Skip to content

Blog Posts

Building with Azure OpenAI On Your Data: A Secure and Private Alternative to Public APIs

Building with Azure OpenAI On Your Data: A Secure and Private Alternative to Public APIs

1 Introduction: The New Frontier of Enterprise AI 1.1 The Generative AI Revolution: A Paradigm Shift in Artificial Intelligence The world of artificial intelligence has undergone a quiet but

Read More
Using LangChain with C#: A Primer for Building Composable AI Applications

Using LangChain with C#: A Primer for Building Composable AI Applications

1 Introduction: The New Paradigm of AI-Native Applications 1.1 Beyond the API Call: The Shift to Composable, Intelligent Systems AI has quickly evolved from a futuristic concept to a key driv

Read More
Advertisement
The OWASP Top 10 for .NET Developers: A Practical Guide to Mitigating Critical Web App Risks

The OWASP Top 10 for .NET Developers: A Practical Guide to Mitigating Critical Web App Risks

1 Introduction: Modern Security Landscape and the .NET Architect In the evolving digital landscape, securing web applications has become more critical—and more challenging—than ever. As a software

Read More
What is Dapr? A Deep Dive for .NET Developers Building Distributed Applications

What is Dapr? A Deep Dive for .NET Developers Building Distributed Applications

Distributed systems have revolutionized software development, enabling unparalleled scalability, resilience, and flexibility. However, the transition from monolithic architectures to microservices has

Read More
Architecting LLM-Powered Applications: A Comprehensive Guide for .NET Architects

Architecting LLM-Powered Applications: A Comprehensive Guide for .NET Architects

Abstract This guide offers .NET architects a comprehensive framework for designing, building, and deploying robust applications powered by Large Language Models (LLMs). Moving beyond theoretical d

Read More
Managing Secrets in .NET Applications with Azure Key Vault & Managed Identitie

Managing Secrets in .NET Applications with Azure Key Vault & Managed Identitie

1 Introduction: The Unseen Risk in Modern Applications 1.1 The Elephant in the Codebase: Why hardcoded secrets, connection strings, and API keys are a critical vulnerability In every mod

Read More
The Rise of Blazor: Building Modern, Full-Stack Web Applications with C#

The Rise of Blazor: Building Modern, Full-Stack Web Applications with C#

1 Introduction: Beyond the JavaScript Hegemony For decades, building robust web applications has meant living in two worlds: a C# (or Java, or PHP) backend serving APIs, and a JavaScript (Angular,

Read More
The Sharding Pattern: An Architect’s Guide to Achieving Massive Database Scalability

The Sharding Pattern: An Architect’s Guide to Achieving Massive Database Scalability

Abstract The relentless growth of data and user activity in modern applications quickly turns even the best-designed databases into bottlenecks. As organizations push the limits of performance, av

Read More
What is a Vector Database? The Missing Piece in Your GenAI .NET Application Explained

What is a Vector Database? The Missing Piece in Your GenAI .NET Application Explained

1 Introduction: The Generative AI Revolution and the Unseen Challenge for .NET Architects 1.1 The Generative AI Gold Rush Over the past several years, the landscape of software development ha

Read More
Mastering Authentication & Authorization in ASP.NET Core: A Deep Dive into JWTs, OIDC, and IdentityServer

Mastering Authentication & Authorization in ASP.NET Core: A Deep Dive into JWTs, OIDC, and IdentityServer

1 Introduction: The Modern Security Imperative The software landscape has transformed dramatically in the last decade. Where we once built monolithic web applications running on a single server, t

Read More
Page 21 of 31