<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom"><title>Strive2Code</title><subtitle>Blog author</subtitle><rights>© 2025</rights><updated>2026-03-07T05:45:32Z</updated><generator uri="https://strive2code.com">Moonglade v14.20.0</generator><entry><id>893b79da-5892-48f6-8a3b-dbe0d57cc36c</id><title>Microsoft Entra essential configuration (security settings you can't afford to miss)</title><updated>2025-07-04T18:30:54Z</updated><published>2025-07-04T18:30:54Z</published><link href="https://strive2code.com/post/2025/7/4/microsoft-entra-essential-configuration" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><content>Microsoft Entra (formerly Azure Entra ID/Azure Active Directory) is the backbone of modern enterprise identity management, but a misconfigured tenant is a hacker's dream. After analyzing countless security incidents and Microsoft's latest 2025 updates, I've compiled the essential configurations that separate secure organizations from tomorrow's breach headlines.</content></entry><entry><id>9d07b0d2-1b7a-47f9-8deb-bb4607d3fff7</id><title>2025 Big Data &amp; Analytics summit in Toronto</title><updated>2025-06-09T15:48:44Z</updated><published>2025-06-09T15:48:44Z</published><link href="https://strive2code.com/post/2025/6/9/big-data-and-analytics-summit-in-toronto-2025" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><content>2025 Big Data &amp; Analytics Summit in Toronto review, covering key insights from AI sessions, networking experiences, and vendor interactions. The post highlights practical takeaways on data strategy implementation and infrastructure building, while providing recommendations for future attendees considering in-person versus online participation.</content></entry><entry><id>1558a8f7-5f9c-4f1f-96a8-7fe107e290ba</id><title>I'm Back! Introducing the New Strive2Code Blog Architecture</title><updated>2025-05-13T01:29:40Z</updated><published>2025-05-13T01:29:40Z</published><link href="https://strive2code.com/post/2025/5/13/introducing-the-new-strive2code-blog-architecture" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Azure" /><category term="DevOps" /><category term=".NET" /><content>Hey everyone, it's been a while! Some of you might have noticed that I haven't published any new blog posts or videos lately. There's a good reason for that - I've been heads-down rebuilding Strive2Code from the ground up!
For the past few weeks, I've been pouring my nights and weekends into completely revamping my blogging platform. After many years with BlogEngine.NET (which relies on the .NET</content></entry><entry><id>004ee300-a800-4f1d-9d30-5c42b5cf6a62</id><title>You've been tracked. Scan your phone now!</title><updated>2025-02-16T20:59:11Z</updated><published>2025-02-16T20:59:11Z</published><link href="https://strive2code.com/post/2025/2/16/mvt-tool" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Cybersecurity" /><content>Have you ever wondered if your phone is secretly being tracked? With so many spyware threats out there, it's crucial to stay ahead. In this video, I'll show you how to use MVT – Mobile Verification Toolkit – to scan your phone for spyware, analyze results, and secure your device. Whether you're an iPhone or Android user, this tool can reveal hidden threats that traditional antivirus apps miss.</content></entry><entry><id>c6abc0b7-d699-4c78-b908-5dd5cae16672</id><title>Microsoft Security Intro</title><updated>2025-01-15T08:18:06Z</updated><published>2025-01-15T08:18:06Z</published><link href="https://strive2code.com/post/2025/1/15/microsoft-security-intro" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Cybersecurity" /><content>In today’s world, where cyber threats evolve faster than ever, securing your digital infrastructure isn’t just an option—it’s a necessity. That’s why I’ve created an in-depth YouTube video that explores the power of Microsoft 365 and Azure Security tools to help businesses of all sizes protect what matters most. If you haven’t watched it yet, here’s what you’re missing out on!</content></entry><entry><id>568cc8fb-4871-47ec-952b-c2851cdb894a</id><title>How to protect yourself from Phishing and Ransomware</title><updated>2025-01-01T08:24:52Z</updated><published>2025-01-01T08:24:52Z</published><link href="https://strive2code.com/post/2025/1/1/how-to-protect-yourself-from-phishing-and-ransomware" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Cybersecurity" /><content>Phishing attacks are one of the most common entry points for ransomware. A single click on a malicious link or attachment can open the floodgates to attackers, compromising sensitive data and putting systems at risk. Whether you're a home user relying on Microsoft Defender or an office user with Microsoft 365 licenses, understanding and implementing the right security measures can save you from</content></entry><entry><id>3c4aad5d-827e-4675-868f-c3723e39423a</id><title>Microsoft Cybersecurity Certification</title><updated>2024-12-21T08:32:28Z</updated><published>2024-12-21T08:32:28Z</published><link href="https://strive2code.com/post/2024/12/21/microsoft-cybersecurity-certification" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Cybersecurity" /><content>Hey there, friends!
Today's blog post is all about Microsoft Security Certifications. Why? Because when I was trying to figure out where to start and how to navigate through the certifications, I couldn't find a clear answer. So, I decided to put together this post to simplify things and give you a clear certification path (and even some infographics) for starting your journey into Microsoft’s</content></entry><entry><id>44a5da63-e8c2-4b87-b84f-5a52620c32e9</id><title>Azure Resource Inventory (ARI)</title><updated>2024-08-24T08:39:10Z</updated><published>2024-08-24T08:39:10Z</published><link href="https://strive2code.com/post/2024/8/24/azure-resource-inventory-ari" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="DevOps" /><content>As cloud environments grow more complex, keeping track of every resource within an Azure subscription can quickly become overwhelming. Whether you're managing a small deployment or an enterprise-scale environment, the need for a comprehensive overview of your resources is essential for maintaining control, ensuring compliance, and optimizing costs. This is where Azure Resource Inventory (ARI)</content></entry><entry><id>80b4a2bb-b9f1-42fc-ae1b-4ab11d84be4e</id><title>Changing editor for Git</title><updated>2024-08-02T08:42:27Z</updated><published>2024-08-02T08:42:27Z</published><link href="https://strive2code.com/post/2024/8/2/changing-editor-for-git" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="DevOps" /><content>When using Git on the command line, you may encounter a challenge with the default editor when writing commit messages.
While typically, you can use the -m flag to include the commit message directly in the command like git commit -m "My commit text", sometimes you may need to amend a commit or accidentally run git commit without specifying a commit message. In these instances, you might be</content></entry><entry><id>0ba7038e-8475-4182-ab3f-5153f593f9b9</id><title>Counting Exercise Reps with YOLOv8, PyTorch, and NVIDIA CUDA</title><updated>2024-03-17T08:51:11Z</updated><published>2024-03-17T08:51:11Z</published><link href="https://strive2code.com/post/2024/3/17/counting-exercise-reps-with-yolov8-pytorch-and-nvidia-cuda" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="AI &amp; ML" /><content>What?
In the world of fitness and personal training, keeping track of exercise repetitions is crucial for tracking progress, setting goals, and ensuring proper form. While manually counting reps can be tedious and error-prone, modern computer vision techniques offer a more accurate and convenient solution. On top of that, there's a huge value in processing historical data (time series analysis),</content></entry><entry><id>9fb53353-38e4-4a0f-bbed-3a1f05f2321e</id><title>Installing CUDA and TensorRT on Windows 11 for GPU-Accelerated Pose Estimation</title><updated>2024-03-12T08:59:11Z</updated><published>2024-03-12T08:59:11Z</published><link href="https://strive2code.com/post/2024/3/12/installing-cuda-and-tensorrt-on-windows-11" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="AI &amp; ML" /><content>If you're a computer vision enthusiast or a deep learning practitioner working on pose estimation tasks, you'll know that leveraging the power of GPUs can significantly accelerate your computations. However, setting up the required software stack can be a daunting task, especially on Windows machines. In this post, we'll walk through the steps to install CUDA Toolkit, cuDNN and TensorRT on a</content></entry><entry><id>144ec63b-ba72-4d27-9e5f-8c04601e9192</id><title>Managing Python virtual environments</title><updated>2023-10-12T09:05:32Z</updated><published>2023-10-12T09:05:32Z</published><link href="https://strive2code.com/post/2023/10/12/managing-python-virtual-environments" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Python" /><content>As a Python developer, managing multiple versions of Python and their associated packages can quickly become a headache, especially when working on different projects with varying dependencies. This is where virtual environments come into play, allowing you to create isolated Python environments for each project and ensuring smooth development without conflicts. In this post, we'll explore how</content></entry><entry><id>7a8f630f-fd49-47e0-b6b7-3a75cfb76534</id><title>DELL XPS 9520 Hibernation issue and resolution</title><updated>2022-08-10T09:12:01Z</updated><published>2022-08-10T09:12:01Z</published><link href="https://strive2code.com/post/2022/8/10/dell-xps-9520-hibernation-issue-and-resolution" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Hardware" /><content>A while ago, I filmed a YouTube video reviewing the new DELL XPS 9520 (a high-performing Windows laptop with a sturdy build and OLED screen). You can view this video on my YouTube channel:

It's an excellent machine, but not without small flaws. This is not my first XPS, and when it went to GA, you can expect that certain issues might not have been fixed in their entirety or could have been</content></entry><entry><id>f0f6cd7b-be32-4c27-aa80-c93c5852026b</id><title>Meadow Hack Kit  Pro (Part 2)</title><updated>2021-12-29T09:59:47Z</updated><published>2021-12-29T09:59:47Z</published><link href="https://strive2code.com/post/2021/12/29/meadow-hack-kit-pro-part-2" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="IoT" /><category term="Hardware" /><category term=".NET" /><content>This part is all about completing the pre-requisites. We've started with the board assembly in Part 1 here, and to proceed with the application development, we need to put the board together (which requires some soldering) and flash the Meadow OS to it.

Step 1
To complete this step, we would need the following:


1 Meadow board (aka 'base')


1 Wooden Wilderness Labs protoboard (or breadboard)</content></entry><entry><id>f152b78c-187b-458d-b960-8fdc423f880b</id><title>Meadow Hack Kit  Pro (Part 1)</title><updated>2021-12-28T10:05:31Z</updated><published>2021-12-28T10:05:31Z</published><link href="https://strive2code.com/post/2021/12/28/meadow-hack-kit-pro-part-1" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="IoT" /><category term="Hardware" /><category term=".NET" /><content>Today I'm talking about Meadow Hack Kit. If you're unfamiliar with this technology or want to learn more, keep reading. Meadow is a complete Enterprise-grade IoT platform that runs .NET applications on embeddable microcontrollers. It's a plug-and-play IoT library with a huge selection of peripheral drivers and a prototype-friendly developer kit that enables you to build prototypes on real</content></entry><entry><id>8b3a42d4-75d5-45db-930c-bee96af64996</id><title>SharePoint Server Subscription Edition - GA</title><updated>2021-11-04T10:10:53Z</updated><published>2021-11-04T10:10:53Z</published><link href="https://strive2code.com/post/2021/11/4/sharepoint-server-subscription-edition" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Microsoft 365" /><content>Today at Microsoft Ignite, the general availability of the next on-premises version of SharePoint Server (SharePoint Server Subscription Edition aka SPSE) has been announced.
Quoting Bill Baer (Senior Product Marketing Manager for SharePoint): SharePoint Server Subscription Edition represents the next step in the SharePoint Server journey emphasizing the specific needs of our on-premises</content></entry><entry><id>c43b8fe7-581b-448c-be2e-1e7e1ed03c37</id><title>O365 Tenant rename</title><updated>2021-09-16T10:13:22Z</updated><published>2021-09-16T10:13:22Z</published><link href="https://strive2code.com/post/2021/9/16/o365-tenant-rename" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Microsoft 365" /><content>It finally happened! It's now possible to change the SharePoint/OneDrive domain name for your organization in Microsoft 365. So, for example, if your organization's name changes from "Contoso" to "Fabrikam," you can change contoso.onmicrosoft.com to fabrikam.onmicrosoft.com. Unfortunately, organizations haven't had the option to do so — until now…
What is Tenant?
To reiterate quickly, a 'tenant'</content></entry><entry><id>db20fc7f-070e-47d7-94e2-46fd9e520352</id><title>Deploy Crunchy PostgreSQL Operator to AKS</title><updated>2020-12-05T10:23:36Z</updated><published>2020-12-05T10:23:36Z</published><link href="https://strive2code.com/post/2020/12/5/deploy-crunchy-postgresql-operator-to-aks" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Azure" /><category term="DevOps" /><content>Crunchy PostgreSQL for Kubernetes is the cloud-native way to manage your own database-as-a-service (DaaS) in any public, private, or hybrid cloud. Crunchy PostgreSQL for Kubernetes is an enterprise deployment solution for PostgreSQL that unlocks true open-source cost savings and efficiency with the flexibility to run your databases on any infrastructure from a single interface.
'Cui bono' you</content></entry><entry><id>b8514c6f-7c0f-4ffb-be5e-7c1561a2d979</id><title>Enable SSH for containerized Azure Functions</title><updated>2020-11-14T10:44:29Z</updated><published>2020-11-14T10:44:29Z</published><link href="https://strive2code.com/post/2020/11/14/enable-ssh-for-containerized-azure-functions" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Azure" /><category term="DevOps" /><content>Very often, in the active development phase, regular logging does not help too much. Azure Functions that process some data or heavier payloads (like images or video files even) tend to store temporary processing data inside the container. By default, there's no way you can get inside the container to take a look at what's going on at the file system level. For such purposes, Secure Shell (SSH)</content></entry><entry><id>3279bb94-1516-41ed-9d3a-d6f9431f07a2</id><title>Design your app for the cloud (best practices)</title><updated>2020-10-02T10:47:05Z</updated><published>2020-10-02T10:47:05Z</published><link href="https://strive2code.com/post/2020/10/2/design-your-app-for-the-cloud-best-practices" hreflang="en-us" /><author><name>Alex K.</name><email>alex@strive2code.com</email></author><category term="Azure" /><category term="DevOps" /><content>I had no opportunity to write in recent days. In this topic, I decided to share something unusual and highly theoretical. I want to talk about the best practices for adapting apps for the cloud (Microsoft Azure, particularly, but most of them are applicable to any cloud provider). I hope that the concepts outlined below will help you to understand the process better, and hence, apply it in</content></entry></feed>