<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:series="https://publishpress.com/"
	>

<channel>
	<title>Cloud Collaboration</title>
	<atom:link href="https://www.wahidsaleemi.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wahidsaleemi.com/</link>
	<description>a cloud blog.</description>
	<lastBuildDate>Mon, 27 Nov 2023 14:26:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
<site xmlns="com-wordpress:feed-additions:1">127253763</site>	<item>
		<title>Azure Batch &#8211; Unusable nodes after Starting for a long time when using certificates with Azure Key Vault</title>
		<link>https://www.wahidsaleemi.com/2023/11/azure-batch-unusable-nodes-after-starting-for-a-long-time-when-using-certificates-with-azure-key-vault/</link>
					<comments>https://www.wahidsaleemi.com/2023/11/azure-batch-unusable-nodes-after-starting-for-a-long-time-when-using-certificates-with-azure-key-vault/#respond</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Fri, 17 Nov 2023 23:29:35 +0000</pubDate>
				<category><![CDATA[Azure Infrastructure]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1528</guid>

					<description><![CDATA[<p>Azure Batch account certificates retirement The Migrate Batch account certificates to Azure Key Vault &#8211; Azure Batch &#124; Microsoft Learn states that the Azure Batch account certificates feature will be retired on February 29, 2024. It provides links to an alternative an FAQ. However, the alternative doesn&#8217;t quite work. In Enable automatic certificate rotation in [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2023/11/azure-batch-unusable-nodes-after-starting-for-a-long-time-when-using-certificates-with-azure-key-vault/">Azure Batch &#8211; Unusable nodes after Starting for a long time when using certificates with Azure Key Vault</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2023/11/azure-batch-unusable-nodes-after-starting-for-a-long-time-when-using-certificates-with-azure-key-vault/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1528</post-id>	</item>
		<item>
		<title>Windows Virtual Desktop: Bypass sign-in prompt</title>
		<link>https://www.wahidsaleemi.com/2021/05/windows-virtual-desktop-bypass-sign-in-prompt/</link>
					<comments>https://www.wahidsaleemi.com/2021/05/windows-virtual-desktop-bypass-sign-in-prompt/#respond</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Fri, 21 May 2021 18:35:32 +0000</pubDate>
				<category><![CDATA[Windows Virtual Desktop]]></category>
		<category><![CDATA[WVD]]></category>
		<category><![CDATA[AD FS]]></category>
		<category><![CDATA[Azure AD]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1433</guid>

					<description><![CDATA[<p>In this post, I'm going to show you how we can bypass the Azure Active Directory (Azure AD) sign-in prompt for Windows Virtual Desktop.</p>
<p>The post <a href="https://www.wahidsaleemi.com/2021/05/windows-virtual-desktop-bypass-sign-in-prompt/">Windows Virtual Desktop: Bypass sign-in prompt</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2021/05/windows-virtual-desktop-bypass-sign-in-prompt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1433</post-id>	</item>
		<item>
		<title>Comparing WVD Auto-scaling solutions</title>
		<link>https://www.wahidsaleemi.com/2021/01/comparing-wvd-auto-scaling-solutions/</link>
					<comments>https://www.wahidsaleemi.com/2021/01/comparing-wvd-auto-scaling-solutions/#respond</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Thu, 28 Jan 2021 14:55:45 +0000</pubDate>
				<category><![CDATA[Windows Virtual Desktop]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1396</guid>

					<description><![CDATA[<p>Introduction In this post, I&#8217;ll discuss a few solutions for auto-scaling Windows Virtual Desktop session hosts and how they compare. I won&#8217;t be looking at personal desktops. We&#8217;ll explore five solutions: Windows Virtual Desktop Scaling Tool (Microsoft) Ciraltos Scale Host Pool (Ciraltos) Jason Parker&#8217;s Scale Optimizer Nerdio Manager for WVD (Nerdio) Project MySmartScale (Sepago) Before [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2021/01/comparing-wvd-auto-scaling-solutions/">Comparing WVD Auto-scaling solutions</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2021/01/comparing-wvd-auto-scaling-solutions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1396</post-id>	</item>
		<item>
		<title>Get a free domain for you Azure labs</title>
		<link>https://www.wahidsaleemi.com/2020/01/get-a-free-domain-for-you-azure-labs/</link>
					<comments>https://www.wahidsaleemi.com/2020/01/get-a-free-domain-for-you-azure-labs/#respond</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Tue, 21 Jan 2020 14:00:00 +0000</pubDate>
				<category><![CDATA[Azure Infrastructure]]></category>
		<category><![CDATA[Azure DNS]]></category>
		<category><![CDATA[domain name]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[Azure]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1348</guid>

					<description><![CDATA[<p>Introduction I&#8217;m conducting some training for Azure and need a way for students to get a domain name. In this post, I&#8217;ll show you how to get one for free and use Azure DNS to manage it. Get the domain Here are the steps: Head over to https://www.freenom.com Enter your desired domain name in the [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2020/01/get-a-free-domain-for-you-azure-labs/">Get a free domain for you Azure labs</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2020/01/get-a-free-domain-for-you-azure-labs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1348</post-id>	</item>
		<item>
		<title>Automating Azure DevOps Service Connections</title>
		<link>https://www.wahidsaleemi.com/2019/07/automating-azure-devops-service-connections/</link>
					<comments>https://www.wahidsaleemi.com/2019/07/automating-azure-devops-service-connections/#comments</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 15:30:44 +0000</pubDate>
				<category><![CDATA[Windows PowerShell]]></category>
		<category><![CDATA[Azure Infrastructure]]></category>
		<category><![CDATA[Azure DevOps]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[powershell]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1311</guid>

					<description><![CDATA[<p>Automate creation of Service Connections in Azure DevOps</p>
<p>The post <a href="https://www.wahidsaleemi.com/2019/07/automating-azure-devops-service-connections/">Automating Azure DevOps Service Connections</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2019/07/automating-azure-devops-service-connections/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1311</post-id>	</item>
		<item>
		<title>Sharing my PowerShell Profile</title>
		<link>https://www.wahidsaleemi.com/2018/12/sharing-my-powershell-profile/</link>
					<comments>https://www.wahidsaleemi.com/2018/12/sharing-my-powershell-profile/#respond</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 14:15:55 +0000</pubDate>
				<category><![CDATA[Windows PowerShell]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1280</guid>

					<description><![CDATA[<p>Over the course of the last several months, I&#8217;ve collected several snippets for my PowerShell profile. Your PowerShell profile is loaded each time you start PowerShell. The official documentation for it can be found here: https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_profiles?view=powershell-6 To get started, you can easily edit your profile by typing notepad $profile to load your profile. The PowerShell [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2018/12/sharing-my-powershell-profile/">Sharing my PowerShell Profile</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2018/12/sharing-my-powershell-profile/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1280</post-id>	</item>
		<item>
		<title>Toying with Azure Functions &#8211; A Trade Log</title>
		<link>https://www.wahidsaleemi.com/2018/05/toying-with-azure-functions-a-trade-log/</link>
					<comments>https://www.wahidsaleemi.com/2018/05/toying-with-azure-functions-a-trade-log/#respond</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Mon, 21 May 2018 15:00:43 +0000</pubDate>
				<category><![CDATA[Windows PowerShell]]></category>
		<category><![CDATA[Azure Infrastructure]]></category>
		<category><![CDATA[azure functions]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[Azure]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1270</guid>

					<description><![CDATA[<p>Serverless. The best way for me to learn something is to use it, I’m hands-on. After being barraged by articles and hype around Azure Functions, I decided to try it out. But, I’m not a developer. All the new stuff that the cool kids are playing with today (IoT, Serverless, Bots, AI, etc.) requires real [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2018/05/toying-with-azure-functions-a-trade-log/">Toying with Azure Functions &#8211; A Trade Log</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2018/05/toying-with-azure-functions-a-trade-log/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1270</post-id>	</item>
		<item>
		<title>Using Azure Policy Sets</title>
		<link>https://www.wahidsaleemi.com/2017/11/using-azure-policy-sets/</link>
					<comments>https://www.wahidsaleemi.com/2017/11/using-azure-policy-sets/#comments</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Tue, 21 Nov 2017 14:32:37 +0000</pubDate>
				<category><![CDATA[Azure Infrastructure]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[Azure]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1251</guid>

					<description><![CDATA[<p>At Microsoft Ignite in September 2017, Ryan Jones (@rjmax) discussed Azure Resource Manager Policies and some enhancements coming soon. See this blog post about the public preview announcement. One of those, was Policy Sets. Policy Sets allow you to group several policies together and assign them as a group. There’s more information at http://aka.ms/azurepolicy. In [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2017/11/using-azure-policy-sets/">Using Azure Policy Sets</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2017/11/using-azure-policy-sets/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1251</post-id>	</item>
		<item>
		<title>Trusted Sites With IE ESC Turned On</title>
		<link>https://www.wahidsaleemi.com/2017/09/trusted-sites-with-ie-esc-turned-on/</link>
					<comments>https://www.wahidsaleemi.com/2017/09/trusted-sites-with-ie-esc-turned-on/#comments</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Thu, 28 Sep 2017 17:37:36 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Enterprise]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1245</guid>

					<description><![CDATA[<p>When protecting users from malicious internet sites on servers, we can keep Internet Explorer Enhanced Security Configuration turned on (that’s the default). However, with the setting on, almost no modern website will properly load. The solution is to add these sites you trust to your Trusted Sites zone. In an enterprise environment, we would leverage [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2017/09/trusted-sites-with-ie-esc-turned-on/">Trusted Sites With IE ESC Turned On</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2017/09/trusted-sites-with-ie-esc-turned-on/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1245</post-id>	</item>
		<item>
		<title>Managed Storage Account SAS Tokens</title>
		<link>https://www.wahidsaleemi.com/2017/08/managed-storage-account-sas-tokens/</link>
					<comments>https://www.wahidsaleemi.com/2017/08/managed-storage-account-sas-tokens/#respond</comments>
		
		<dc:creator><![CDATA[wahidsaleemi]]></dc:creator>
		<pubDate>Thu, 31 Aug 2017 12:00:00 +0000</pubDate>
				<category><![CDATA[Azure Infrastructure]]></category>
		<guid isPermaLink="false">https://www.wahidsaleemi.com/?p=1228</guid>

					<description><![CDATA[<p>Introduction Building on the previous blog post where we configured Azure Key Vault to automatically rotate Storage Account Keys, this post will discuss SAS tokens (Shared Access Signatures). As a quick refresher, using SAS tokens is the recommended way to interact with your Storage Account. For more information see Using shared access signatures. Create SAS [&#8230;]</p>
<p>The post <a href="https://www.wahidsaleemi.com/2017/08/managed-storage-account-sas-tokens/">Managed Storage Account SAS Tokens</a> appeared first on <a href="https://www.wahidsaleemi.com">Cloud Collaboration</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.wahidsaleemi.com/2017/08/managed-storage-account-sas-tokens/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1228</post-id>	</item>
	</channel>
</rss>
