When you reach the quotes of Azure Services you need to roll up your sleeves and go back to the design board.

Business context

A company has around 20–50 products that are available in the EU, APAC and all US states. Each product can have around 5–15 different presentation web site (including custom domain) in each country.

Technical constraint

The customer is using Azure and one of the technical objectives is to use only Azure Services, without any other 3rd party providers. Azure Front Door is in front of their API, used to map all the custom domains redirection to…


One common question that I hear lately is:

HOW MUCH WOULD COST ME TO BUILD A SYSTEM TO RUN ON TWO CLOUD VENDORS SIDE-BY-SIDE?

It is a simple question that a business person has. Nevertheless, the response is not simple. Without running a workshop and invest time to understand the business requirements, the current technology stack and expected quality attributes, providing a cost of building the same solution on another CSP (Cloud Service Provider) is hard.

There are tools on the market that provide the mechanism to assess costs on each CSP or what would be the cost of running…


Let’s talk about what are the main differences between Private Preview, Public Preview and General Availability (GA) of Azure Services and Features.

This topic is important when you run your workloads in production OR you manage sensitive data in production.

Remember that you SHALL NEVER use non-GA services and features for production workloads. The purpose of Private and Public Preview is only for evaluation purposes only. Except for the lack of SLA and formal support, there might be other issues that were not yet discovered or fixed. …


On August 21, 2021, an Azure CosmosDB vulnerability was reported for all Azure CosmosDB instances that are using Jupyter Notebooks. Using an active Jupyter Notebook an attacker was able to put his hands on the Azure CosmosDB keys that could be used to get access to the Azure CosmosDB.

Wizz.io describes in detail how somebody can use the vulnerability to steal the primary keys of the Azure CosmosDB instance. The vulnerability is serious because provides full access to Azure CosmosDB instance, including the data itself. …


Context

A system needs to collect information related to the garbage locations from the user. You decide that one of the interfaces that you want to build is based on a chatbot.

What do we want to achieve?

The user is not all the time in the same location where the garbage was spotted. You want to provide the user the ability to use an interactive map to select the location where the garbage is.

Technology stack

The selected bot that you decide to use is Azure Bot Service and will be fully integrated with Facebook Messager. We are using…


Context

A system needs to collect information related to the garbage locations from the user. You decide that one of the interfaces that you want to build is based on a chatbot.

What do you want to achieve?

The user is not all the time in the same location where the garbage was spotted. You want to provide the user the ability to use an interactive map to select the location where the garbage is.

Technology stack

The selected bot that you decide to use is Amazon LEX and will be fully integrated with Facebook Messager. You are using Node.JS…


Cloud lock-in is one of the most common topics related to cloud adoption. Surveys like the one done by IDG show that cloud lock-in is the biggest challenge for around 48% of large organizations. Finding the right balance between SaaS and IaaS and the level of cloud lock-in that you want for your IT systems is challenging.

This is why in today’s article, we talk about figures and numbers. The primary purpose is to see how we can calculate the cost of a cloud lock-in strategy vs. a multi-cloud approach from the cost point of view.

Lock-in cost

To be…


I will start a series of posts about how we can avoid cloud lock-in and interoperability between managed cloud services and external systems using different solutions on the market.

Cloud lock-in Overview

There are multiple definitions on the market, but when we talk about cloud lock-in or vendor lock-in, we refer to direct and indirect costs of a platform to be moved from one cloud vendor to another.

The lock-in makes customers more dependent on a cloud vendor, and migration to another vendor becomes expensive. There are multiple dimensions of cloud lock-in that we need to be aware like:

  • Storage…

One of the most used solutions to increase the performance of an application is by using a cache layer. The storage and database layer can be protected from throttling and intensive queries using a caching mechanism.

In this article, we analyze if a standard cache solution is our best option all the time.

Context

We are working on a web application with a frontend and an API consumed by the front-end and other 3rd parties systems. We don’t have control on the 3rd parties, but every 2 months, the number of request increase with 200%.

The current solution build by…


Caching is one of the most common solutions used to increase the performance of an application and to protect the databases from throttling and intensive queries. In this article, we analyze if a standard cache solution is our best option all the time.

Context

We are working on a web application with a frontend and an API consumed by the front-end and other 3rd parties systems. We don’t have control on the 3rd parties, but every 2 months, the number of request increase with 200%.

The current solution build by the team is written in .NET Core and runs inside…

Radu Vunvulea

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store