Azure Infra – a technical blog.
-
7. Ai to aiaiai
I deliberately moved this chapter to the end; not because AI is less important, but because it is often treated as the starting point in sovereignty discussions. In reality,…
-
6. Terms and Conditions
This is where the conversation gets uncomfortable, because for all of the removing emotions, the structured risk models, and trade-offs we’ve discussed so far; sovereignty discussions are not just…
-
5. Conversations
Time to get real.. we talked about all the things we need to take into account. If all is well, we understand difference between hyperscale and any other option.…
-
4. Mitigating risks
In our previous posts, we discussed sovereignty as a risk, the trade-offs that come with it, and the reality of Europe building its own hyperscale ecosystem. The conclusion we…
-
3. Sovereign Europe
In the past few posts we’ve discussed how to address Sovereignty as a risk, what the trade-offs are and now its the “why can’t we build this ourselves” chapter.…
-
2. Hyperscale advantages
in our previous posts I’ve described that sovereignty risks are risks that should be evaluated as such. Risks require evaluation that in turn require acceptance or mitigations. Why would…
-
1. Sovereignty Risks
In the intro I talked about treating sovereignty as a risk. Risks that need to be clarified and put in perspective. Risks are accepted/mitigated based on probability and impact.…
-
Digital Sovereignty
This blog is mostly technical, but over the last few years I’ve focussed on the sovereignty aspect of public cloud (well before it became the topic everyone is talking…
-
Azure Sovereign Controls
I’ve talked about sovereignty in Azure (or cloud in general) before.. and we are going to dive a little deeper into it this time. What is it, how do…
-
Hyperscale hardware versus “cloud”
When talking about sovereignty the most heard comment is that cloud provider can replace the big hyperscalers and that its super easy to move. In this post I wanted…
-
Azure VM Disk Encryption Options
Azure provides multiple types of Disk Encryption options. But apart from their features (when you can use which one), lets dive into the how they actually work and differentiate…
-
Azure Confidential VM’s made easy
There has been a lot of talking about “sovereign” clouds lately. How do you secure your data in the cloud from the CSP (cloud provider) being able to access…
