

Virtual Private Cloud (VPC) this is similar to VNet in Azure.

EC2

Elastic Compute Cloud (EC2) Instance: This is a Virtual Machine on Amazon.

UPN

user principal name (UPN)

SPN

security principal name (SPN)

MSAL

Microsoft Authentication Library (MSAL)

ADAL

Active Directory Authentication Library (ADAL)

Active Directory Authentication Library (ADAL) integrates with the Azure AD for developers (v1.0) endpoint, where MSAL integrates with the Microsoft identity platform. Learn More…

OIDC

OpenID Connect (OIDC) - authentication and authorization protocol

MSRP

Managed Identity Resource Provider (MSRP)

ATP

Azure Advanced Threat Protection ( ATP ) - Now it is known as “Microsoft Defender for Identity”

SSPR

Self-Service Password Reset

SSPI

Security Support Provider Interface (SSPI) is a component of Windows API that performs a security-related operations such as authentication.

DHCP

Dynamic Host Configuration Protocol (DHCP) : related to IP Addressing.

DHCP helps ensure that devices ultimately correctly configured to join networks. DHCP does this by assigning IP addresses and other information to each host (or device) connecting to a network.

Delta Query

Delta query enables applications to discover newly created, updated, or deleted entities without performing a full read of the target resource with every request.

Workbook Playbook Notebook Runbook

  • Workbook : Visualize data by Kusto query. Azure Workbooks is a great tool for operations and DevOps teams because they can combine metrics and queries.
  • Playbook: Playbooks are collections of procedures that can be run from Azure Sentinel in response to an alert or incident.
  • Notebook: Azure Notebooks is an implementation of the widely used open-source Jupyter Notebook.
  • Runbooks: are used to create automation in Azure. Like in the evening shut down all of the DEV Virtual machines.

Front Door vs Traffic Manager

FrontDoor Traffic Manager
Http and Https protocol Used for File and Image
Used for multi region app, agnostic of PIP public IP Used for sharing and accessing multi-region deployed Files and Images, agnostic of PIP public IP

How many VNets allowed in Azure?

500 VNets, You can only have one VPN Gateway with 1 VNet.

Recent Posts

Mandatory Algorithms for Coding Interview

3 minute read

Basic algorithms that you must know if you want to crack your coding interview. In case you are starting to prepare for coding practice then make sure you...

How to improve Reliability in the cloud?

9 minute read

Did you get a phone call from your customer saying they want to improve their application reliability while you move their workload to the cloud? If yes t...

What is EBIT and EBITDA in Finance?

4 minute read

EBITDA and EBIT is a very fundamental financial term that is nowadays mostly considered during the cloud adoption phase for IT companies. If your company ...

Introduction to CAP Theorem

5 minute read

Are you planning to design your next advanced distributed architecture? Make sure you are aware of the concepts such as high availability, consistency and...

What is Azure Virtual Machine Scale Sets

3 minute read

Now a days distributed architecture is common. We deploy our services into many different servers to scale them up and meet our demand. However, managing ...

Introduction of Managed Identities

3 minute read

Do you have situations where a process is trying to use your virtual machine in the cloud and you want to protect and control the access? Do you want to u...

Introduction to MSAL

1 minute read

If you have any project that you want to integrate with Azure Active Directory and secure your app. Then you must try using Microsoft Authentication Libra...

Site Recovery Strategy in Azure

2 minute read

Learn the failover and failback stages in Site Recovery on Azure. Learn Business Continuity and Disaster Recovery (BCDR) strategy in Azure.

Azure Active Directory Basics

3 minute read

Securing your workload and datacenter over the cloud is very challenging. You want your resources to be protected by both machines and users. Azure Active...

Where to Store Application Data in Azure

4 minute read

Data is very essential and now a days data is everything. So you have application in cloud and want to explore which type of data where to store in Azure....

What to use to Run applications in Azure

12 minute read

Learn what service from Azure you should use while creating your application in Azure. This article has quick short answer for when to use what in Azure s...

Virtualization Basics with VMware

9 minute read

Virtualization is the single concept that now-a-days cloud service providers are using at massive scale and delivering IT technologies such as storage, co...

Azure Network Watcher Basics

3 minute read

Azure Network Watcher is a monitoring service with lots of other important services for network. Most network diagnostics issues can be detected and analy...

Symmetric and Asymmetric Encryption Basics

1 minute read

Why do you care about encryption strategies? Well if you are planning to become system administrator or solution architect then you must know how you woul...

Getting Started with Monorepo with Nx Nrwl

31 minute read

Do you have a lot of JavaScript projects using GitHub repositories? How are you managing dependencies among those projects? Developers might be struggling...

Learn how to secure your Network

1 minute read

If you want to become Cloud Security Architect you must have basics of Networking. This article will discuss all fundamental concepts of networking. Learn...

Azure Storage Account Basics

5 minute read

When you want to move your business to cloud the major thing to consider is storage. What kind of data you can store? What is the pricing? How can you opt...

Azure Monitoring Basics

3 minute read

Azure Monitor is the central service that can help you to improve performance of your application and dependencies. In this article I will go through the ...

Definitions that you should know

15 minute read

When I started learning Azure being a webdev and software architect background. I came across many IT lingo, jargons, abbrebiations that I did know about ...

Configuring Azure Blob Storage

5 minute read

Blob Storage is helpful to upload images, videos, documents, pdfs etc. over the Azure cloud. In order to create new Azure Blob Storage. You must need to c...

Azure Routing and Peering Basics

4 minute read

Azure architects must aware of fundamentals of routing and peering. In this article we will see fundamentals as well as we will see some examples of routi...

Creating Azure Storage Account

7 minute read

Azure Storage account is a resource in Azure. Storage Account will give your group of services like Blob Service, File Service, Table Service, Queue Servi...

Azure VNet Basics

3 minute read

Azure VNet is the fundamental unit of networking in Azure Cloud. You must know the basics of VNet. In this article we will explore Azure VNet.

Azure Storage Replications Basics

less than 1 minute read

LRS (locally redundant storage) ZRS (zone redundant storage) GRS (geographically redundant storage) RA GRS (read-access geographically redundant storage) GZR...

Monitoring Containers with Azure Monitor

4 minute read

Did you know you can containerize your asp.net MVC with docker application and upload to Azure Container Registry and host them using Azure Kubernetes Clu...

TCP vs Http difference

2 minute read

TCP: is a transport-layer protocol, and HTTP is an application-layer protocol that runs over TCP.

Visualize Azure Monitor Logs and Metrics

2 minute read

Azure portal is great while visualizing Azure log and metrics. You can see the pie chart, graph for resources like VMs etc. You can also create your custo...

Creating ngShow directive in Angular 11

1 minute read

Are you wondering how to use ng-show in Angular 11? There is a way to achieve it by using [hidden]= “false”. However, if you are migrating large angularjs...

Azure Cost Management & Billing Basics

2 minute read

For entire azure resources even across subscriptions if you want to know about your billing, invoice, budget, alerts, recommendations then you must go to ...

Azure Advisor Basics

2 minute read

Azure Advisor collects recommendations from all of the services within your subscription and display them in a single page. Example you can see recommenda...

Azure Security Center Basics

3 minute read

Azure Security Center is the base infrastructure service to collect logs analyze them and generate tailored recommendations. Learn how can you review and ...

Configuring Azure Diagnostics Log

4 minute read

​This article will teach you t​he how to configure and implement diagnostics log for Azure resources. This article will help you to prepare for az-303: Mi...

Webhook for Beginners

4 minute read

Webbooks are basically user defined HTTP callbacks which are triggered by specific events. Whenever that trigger event occurs in the source site, the webh...

Topologies Azure Service Bus

7 minute read

Azure Service Bus is a transport layer comprises of messaging entities. Learn what is Topology in messaging world and how N-Service bus makes life easy by...

How to Install Scoop on windows

3 minute read

Do you love open-source? Do you want to make your PowerShell really powerful? Consider installing scoop and make your life simple! 😄 Learn how can scoop h...

How to Install Scoop on windows

3 minute read

Do you love open-source? Do you want to make your PowerShell really powerful? Consider installing scoop and make your life simple! 😄 Learn how can scoop h...

Binary Search Concept

5 minute read

Do you want to understand binary search? Read this article, I have discussed binary search problems in JavaScript.

Discuss Azure Fundamental Concepts

5 minute read

Did you know your company can take advantage of using many Azure cloud computing which will help your company to reduce its overall computing costs? Did y...

Caching Dependencies on GitHub Workflows

5 minute read

While building/compiling angular or node application on Local Build Machine or Azure Pipelines or GitHub Workflows or Netflix or Heroku. The main issue we...

Azure Information Protection Strategy

2 minute read

Azure Information Protection (AIP) is a cloud-based solution that enables organizations to classify and protect documents and emails by applying labels.

Azure Load Balancer Basics

3 minute read

Azure Load Balancer evenly distributes incoming network traffic load among backend resources or servers. It works at layer 4 (Transport Layer) of OSI (Ope...

Azure Information Protection Strategy

2 minute read

Azure Information Protection (AIP) is a cloud-based solution that enables organizations to classify and protect documents and emails by applying labels.

Azure Developer Associate Exam Basics

2 minute read

In order to become Azure Developer Associate you must pass AZ-204 exam. If you want to become Cloud Solution Architect then consider giving Microsoft AZ-2...

Introduction to Azure Fundamentals

12 minute read

Can you describe basic concepts of cloud computing? Is Azure right solution for your business needs? How can you create your Azure subscription today? I w...

PowerShell Random Notes for You!

4 minute read

Learn some important built-in very helpful methods in Powershell. It could be a quick note for you so don’t forget to bookmark this article! 🥇

Hosting N-Service Bus in Azure Functions

5 minute read

Have you tried to host NServiceBus within Azure Functions? In this article I will teach you how can you host your first NServiceBus project within Azure F...

What is Subnet and Why Subnet is Required?

5 minute read

When I was learning Azure Infrastructure, I had big question in my mind what is subnet and why do I need Subnet in my network? If you share my question th...

What is Subnet and Why Subnet is Required?

3 minute read

When I was learning Azure Infrastructure, I had big question in my mind what is subnet and why do I need Subnet in my network? If you share my question th...

CRUD with Cosmos DB using Dotnet Core SDK

9 minute read

Do you want to create dotnet csharp console app and write CRUD ( Create, Read, Update and Delete ) operations over Azure Cosmos DB noSQL data? Read this a...

What is Azure Resource Manager or ARM?

5 minute read

Did you know you can create and deploy Azure resources using JSON template? Did you also know that you can enforce business compliances on your resources?...

Make Your PowerShell Posh & Colorful

3 minute read

Do you want to make your PowerShell prompt colorful? Please read this article to make your PowerShell Terminal colorful and Git supported. I will use oh-m...

What is Azure Resource Manager or ARM?

5 minute read

Did you know you can create and deploy Azure resources using JSON template? Did you also know that you can enforce business compliances on your resources?...

Azure Sandbox Free Account for Learning

2 minute read

Do you want to learn Azure and afraid of being charged your credit card or getting big bills? Learn this article where I will explain how you can get free...

Isolated Process Models for Workers

1 minute read

.Net running on-process till .Net Core 3.1 & .Net isolated workers are coming on .Net 6 onwards & you can deploy Azure Function Apps in production...

Azure Functions Basics

9 minute read

Are you beginner on Azure Functions and want to learn the basics of Azure Functions? Did you know you can create Azure Functions and publish to Azure usin...

Azure Compute Resources

2 minute read

Do You want to start IT Business and you don’t have equipments? Don’t worry Azure is the solution for your business. By using Azure Compute Resources you ...

Azure Cosmos DB Basics

12 minute read

Are you beginner on Azure Cosmos DB and want to know what exactly is Cosmos DB? Then read this article. Azure Cosmos DB is a fully managed NoSQL database ...

Azure Update Domain vs Fault Domain

5 minute read

Do you know in Azure Data Center you can protect your server against regular server software maintenance outages? You can also protect your VMs on Azure a...

Angular Service as PubSub Message Handler

4 minute read

Convert Angular service to a Message Handler. Do you want to organize your Angular code base as Service Oriented Architecture (SOA) way. And you want to c...

Introduction of Azure Data Center

5 minute read

Did you know how your servers are placed in Azure Data-Center? Do you understand how Azure Data Center protects your servers against software or hardware ...

Azure DevOps Server 2020 Do’s & Don’t

4 minute read

Did you know Azure DevOps Services and Azure DevOps Server are different entities? I have learned lessons while working on Azure DevOps Server 2020 on-pre...

Scheduling Jekyll Post on GitHub Pages

2 minute read

Do you want to schedule your Jekyll blog post to be published on GitHub Pages on future date time? Then read this article. Introduction Jekyll static s...

Authenticating GIT on Development Box

1 minute read

Are you using windows machine for local development? Do you have Azure DevOp’s server git repo and want to connect from local box? Then read this article....

Running Angular 10 in Internet Explorer 11

2 minute read

Are you worried that new angular 10 project is not running in “IE11” even though you enable the given polyfills by angular team? Then please read this art...

Integrating CkEditor In Nx Monorepo

12 minute read

So you want to learn how you will integrate CkEditor v5 in Nx Monorepo. Do you also want to learn how to create custom plugin inside CkEditor v5? Then I w...

Updating Azure CI Pipeline Build Number

1 minute read

Did you have requirement to update your Angular CI build number as your new Package.json version number and Branch name? Well this is a good practice to d...

Publishing Nx Monorepo Angular App to NPM

3 minute read

Do you want to publish your nx monorepo app to npmjs.org? In this article, I will explain how can u publish your app to npmjs.org. Introduction In my m...

Creating New App with Nx Console

3 minute read

Do you want to create a new application on my nx monorepo work-space? Also do want to make sure that you should be able to build and test your application...

Branch protection in Azure DevOps

6 minute read

Protecting Master Branch from Bad Pull Requests is big challenge now a days while working in a team. You are working on git with distributed architecture. Wh...

Caching Azure CI Pipeline Artifacts

3 minute read

If you are following agile then continuous integration is must. I have setup CI/CD in Azure DevOps and I personally found my Angular build is taking lot of t...

Introduction to YAML

2 minute read

Yaml files are used in Azure Pipelines for build and release definition. Yaml files are also used in GitHub build and release. Yaml is designed to be clean a...

Type of Authentication - JWT Authentication

less than 1 minute read

As we already discussed rest of the authentication types in our previous video tutorials, JWT based authentication is best among all. It is world famous and ...

Use case vs user story

1 minute read

What is User Story A User Story is a note that captures what a user does or needs to do as part of her work. Each User Story consists of a short descripti...

Given When Then in Angular

1 minute read

In this video session Given When Then | Angular | BDD, we will teach you how to write unit tests in more readable fashion. Like Given When Then Style using J...

Add Item To Cart Use case – RxJS

1 minute read

In our previous demo session Creating Store Using RxJS | Angular | Demo we have written base code for our Cart Store. Now we will add methods to it, based on...

Creating Store Using RxJS in Angular - Demo

1 minute read

In this video session Creating Store Using RxJS | Angular | Demo we will create our Cart store and it is nothing but just a wrapper on top of state, so it be...

Handling Server Side HTTP Error

1 minute read

As we discussed in our previous video session Designing Shopping Page Using Angular Material Grid And Card | 0009-26, our web app is now growing as we are ad...

how to create mock object in jasmine

less than 1 minute read

While writing test in jasmine you will encounter a situation where you want to create a mock object & also you want to spy it's property. Jasmine cre...

Saving User data in MongoDB - Demo

1 minute read

In this video session Saving User To MongoDB | Mongoose | Demo | 0009-22 we will explain how to save user data in mongo db and how to validate user at server...

Up coming Full Stack Master Courses

less than 1 minute read

[advanced_iframe securitykey=”” src=”https://gumroad.com/fullstackmaster/p/up-coming-full-stack-master-courses” id=”” name=”” width=”100%” height=”1500px” m...

Integrating Restful API in Angular App - Demo

less than 1 minute read

In our previous demos session we have created our server and restful API and tested API with postman also. Next we will try to integrate this Restful API in ...

Products page & Lazy Loaded Module - Demo

less than 1 minute read

In continuity of our demo session Creating Products Module | Lazy loaded module | Angular | 0009-09 we will see how to create Products page for our app keepi...

Introduction to angular material - Demo

1 minute read

As you begin learning of coding basics, one important thing which makes your learning process easier and practical is availability of code. Most of the onlin...

An Introduction to MEAN Stack

1 minute read

MEAN is an acronym for MongoDB, ExpressJS, AngularJS and Node.js. From client to server to database, MEAN is full stack JavaScript framework, ideal for build...

This Keyword - Essential JavaScript Concepts

1 minute read

‘This’ keyword is widely used in almost all programming languages. Like in some programming languages This variable points to instance of an object or class....

Use Existing provider practical example

1 minute read

As we know UseExisting provider configures the Injector to return a value of another UseExisting token. Through this provider, we can use already existing in...

What is multi True provider in angular?

1 minute read

Multi: true means that one provider token provides an array of elements. Using multi: true we tell Angular that the provider is a multi provider. This is use...

Types of Providers -UseFactory Provider

1 minute read

UseFactory provider configures the Injector to return a value by invoking a UseFactory function. It is basically a function which follows factory design patt...

Types of Providers -UseValue Provider

1 minute read

UseValue provider configures the Injector to return a value for a token. It comes in that category of providers where we do not have unique thing to identify...

Types of Providers -UseExisting Provider

1 minute read

UseExisting provider configures the Injector to return a value of another UseExisting token. Through this provider, we can use already existing instance or o...

Types of Providers -UseClass Provider

1 minute read

Class Provider configures the Injector to return an instance of useClass for a token. It is similar to type provider but it has different way of providing co...

What’s new in Angular 8.0?

2 minute read

Angular 8.0.0 is here! Is there any breaking changes in Angular 8? No, Angular 8 is released now! As Angular team had promised they have not introduced break...

Unit Testing RxJS with Marble Diagrams

1 minute read

Unit Testing RxJS with Marble Diagrams Welcome to Unit Testing RxJS with Marble Diagrams course excercise material portal. Please watch Uni...

What is the Scope of Dependency in Angular?

1 minute read

Scope of Dependency in Angular is very important concept to understand for a full stack developer. This is primarily asked question by interviewer in many di...

How Injectors are inherited in angular?

less than 1 minute read

As we know, one must configure an injector with a provider, or it won't know how to create the dependency. The most obvious way for an injector to create an ...

What is Injection Token and Where to use it?

less than 1 minute read

We cannot simply ignore the shortcomings like Interface, Array (bunch of objects) cannot be used as DI Token in angular. There can be possibility where we ne...

What is DI Token

1 minute read

When we think of learning Dependency Injection in Angular, couple of questions arises like How this DI concept works in Angular? What are all the important ...

Benefits of Components based application

less than 1 minute read

Due to its component based architecture, angular has capability to protect our code for future. It is basically making our code future ready as each componen...

Component based Architecture in Angular

less than 1 minute read

One of the main architectural principles in Angular is that an application should be composed of well encapsulated, loosely coupled components. In this sessi...

Angular Hierarchical Dependency Injection

less than 1 minute read

In 0008-7- angular: Hierarchical Dependency Injection video session, you will see how Angular hierarchical dependency injection system works. You will discov...

Working of Dependency Injector or Container

less than 1 minute read

Dependency Injection Container or Injector is basically a static or global thing which is being used throughout the app to inject dependencies or objects. It...

Dependency Injection Types

less than 1 minute read

Basically there are three types of dependency injection, Depending on the context we can choose any type which is being supported by that framework. Three ty...

What is Dependency Injection?

1 minute read

Wikipedia Definition: Dependency injection is a technique whereby one object (or static method) supplies the dependencies of another object. A dependency is ...

Get started with Angular

1 minute read

Are you preparing for Angular interview? Not sure from where to start? Well we do have answers to all your angular related queries. We will help you to list ...

Tricks to build Interview-winning Resume

1 minute read

Along with choosing right template, best resume format, putting educational qualifications etc, the most important component required in an interview-winning...

How to do Html Form Validation using RxJS

1 minute read

Did you know you can use RxJS simple operators and do html form validation re-actively? Well I learn RxJS operators by implementing them in real world proje...

Why Express.JS with Typescript

2 minute read

I love Typescript the way it helps development speed and accuracy. I wanted to work with Typescript, Webpack and Express.JS finally came up with a project w...

Model in Domain Driven Design

2 minute read

Model in Domain Driven Design is a system of abstraction that eliminates things which are not required. Domain Model allows us to think about a particular do...

Webpack assets run time dependency injection

less than 1 minute read

How to Inject Base Assets path URL dependency to webpack CSS bundle? In your JavaScript project build by webpack, if you have requirement where at the build ...

Dependency Injection in React Core

2 minute read

Dependency Injection In Software Engineering Dependency Injection is a technique where one object injects or passes the dependency object to other object at ...

Decorators in Typescript and Angular

5 minute read

Decorator is a concept in Typescript that can be used to annotate a class or it's members. Decorator also enables meta programming where one can collect as ...

Creating Typescript Library using Webpack

4 minute read

Loading... In this article we will see how can you create your own typescript library that you can easily consume in your another typescript project. ...

RxJS Marble Diagrams

4 minute read

RxJS Marble Diagrams are made to visualize the values emitted from the RxJS Observable over timeline.</p> Hi in this article I will explain why we need...

Establishing Goals

5 minute read

In this article we are going to talk about. What goals are ? How to set Goals ? What makes really good goal ? Organize your life goal Sort out your lif...

Understanding JavaScript Scope

2 minute read

What is Scope in JavaScript Imagine Scope as a boundary within that things can be isolated. Like in your colony there are certain areas which has stuffs that...

Create Barrel for Typescript Project

2 minute read

When you create your own Typescript  library then you need a barrel file where you put all of your files that you want to expose to the outside world kind of...

Domain Driven Design Philosophy

3 minute read

Eric Even wrote Domain Driven Design (DDD) book. Eric says DDD is the Philosophy of software design that helps projects dealing with complex problem. I ...

Integrate GitHub-Pages in Angular 6 App

2 minute read

What is GhPages Do you want to save time to create post or article while writing software code ? Or do you want to see your angular app live running in the i...

My Pluralsight Course

less than 1 minute read

Hi everyone, I am very excited to announce that I became an author in Pluralsight.com and my first course on Unit Testing with RxJS Marble Diagram is going t...

My YouTube Channel

less than 1 minute read

Hi everyone, I started my FullstackMaster YouTube channel where I want to put some technical learning stuffs. I started putting RxJS videos over there. I hop...

Introduction to Multi Cloud and Strategy

8 minute read

Cloud itself is complex so why are customers bothering about multi-cloud at all? Why not just take google cloud and deploy all of your workload and be hap...

JavaScript Module Pattern

less than 1 minute read

I recently wrote one article on JavaScript Module pattern in Code project. Please visit this website and suggest me your thoughts on it... Javascript Module ...

How to use VLOOKUP in Microsoft Excel

3 minute read

Today, I learned about one Excel Sheet Formula "VLOOKUP". It is very useful formula that gives us the power to search a value in a particular column.   ...

Knockout Getting Started

7 minute read

I came through an open source JavaScript named as “Knockout.js”. After learning this javascript functionality and features. I found it very powerful, wh...

Basics of jQuery

less than 1 minute read

I took session on jQuery. It was nice experience to talk in front of my colleagues. First time I took session where some of my colleagues joined on phone als...

Restoring Scroll Position

1 minute read

Suppose you are searching for a product in a shopping website and you got a big set of results. It normally comes in a grid view with a long scroll bar. Some...

Assembly Binding Log Viewer

2 minute read

My Friend was looking for one error that he was continuously getting when he was trying to setup my old version 1.0 .net code. The error message was: Th...

Dynamically Adding UserControls

6 minute read

From last 4 days, I have been struggling on how I should load the UserControl dynamically in my default page. I know in today’s world where .Net 4.0 came up...

Dependency Injection Patterns

6 minute read

In order to make the application more loosely coupled we should use interfaces. In Dependency injection pattern there exist a class called as asse...

Microsoft contributions to jQuery Plugins

4 minute read

Almost 3 years ago Scottgu announced that Microsoft would begin offering product support for jQuery. Now Microsoft is playing a great role on contri...

Menu Widget

1 minute read

I was trying to make my own menu widget using jQuery and  I came with this below Widget. [sourcecode language="javascript"] //Menu Widget created by Rup...

Local Alias pattern

2 minute read

In any jQuery Plugin there JavaScript local alias pattern is being used as a best practice. They have localized the global jQuery object as an alias $. ...

Internet Explorer 8 - new features

2 minute read

Hi all,</p> I recently installed Internet Explorer 8 in my laptop and wondering many new features about the IE8. I was enjoying the good and...

jTip: jQuery Custom Tool Tip

1 minute read

Plethora of times it is required to show complex tool tip. Complex, I mean the tool tip that can contain images, links , text decoration etc...To show the cu...

Creating Custom jQuery Widget

less than 1 minute read

Hi I just came across a greate website http://bililite.com/blog/understanding-jquery-ui-widgets-a-tutorial/ There I learned how to create custom jQuery widge...

Prototypal Inheritance in JavaScript

4 minute read

There is a great article written by Douglas Crockford. I recommend everybody to read this article. By using Prototypal inheritance technique, we can create t...