Suleman Manji

Logo

Enterprise Technology Strategy | Cloud Architecture | Process Automation

View My GitHub Profile

Blog & Resources

Technical insights and tutorials from my experience in enterprise technology

Swift Over Java 8: Apple’s Game-Changing Tech Shift

When Apple Moved from Java 8 to Swift: A Tech Odyssey Remember those late-night debugging sessions, teeth gritted, coffee gone cold, squinting at your screen as you tried to untangle that Java 8 spaghetti code like you were diffusing a...
Read Article

Trump's Tesla Exit: An AI and Automation Perspective

The Scenario: The Breaking Point Let’s kick off by creating a scenario in which you’ve just heard that Trump is ditching his Tesla. The tech community is buzzing, and you’re wondering what this could mean, especially from an AI and...
Read Article

Apple's Leap from Java 8 to Swift: A Tech Insider's Perspective

Apple’s Shift from Java 8 to Swift: An Insider’s Take In my decade-long journey in the tech world, I’ve seen technologies come and go, with the constant drumbeat of progress echoing through the halls of innovation. One such shift that...
Read Article

Apple's Transition: Java 8 Out, Swift In

Apple’s Big Leap: From Java 8 to Swift In an industry that’s constantly evolving and pushing boundaries, one thing’s for sure - change is inevitable. As an IT professional, you’ve probably heard the buzz: Apple is making a notable shift...
Read Article

Trump's Tesla Sale: A Deep Dive into the Implications

Introduction The subject of former President Donald Trump getting rid of his Tesla has sparked quite a bit of interest, especially in the technology and engineering community. This move may seem trivial on the surface, but it has profound implications...
Read Article

Palantir's Clash with Journalists: A Data Security Debate

Introduction In today’s data-driven world, the protection of sensitive information remains a top priority for businesses and individuals alike. The recent incident involving Palantir Technologies, a high-profile data analytics firm, and a WIRED reporter, brings the topic of data security...
Read Article

Palantir's Controversial Standoff with WIRED and Other Journalists

Introduction In the realm of data science and engineering, few names are as controversial or newsworthy as Palantir Technologies. Recently, Palantir found itself in the headlines once again when it allegedly threatened to call the police on a WIRED reporter...
Read Article

Securing Microservices: Top Security Best Practices

Introduction In today’s era of digital transformation, microservices are becoming an increasingly popular architectural style for building flexible, scalable, and robust applications. However, as with any technological advancement, security concerns are inevitable and must be adequately addressed. This is where...
Read Article

Mastering Cloud Infrastructure Automation: A Guide

Introduction The world of IT is evolving at an unprecedented rate, and as an engineering professional, staying ahead of the curve is crucial. One of the most significant advancements in recent years is the rapid adoption of cloud infrastructure. While...
Read Article

Mastering Advanced API Security Testing Techniques

Introduction APIs (Application Programming Interfaces) have become a significant part of modern software development, enabling seamless integration, communication, and data exchange between different software applications. However, the increasing reliance on APIs also poses significant security risks, necessitating a robust approach...
Read Article

Unleashing AI & Automation: Lessons from Genisys, Terminator

Title: Genisys, Terminator: Harnessing the Power of AI and Automation Introduction Artificial intelligence (AI) and automation are redefining the way we live and work, presenting an unparalleled opportunity for businesses and societies alike. A popular portrayal of AI in popular...
Read Article

Maximizing Cybersecurity with Bug Bounty Programs

Title: Uncovering the Potential of Bug Bounty Programs: A Comprehensive Guide for Engineering Professionals Introduction As companies increasingly rely on digital technology, the threat of cybersecurity breaches has never been higher. Enter Bug Bounty Programs, an innovative and proactive approach...
Read Article

Welcome to Jekyll!

You’ll find this post in your _posts directory. Go ahead and edit it and re-build the site to see your changes. You can rebuild the site in many different ways, but the most common way is to run jekyll serve,...
Read Article

Leveraging Microsoft Graph API for Enterprise Automation

Leveraging Microsoft Graph API for Enterprise Automation Microsoft Graph API provides a unified programmability model that can be used to access tremendous amounts of data in Microsoft 365, Windows 10, and Enterprise Mobility + Security. Despite its power, many developers...
Read Article

PowerShell Automation Best Practices for Microsoft 365

PowerShell Automation Best Practices for Microsoft 365 PowerShell has become an indispensable tool for Microsoft 365 administrators and developers, providing powerful capabilities for automating repetitive tasks, managing resources at scale, and implementing complex workflows. However, writing efficient, secure, and maintainable...
Read Article

Free Resources

Download these resources to enhance your technical toolkit

PowerShell Automation Toolkit

A collection of PowerShell scripts and modules for common Microsoft 365 automation tasks.

Download

Azure Architecture Templates

Infrastructure-as-code templates for common Azure architecture patterns.

Download

Security Compliance Checklist

Comprehensive checklist for Microsoft 365 security and compliance configuration.

Download

Graph API Collection for Postman

Ready-to-use Postman collection for Microsoft Graph API development and testing.

Download