May
01
"We will solve it with Machine Learning!" You may have heard this phrase recently, maybe at a team meeting or in a chat on Slack. But what does that actually mean and how feasible is it to "solve" anything with Machine Learning? Read More
Apr
08
In this blogpost, we will discuss what FedRAMP is, why it was formed, and why you would want to prove compliance. We'll also go over Azure blueprints and policy and how to implement FedRAMP on Azure. Read More
Jan
29
In today's IT world, we're experiencing a new age of transformation for Data Centers. Companies and individuals alike are looking to utilize Cloud technologies and abilities, such as SDx, 5G, containers, automation, DevOps, mobility, versatility, and so forth. As our Data Centers evolve, the question that remains is what, exactly, will happen to the Data Centers we have today? Will they be transformed into piles of metal and rubbish? Read More
Nov
06
This interactive article is Part Two of a two-part series on facilitating transitive routing over Azure virtual network peering connections. In Part One, I discussed the need for transitive routing, some advantages and disadvantages of the architecture, and alternatives to transitive routing. In this article, I will demonstrate the process of establishing transitive routing in a hub-and-spoke network topology. Read More
Oct
30
In my previous post, I said the following about Confidentiality: Confidentiality is the concept of the measures used to ensure the protection of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to data. Read More
Oct
17
This blog is Part One of a two-part series on facilitating transitive routing over Azure virtual network peering connections. Here in Part One, I will discuss the need for transitive routing, some advantages and disadvantages of the architecture, and alternatives to transitive routing. Read More
Sep
18
The primary goal of security is to provide confidentiality, integrity, and availability. In this blog post, we'll define what the CIA Triad is and why security controls are evaluated against it. I'll also demonstrate how you can achieve confidentiality and high-availability using Microsoft Azure's public cloud infrastructure. Read More
Sep
11
I'd like to share with you my experience with the Microsoft Certified Azure Solution Architect Expert Certification. Hereafter referred to as Azure Architect, it's currently Microsoft's premier Azure certification. In fact, it's been one of the top Microsoft certifications since its introduction at the Ignite 2018 conference. Read More
Aug
28
A quote that sticks with me to this day is from the Prime Minister of Canada, Justin Trudeau, speaking at the 2018 World Economic Forum. He said: "The pace of change has never been this fast, yet it will never be this slow again." Read More
Aug
21
Azure is a wonderful place. From virtual machines to cognitive services and beyond, it's full of great resources you can use. But when using these services, it's very easy to make mistakes or take nefarious action. It's all too simple to violate security and separation of duties, or create services that burn through cash. To help with this, Microsoft created Azure Policies. Read More

Subscribe to INE Blog Updates

New Blog Posts!