<?xml version="1.0" encoding="utf-8"?><rss version="2.0"><channel><title>Strive2Code</title><description>Blog author</description><link>https://strive2code.com/</link><pubDate>2026-04-18T17:59:24Z</pubDate><copyright>© 2025</copyright><generator>Moonglade v14.20.0</generator><language>en-US</language><item><title>The series of unfortunate events</title><link>https://strive2code.com/post/2026/4/2/the-series-of-unfortunate-events</link><description>March 31, 2026, was one of those days when the industry looked less like a machine and more like a pile-up. Anthropic accidentally shipped a release of Claude Code that exposed a large internal codebase through a source map. X had a U.S. outage the same day. OpenAI reported elevated failures for some ChatGPT Enterprise and Edu users joining workspaces through SSO. Anthropic's own status history also shows timeouts affecting Claude Opus 4.6 and Sonnet 4.6 from March 31 into April 1. Then, as if the point still needed proving, reporting linked a major supply-chain attack on the widely used Axios npm package to North Korean operators.</description><author>alex@strive2code.com (Alex K.)</author><guid isPermaLink="false">08729db6-34e9-4b29-923b-9d9f04502ade</guid><pubDate>2026-04-02T02:06:37Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2026-04-02T02:06:37Z</updated></item><item><title>Microsoft Entra essential configuration (security settings you can't afford to miss)</title><link>https://strive2code.com/post/2025/7/4/microsoft-entra-essential-configuration</link><description>Microsoft Entra (formerly Azure Entra ID/Azure Active Directory) is the backbone of modern enterprise identity management, but a misconfigured tenant is a hacker's dream. After analyzing countless security incidents and Microsoft's latest 2025 updates, I've compiled the essential configurations that separate secure organizations from tomorrow's breach headlines.</description><author>alex@strive2code.com (Alex K.)</author><guid isPermaLink="false">893b79da-5892-48f6-8a3b-dbe0d57cc36c</guid><pubDate>2025-07-04T18:30:54Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2025-07-04T18:30:54Z</updated></item><item><title>2025 Big Data &amp; Analytics summit in Toronto</title><link>https://strive2code.com/post/2025/6/9/big-data-and-analytics-summit-in-toronto-2025</link><description>2025 Big Data &amp; Analytics Summit in Toronto review, covering key insights from AI sessions, networking experiences, and vendor interactions. The post highlights practical takeaways on data strategy implementation and infrastructure building, while providing recommendations for future attendees considering in-person versus online participation.</description><author>alex@strive2code.com (Alex K.)</author><guid isPermaLink="false">9d07b0d2-1b7a-47f9-8deb-bb4607d3fff7</guid><pubDate>2025-06-09T15:48:44Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2025-06-09T15:48:44Z</updated></item><item><title>I'm Back! Introducing the New Strive2Code Blog Architecture</title><link>https://strive2code.com/post/2025/5/13/introducing-the-new-strive2code-blog-architecture</link><description>Hey everyone, it's been a while! Some of you might have noticed that I haven't published any new blog posts or videos lately. There's a good reason for that - I've been heads-down rebuilding Strive2Code from the ground up!
For the past few weeks, I've been pouring my nights and weekends into completely revamping my blogging platform. After many years with BlogEngine.NET (which relies on the .NET</description><author>alex@strive2code.com (Alex K.)</author><category>Azure</category><category>DevOps</category><category>.NET</category><guid isPermaLink="false">1558a8f7-5f9c-4f1f-96a8-7fe107e290ba</guid><pubDate>2025-05-13T01:29:40Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2025-05-13T01:29:40Z</updated></item><item><title>You've been tracked. Scan your phone now!</title><link>https://strive2code.com/post/2025/2/16/mvt-tool</link><description>Have you ever wondered if your phone is secretly being tracked? With so many spyware threats out there, it's crucial to stay ahead. In this video, I'll show you how to use MVT – Mobile Verification Toolkit – to scan your phone for spyware, analyze results, and secure your device. Whether you're an iPhone or Android user, this tool can reveal hidden threats that traditional antivirus apps miss.</description><author>alex@strive2code.com (Alex K.)</author><category>Cybersecurity</category><guid isPermaLink="false">004ee300-a800-4f1d-9d30-5c42b5cf6a62</guid><pubDate>2025-02-16T20:59:11Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2025-02-16T20:59:11Z</updated></item><item><title>Microsoft Security Intro</title><link>https://strive2code.com/post/2025/1/15/microsoft-security-intro</link><description>In today’s world, where cyber threats evolve faster than ever, securing your digital infrastructure isn’t just an option—it’s a necessity. That’s why I’ve created an in-depth YouTube video that explores the power of Microsoft 365 and Azure Security tools to help businesses of all sizes protect what matters most. If you haven’t watched it yet, here’s what you’re missing out on!</description><author>alex@strive2code.com (Alex K.)</author><category>Cybersecurity</category><guid isPermaLink="false">c6abc0b7-d699-4c78-b908-5dd5cae16672</guid><pubDate>2025-01-15T08:18:06Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2025-01-15T08:18:06Z</updated></item><item><title>How to protect yourself from Phishing and Ransomware</title><link>https://strive2code.com/post/2025/1/1/how-to-protect-yourself-from-phishing-and-ransomware</link><description>Phishing attacks are one of the most common entry points for ransomware. A single click on a malicious link or attachment can open the floodgates to attackers, compromising sensitive data and putting systems at risk. Whether you're a home user relying on Microsoft Defender or an office user with Microsoft 365 licenses, understanding and implementing the right security measures can save you from</description><author>alex@strive2code.com (Alex K.)</author><category>Cybersecurity</category><guid isPermaLink="false">568cc8fb-4871-47ec-952b-c2851cdb894a</guid><pubDate>2025-01-01T08:24:52Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2025-01-01T08:24:52Z</updated></item><item><title>Microsoft Cybersecurity Certification</title><link>https://strive2code.com/post/2024/12/21/microsoft-cybersecurity-certification</link><description>Hey there, friends!
Today's blog post is all about Microsoft Security Certifications. Why? Because when I was trying to figure out where to start and how to navigate through the certifications, I couldn't find a clear answer. So, I decided to put together this post to simplify things and give you a clear certification path (and even some infographics) for starting your journey into Microsoft’s</description><author>alex@strive2code.com (Alex K.)</author><category>Cybersecurity</category><guid isPermaLink="false">3c4aad5d-827e-4675-868f-c3723e39423a</guid><pubDate>2024-12-21T08:32:28Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2024-12-21T08:32:28Z</updated></item><item><title>Azure Resource Inventory (ARI)</title><link>https://strive2code.com/post/2024/8/24/azure-resource-inventory-ari</link><description>As cloud environments grow more complex, keeping track of every resource within an Azure subscription can quickly become overwhelming. Whether you're managing a small deployment or an enterprise-scale environment, the need for a comprehensive overview of your resources is essential for maintaining control, ensuring compliance, and optimizing costs. This is where Azure Resource Inventory (ARI)</description><author>alex@strive2code.com (Alex K.)</author><category>DevOps</category><guid isPermaLink="false">44a5da63-e8c2-4b87-b84f-5a52620c32e9</guid><pubDate>2024-08-24T08:39:10Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2024-08-24T08:39:10Z</updated></item><item><title>Changing editor for Git</title><link>https://strive2code.com/post/2024/8/2/changing-editor-for-git</link><description>When using Git on the command line, you may encounter a challenge with the default editor when writing commit messages.
While typically, you can use the -m flag to include the commit message directly in the command like git commit -m "My commit text", sometimes you may need to amend a commit or accidentally run git commit without specifying a commit message. In these instances, you might be</description><author>alex@strive2code.com (Alex K.)</author><category>DevOps</category><guid isPermaLink="false">80b4a2bb-b9f1-42fc-ae1b-4ab11d84be4e</guid><pubDate>2024-08-02T08:42:27Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2024-08-02T08:42:27Z</updated></item><item><title>Counting Exercise Reps with YOLOv8, PyTorch, and NVIDIA CUDA</title><link>https://strive2code.com/post/2024/3/17/counting-exercise-reps-with-yolov8-pytorch-and-nvidia-cuda</link><description>What?
In the world of fitness and personal training, keeping track of exercise repetitions is crucial for tracking progress, setting goals, and ensuring proper form. While manually counting reps can be tedious and error-prone, modern computer vision techniques offer a more accurate and convenient solution. On top of that, there's a huge value in processing historical data (time series analysis),</description><author>alex@strive2code.com (Alex K.)</author><category>AI &amp; ML</category><guid isPermaLink="false">0ba7038e-8475-4182-ab3f-5153f593f9b9</guid><pubDate>2024-03-17T08:51:11Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2024-03-17T08:51:11Z</updated></item><item><title>Installing CUDA and TensorRT on Windows 11 for GPU-Accelerated Pose Estimation</title><link>https://strive2code.com/post/2024/3/12/installing-cuda-and-tensorrt-on-windows-11</link><description>If you're a computer vision enthusiast or a deep learning practitioner working on pose estimation tasks, you'll know that leveraging the power of GPUs can significantly accelerate your computations. However, setting up the required software stack can be a daunting task, especially on Windows machines. In this post, we'll walk through the steps to install CUDA Toolkit, cuDNN and TensorRT on a</description><author>alex@strive2code.com (Alex K.)</author><category>AI &amp; ML</category><guid isPermaLink="false">9fb53353-38e4-4a0f-bbed-3a1f05f2321e</guid><pubDate>2024-03-12T08:59:11Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2024-03-12T08:59:11Z</updated></item><item><title>Managing Python virtual environments</title><link>https://strive2code.com/post/2023/10/12/managing-python-virtual-environments</link><description>As a Python developer, managing multiple versions of Python and their associated packages can quickly become a headache, especially when working on different projects with varying dependencies. This is where virtual environments come into play, allowing you to create isolated Python environments for each project and ensuring smooth development without conflicts. In this post, we'll explore how</description><author>alex@strive2code.com (Alex K.)</author><category>Python</category><guid isPermaLink="false">144ec63b-ba72-4d27-9e5f-8c04601e9192</guid><pubDate>2023-10-12T09:05:32Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2023-10-12T09:05:32Z</updated></item><item><title>DELL XPS 9520 Hibernation issue and resolution</title><link>https://strive2code.com/post/2022/8/10/dell-xps-9520-hibernation-issue-and-resolution</link><description>A while ago, I filmed a YouTube video reviewing the new DELL XPS 9520 (a high-performing Windows laptop with a sturdy build and OLED screen). You can view this video on my YouTube channel:

It's an excellent machine, but not without small flaws. This is not my first XPS, and when it went to GA, you can expect that certain issues might not have been fixed in their entirety or could have been</description><author>alex@strive2code.com (Alex K.)</author><category>Hardware</category><guid isPermaLink="false">7a8f630f-fd49-47e0-b6b7-3a75cfb76534</guid><pubDate>2022-08-10T09:12:01Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2022-08-10T09:12:01Z</updated></item><item><title>Meadow Hack Kit  Pro (Part 2)</title><link>https://strive2code.com/post/2021/12/29/meadow-hack-kit-pro-part-2</link><description>This part is all about completing the pre-requisites. We've started with the board assembly in Part 1 here, and to proceed with the application development, we need to put the board together (which requires some soldering) and flash the Meadow OS to it.

Step 1
To complete this step, we would need the following:


1 Meadow board (aka 'base')


1 Wooden Wilderness Labs protoboard (or breadboard)</description><author>alex@strive2code.com (Alex K.)</author><category>IoT</category><category>Hardware</category><category>.NET</category><guid isPermaLink="false">f0f6cd7b-be32-4c27-aa80-c93c5852026b</guid><pubDate>2021-12-29T09:59:47Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2021-12-29T09:59:47Z</updated></item><item><title>Meadow Hack Kit  Pro (Part 1)</title><link>https://strive2code.com/post/2021/12/28/meadow-hack-kit-pro-part-1</link><description>Today I'm talking about Meadow Hack Kit. If you're unfamiliar with this technology or want to learn more, keep reading. Meadow is a complete Enterprise-grade IoT platform that runs .NET applications on embeddable microcontrollers. It's a plug-and-play IoT library with a huge selection of peripheral drivers and a prototype-friendly developer kit that enables you to build prototypes on real</description><author>alex@strive2code.com (Alex K.)</author><category>IoT</category><category>Hardware</category><category>.NET</category><guid isPermaLink="false">f152b78c-187b-458d-b960-8fdc423f880b</guid><pubDate>2021-12-28T10:05:31Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2021-12-28T10:05:31Z</updated></item><item><title>SharePoint Server Subscription Edition - GA</title><link>https://strive2code.com/post/2021/11/4/sharepoint-server-subscription-edition</link><description>Today at Microsoft Ignite, the general availability of the next on-premises version of SharePoint Server (SharePoint Server Subscription Edition aka SPSE) has been announced.
Quoting Bill Baer (Senior Product Marketing Manager for SharePoint): SharePoint Server Subscription Edition represents the next step in the SharePoint Server journey emphasizing the specific needs of our on-premises</description><author>alex@strive2code.com (Alex K.)</author><category>Microsoft 365</category><guid isPermaLink="false">8b3a42d4-75d5-45db-930c-bee96af64996</guid><pubDate>2021-11-04T10:10:53Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2021-11-04T10:10:53Z</updated></item><item><title>O365 Tenant rename</title><link>https://strive2code.com/post/2021/9/16/o365-tenant-rename</link><description>It finally happened! It's now possible to change the SharePoint/OneDrive domain name for your organization in Microsoft 365. So, for example, if your organization's name changes from "Contoso" to "Fabrikam," you can change contoso.onmicrosoft.com to fabrikam.onmicrosoft.com. Unfortunately, organizations haven't had the option to do so — until now…
What is Tenant?
To reiterate quickly, a 'tenant'</description><author>alex@strive2code.com (Alex K.)</author><category>Microsoft 365</category><guid isPermaLink="false">c43b8fe7-581b-448c-be2e-1e7e1ed03c37</guid><pubDate>2021-09-16T10:13:22Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2021-09-16T10:13:22Z</updated></item><item><title>Deploy Crunchy PostgreSQL Operator to AKS</title><link>https://strive2code.com/post/2020/12/5/deploy-crunchy-postgresql-operator-to-aks</link><description>Crunchy PostgreSQL for Kubernetes is the cloud-native way to manage your own database-as-a-service (DaaS) in any public, private, or hybrid cloud. Crunchy PostgreSQL for Kubernetes is an enterprise deployment solution for PostgreSQL that unlocks true open-source cost savings and efficiency with the flexibility to run your databases on any infrastructure from a single interface.
'Cui bono' you</description><author>alex@strive2code.com (Alex K.)</author><category>Azure</category><category>DevOps</category><guid isPermaLink="false">db20fc7f-070e-47d7-94e2-46fd9e520352</guid><pubDate>2020-12-05T10:23:36Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2020-12-05T10:23:36Z</updated></item><item><title>Enable SSH for containerized Azure Functions</title><link>https://strive2code.com/post/2020/11/14/enable-ssh-for-containerized-azure-functions</link><description>Very often, in the active development phase, regular logging does not help too much. Azure Functions that process some data or heavier payloads (like images or video files even) tend to store temporary processing data inside the container. By default, there's no way you can get inside the container to take a look at what's going on at the file system level. For such purposes, Secure Shell (SSH)</description><author>alex@strive2code.com (Alex K.)</author><category>Azure</category><category>DevOps</category><guid isPermaLink="false">b8514c6f-7c0f-4ffb-be5e-7c1561a2d979</guid><pubDate>2020-11-14T10:44:29Z</pubDate><updated xmlns="http://www.w3.org/2005/Atom">2020-11-14T10:44:29Z</updated></item></channel></rss>