Strive2CodeBlog author© 20252026-04-13T07:17:04ZMoonglade v14.20.008729db6-34e9-4b29-923b-9d9f04502adeThe series of unfortunate events2026-04-02T02:06:37Z2026-04-02T02:06:37ZAlex K.alex@strive2code.comMarch 31, 2026, was one of those days when the industry looked less like a machine and more like a pile-up. Anthropic accidentally shipped a release of Claude Code that exposed a large internal codebase through a source map. X had a U.S. outage the same day. OpenAI reported elevated failures for some ChatGPT Enterprise and Edu users joining workspaces through SSO. Anthropic's own status history also shows timeouts affecting Claude Opus 4.6 and Sonnet 4.6 from March 31 into April 1. Then, as if the point still needed proving, reporting linked a major supply-chain attack on the widely used Axios npm package to North Korean operators.893b79da-5892-48f6-8a3b-dbe0d57cc36cMicrosoft Entra essential configuration (security settings you can't afford to miss)2025-07-04T18:30:54Z2025-07-04T18:30:54ZAlex K.alex@strive2code.comMicrosoft Entra (formerly Azure Entra ID/Azure Active Directory) is the backbone of modern enterprise identity management, but a misconfigured tenant is a hacker's dream. After analyzing countless security incidents and Microsoft's latest 2025 updates, I've compiled the essential configurations that separate secure organizations from tomorrow's breach headlines.9d07b0d2-1b7a-47f9-8deb-bb4607d3fff72025 Big Data & Analytics summit in Toronto2025-06-09T15:48:44Z2025-06-09T15:48:44ZAlex K.alex@strive2code.com2025 Big Data & Analytics Summit in Toronto review, covering key insights from AI sessions, networking experiences, and vendor interactions. The post highlights practical takeaways on data strategy implementation and infrastructure building, while providing recommendations for future attendees considering in-person versus online participation.1558a8f7-5f9c-4f1f-96a8-7fe107e290baI'm Back! Introducing the New Strive2Code Blog Architecture2025-05-13T01:29:40Z2025-05-13T01:29:40ZAlex K.alex@strive2code.comHey everyone, it's been a while! Some of you might have noticed that I haven't published any new blog posts or videos lately. There's a good reason for that - I've been heads-down rebuilding Strive2Code from the ground up! For the past few weeks, I've been pouring my nights and weekends into completely revamping my blogging platform. After many years with BlogEngine.NET (which relies on the .NET004ee300-a800-4f1d-9d30-5c42b5cf6a62You've been tracked. Scan your phone now!2025-02-16T20:59:11Z2025-02-16T20:59:11ZAlex K.alex@strive2code.comHave you ever wondered if your phone is secretly being tracked? With so many spyware threats out there, it's crucial to stay ahead. In this video, I'll show you how to use MVT – Mobile Verification Toolkit – to scan your phone for spyware, analyze results, and secure your device. Whether you're an iPhone or Android user, this tool can reveal hidden threats that traditional antivirus apps miss.c6abc0b7-d699-4c78-b908-5dd5cae16672Microsoft Security Intro2025-01-15T08:18:06Z2025-01-15T08:18:06ZAlex K.alex@strive2code.comIn today’s world, where cyber threats evolve faster than ever, securing your digital infrastructure isn’t just an option—it’s a necessity. That’s why I’ve created an in-depth YouTube video that explores the power of Microsoft 365 and Azure Security tools to help businesses of all sizes protect what matters most. If you haven’t watched it yet, here’s what you’re missing out on!568cc8fb-4871-47ec-952b-c2851cdb894aHow to protect yourself from Phishing and Ransomware2025-01-01T08:24:52Z2025-01-01T08:24:52ZAlex K.alex@strive2code.comPhishing attacks are one of the most common entry points for ransomware. A single click on a malicious link or attachment can open the floodgates to attackers, compromising sensitive data and putting systems at risk. Whether you're a home user relying on Microsoft Defender or an office user with Microsoft 365 licenses, understanding and implementing the right security measures can save you from3c4aad5d-827e-4675-868f-c3723e39423aMicrosoft Cybersecurity Certification2024-12-21T08:32:28Z2024-12-21T08:32:28ZAlex K.alex@strive2code.comHey there, friends! Today's blog post is all about Microsoft Security Certifications. Why? Because when I was trying to figure out where to start and how to navigate through the certifications, I couldn't find a clear answer. So, I decided to put together this post to simplify things and give you a clear certification path (and even some infographics) for starting your journey into Microsoft’s44a5da63-e8c2-4b87-b84f-5a52620c32e9Azure Resource Inventory (ARI)2024-08-24T08:39:10Z2024-08-24T08:39:10ZAlex K.alex@strive2code.comAs cloud environments grow more complex, keeping track of every resource within an Azure subscription can quickly become overwhelming. Whether you're managing a small deployment or an enterprise-scale environment, the need for a comprehensive overview of your resources is essential for maintaining control, ensuring compliance, and optimizing costs. This is where Azure Resource Inventory (ARI)80b4a2bb-b9f1-42fc-ae1b-4ab11d84be4eChanging editor for Git2024-08-02T08:42:27Z2024-08-02T08:42:27ZAlex K.alex@strive2code.comWhen using Git on the command line, you may encounter a challenge with the default editor when writing commit messages. While typically, you can use the -m flag to include the commit message directly in the command like git commit -m "My commit text", sometimes you may need to amend a commit or accidentally run git commit without specifying a commit message. In these instances, you might be0ba7038e-8475-4182-ab3f-5153f593f9b9Counting Exercise Reps with YOLOv8, PyTorch, and NVIDIA CUDA2024-03-17T08:51:11Z2024-03-17T08:51:11ZAlex K.alex@strive2code.comWhat? In the world of fitness and personal training, keeping track of exercise repetitions is crucial for tracking progress, setting goals, and ensuring proper form. While manually counting reps can be tedious and error-prone, modern computer vision techniques offer a more accurate and convenient solution. On top of that, there's a huge value in processing historical data (time series analysis),9fb53353-38e4-4a0f-bbed-3a1f05f2321eInstalling CUDA and TensorRT on Windows 11 for GPU-Accelerated Pose Estimation2024-03-12T08:59:11Z2024-03-12T08:59:11ZAlex K.alex@strive2code.comIf you're a computer vision enthusiast or a deep learning practitioner working on pose estimation tasks, you'll know that leveraging the power of GPUs can significantly accelerate your computations. However, setting up the required software stack can be a daunting task, especially on Windows machines. In this post, we'll walk through the steps to install CUDA Toolkit, cuDNN and TensorRT on a144ec63b-ba72-4d27-9e5f-8c04601e9192Managing Python virtual environments2023-10-12T09:05:32Z2023-10-12T09:05:32ZAlex K.alex@strive2code.comAs a Python developer, managing multiple versions of Python and their associated packages can quickly become a headache, especially when working on different projects with varying dependencies. This is where virtual environments come into play, allowing you to create isolated Python environments for each project and ensuring smooth development without conflicts. In this post, we'll explore how7a8f630f-fd49-47e0-b6b7-3a75cfb76534DELL XPS 9520 Hibernation issue and resolution2022-08-10T09:12:01Z2022-08-10T09:12:01ZAlex K.alex@strive2code.comA while ago, I filmed a YouTube video reviewing the new DELL XPS 9520 (a high-performing Windows laptop with a sturdy build and OLED screen). You can view this video on my YouTube channel: It's an excellent machine, but not without small flaws. This is not my first XPS, and when it went to GA, you can expect that certain issues might not have been fixed in their entirety or could have beenf0f6cd7b-be32-4c27-aa80-c93c5852026bMeadow Hack Kit Pro (Part 2)2021-12-29T09:59:47Z2021-12-29T09:59:47ZAlex K.alex@strive2code.comThis part is all about completing the pre-requisites. We've started with the board assembly in Part 1 here, and to proceed with the application development, we need to put the board together (which requires some soldering) and flash the Meadow OS to it. Step 1 To complete this step, we would need the following: 1 Meadow board (aka 'base') 1 Wooden Wilderness Labs protoboard (or breadboard)f152b78c-187b-458d-b960-8fdc423f880bMeadow Hack Kit Pro (Part 1)2021-12-28T10:05:31Z2021-12-28T10:05:31ZAlex K.alex@strive2code.comToday I'm talking about Meadow Hack Kit. If you're unfamiliar with this technology or want to learn more, keep reading. Meadow is a complete Enterprise-grade IoT platform that runs .NET applications on embeddable microcontrollers. It's a plug-and-play IoT library with a huge selection of peripheral drivers and a prototype-friendly developer kit that enables you to build prototypes on real8b3a42d4-75d5-45db-930c-bee96af64996SharePoint Server Subscription Edition - GA2021-11-04T10:10:53Z2021-11-04T10:10:53ZAlex K.alex@strive2code.comToday at Microsoft Ignite, the general availability of the next on-premises version of SharePoint Server (SharePoint Server Subscription Edition aka SPSE) has been announced. Quoting Bill Baer (Senior Product Marketing Manager for SharePoint): SharePoint Server Subscription Edition represents the next step in the SharePoint Server journey emphasizing the specific needs of our on-premisesc43b8fe7-581b-448c-be2e-1e7e1ed03c37O365 Tenant rename2021-09-16T10:13:22Z2021-09-16T10:13:22ZAlex K.alex@strive2code.comIt finally happened! It's now possible to change the SharePoint/OneDrive domain name for your organization in Microsoft 365. So, for example, if your organization's name changes from "Contoso" to "Fabrikam," you can change contoso.onmicrosoft.com to fabrikam.onmicrosoft.com. Unfortunately, organizations haven't had the option to do so — until now… What is Tenant? To reiterate quickly, a 'tenant'db20fc7f-070e-47d7-94e2-46fd9e520352Deploy Crunchy PostgreSQL Operator to AKS2020-12-05T10:23:36Z2020-12-05T10:23:36ZAlex K.alex@strive2code.comCrunchy PostgreSQL for Kubernetes is the cloud-native way to manage your own database-as-a-service (DaaS) in any public, private, or hybrid cloud. Crunchy PostgreSQL for Kubernetes is an enterprise deployment solution for PostgreSQL that unlocks true open-source cost savings and efficiency with the flexibility to run your databases on any infrastructure from a single interface. 'Cui bono' youb8514c6f-7c0f-4ffb-be5e-7c1561a2d979Enable SSH for containerized Azure Functions2020-11-14T10:44:29Z2020-11-14T10:44:29ZAlex K.alex@strive2code.comVery often, in the active development phase, regular logging does not help too much. Azure Functions that process some data or heavier payloads (like images or video files even) tend to store temporary processing data inside the container. By default, there's no way you can get inside the container to take a look at what's going on at the file system level. For such purposes, Secure Shell (SSH)