<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Cloud Maker - Medium]]></title>
        <description><![CDATA[We’re pioneering Diagram Driven Infrastructure, a radical new way to design, configure, validate, and deploy cloud solutions. Stop wrestling with Infrastructure-as-Code and make deploying your cloud solution as easy as drawing a diagram. - Medium]]></description>
        <link>https://blog.cloudmaker.ai?source=rss----fc6e1ef0d0e3---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Cloud Maker - Medium</title>
            <link>https://blog.cloudmaker.ai?source=rss----fc6e1ef0d0e3---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Tue, 14 Apr 2026 11:03:29 GMT</lastBuildDate>
        <atom:link href="https://blog.cloudmaker.ai/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Is Your Cloud Secure?]]></title>
            <link>https://blog.cloudmaker.ai/defence-in-depth-822af1f9ce32?source=rss----fc6e1ef0d0e3---4</link>
            <guid isPermaLink="false">https://medium.com/p/822af1f9ce32</guid>
            <category><![CDATA[devops]]></category>
            <category><![CDATA[azure]]></category>
            <category><![CDATA[automation]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <dc:creator><![CDATA[Nick Smith]]></dc:creator>
            <pubDate>Fri, 07 May 2021 17:26:21 GMT</pubDate>
            <atom:updated>2021-05-07T17:26:21.524Z</atom:updated>
            <content:encoded><![CDATA[<h4>Building defence-in-depth is vital in the brave new world</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*O4D_EvQVHGpjyVQdVCchjQ.jpeg" /></figure><p>In the early years of IT, security was often an afterthought. Take email, for instance; since its inception, it has had layers of security patched on like an old but much-loved pair of jeans. Its creators could have barely imagined how integral email would become to our lives or how malicious attackers, spoofing your email address, would try to defraud you!</p><p>Over the years, attackers have become more and more sophisticated, culminating in the Solar Winds attack at the end of last year and, more recently, the global Microsoft Exchange Server hack which put over a hundred thousand businesses at risk.</p><p>There is no doubt that cloud technologies are hugely powerful, but their distributed nature makes them complex and difficult to secure. As a result, automation becomes the only serious way to manage cloud. Today this is achieved with Infrastructure-as-Code (IaC), but this introduces yet another vector for security threats — misconfiguration.</p><p>According to <a href="https://l.ermetic.com/wp-idc-survey-results">IDC research</a> commissioned by Ermetic, 8 in 10 companies across the United States have experienced a data breach related to misconfiguration of their cloud systems. Of the 300 CISOs that participated in the survey, security misconfiguration was the top concern associated with cloud production environments.</p><p>Moving away from a traditional, centralised datacentre model to a highly scalable, global and distributed cloud approach requires us to re-draw the security battle lines and build defence-in-depth.</p><h4>Defence-in-Depth Starts by Shifting-Left</h4><p>Historically, dedicated security teams would review infrastructure designs to ensure they met the security compliance standards of the organisation and provide recommendations and amendments to the architecture and development team.</p><p>This process is often time-consuming and doesn’t move at the speed of the cloud, slowing teams down and increasing the cost of the project. The other problem is that cloud systems have become increasingly complex.</p><p>With multiple teams working on different parts of a globally distributed infrastructure and the introduction of ephemeral systems, traditional security tools and processes are no longer fit for purpose.</p><p>To solve these problems, the security industry has begun advocating for a shift-left approach. The process of moving security and compliance checks to the very beginning of the cloud design and deployment workflow, baking in security from the very start.</p><h4>Patching IaC — Code Scanners</h4><p>IaC promised to be a panacea for the complexity of cloud management by applying all the advantages of software engineering — versioning, code reuse, collaboration and automation. The reality is that it has only raised the technical barrier to entry.</p><p>Engineers now need coding skills to manage and deploy complex cloud infrastructures. This step-up in technical expertise also increased the likelihood of security misconfiguration being baked into code templates.</p><p>To solve the security problem, IaC scanners emerged. These scanners can be used at the command line or integrated into CI/CD processes to ensure that code templates are scanned for issues before they are deployed, shifting security left of the workflow and helping keep your infrastructure safe.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*DdWUVSWB8G4GkjDyyPFo-Q.png" /><figcaption>Whilst functional, code scanners still rely on the engineer’s ability to write IaC</figcaption></figure><p>Whilst code scanners can flag security issues with IaC, engineers still need the technical expertise to write IaC in the first place, making the adoption of shift-left security much more difficult.</p><h4>Draw Don’t Code — Cloud Maker Overwatch</h4><p>Enter Diagram Driven Infrastructure, or DDI. Now there is a new, much easier way to automate the design, security validation and deployment of cloud systems without wrestling with IaC.</p><p>Instead of working directly with code templates, which are hard to write and become challenging to maintain, DDI allows the cloud infrastructure to be modelled visually. This gives engineers a detailed view of all pieces of a cloud environment in a single pane of glass. DDI makes shifting the security of your infrastructure left as easy as drawing a diagram.</p><p>Cloud Maker, with its visual Overwatch security scanner, means cloud diagrams can be scanned in real-time as you draw, visualising security issues across the whole system and then providing guidance on the best way to fix them.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Q4g-jli9fXYh21b_qqnJUA.gif" /><figcaption>Cloud Maker Overwatch fuses Diagram Driven Infrastructure with shift-left security scanning.</figcaption></figure><p>Overwatch takes the latest security guidance from the likes of Microsoft and CISA and turns these into security definitions, which are applied to your Cloud Maker diagram as you draw and configure.</p><p>Cloud Maker and Overwatch are part of a new generation of automation technologies that takes all the lessons learnt from IaC and shift-left security and bakes them into a next-generation interface to the cloud.</p><h4>Azure Sentinel — Protecting Your Right Flank</h4><p>While Cloud Maker Overwatch makes taking a shift-left approach easy, it’s still critical to maintain real-time security scanning of live environments to monitor for rapidly emerging threats.</p><p>This is where Security Information and Event Management (SIEM) comes in. Historically SIEM involved dumping security logs into a data warehouse and querying this data to look for attack-related events.</p><p>However, with the sheer volume of data created by modern, highly complex cloud systems, the only feasible way to monitor, detect and intervene today is with machine learning.</p><p>One such machine learning-based SIEM platform is Azure Sentinel that provides real-time scanning and automated mitigation of security issues. Underpinned by the vast horsepower of Microsoft Azure and Microsoft’s leading AI expertise, Sentinel can process almost limitless volumes of security data in real-time.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*A49mWCf8fG30wgTy.jpg" /><figcaption>Azure Sentinel is a next-gen AI SIEM system for real-time monitoring and alerting</figcaption></figure><p>Cloud Maker combined with Azure Sentinel is a powerful capability that not only lets you shift left but ensures you continue to protect your right flank.</p><h4>The Path to DevSecOps</h4><p>DDI unlocks the ability to manage complex cloud systems. It also enables the ability to shift security left easily. In today’s world, cloud systems can be drawn as a diagram and configured visually. Automated security checks like those provided by Cloud Maker Overwatch can then ensure that security issues are detected and resolved before they have a chance of being deployed.</p><p>When shift-left security is combined with real-time scanners like Azure Sentinel, you have multi-layered threat detection over the entire life cycle of the system, leading to threats being mitigated as early as possible and vastly reducing the chances of a breach occurring. This process of continuous development, security monitoring and operations has become known as DevSecOps and is the next frontier of cloud automation and security.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*faqEHQPUub5K-DJjDNmpug.png" /><figcaption>Shifting left and combining with real-time scanning is part of a DevSecOps approach</figcaption></figure><p>If you’re building systems in the cloud today, your best option is to prepare for battle, build defence-in-depth and shift-left.</p><p>To find out how Cloud Maker Overwatch can help keep you secure, shift-left and adopt DevSecOps, head over to <a href="https://cloudmaker.ai">https://cloudmaker.ai</a> and sign up for a free trial today.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=822af1f9ce32" width="1" height="1" alt=""><hr><p><a href="https://blog.cloudmaker.ai/defence-in-depth-822af1f9ce32">Is Your Cloud Secure?</a> was originally published in <a href="https://blog.cloudmaker.ai">Cloud Maker</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Diagram Driven Infrastructure]]></title>
            <link>https://blog.cloudmaker.ai/diagram-driven-infrastructure-e71156bbce14?source=rss----fc6e1ef0d0e3---4</link>
            <guid isPermaLink="false">https://medium.com/p/e71156bbce14</guid>
            <category><![CDATA[devops]]></category>
            <category><![CDATA[azure]]></category>
            <category><![CDATA[cloud-security]]></category>
            <category><![CDATA[cloud]]></category>
            <dc:creator><![CDATA[Nick Smith]]></dc:creator>
            <pubDate>Mon, 29 Mar 2021 16:50:36 GMT</pubDate>
            <atom:updated>2021-04-09T16:27:16.294Z</atom:updated>
            <content:encoded><![CDATA[<h4>Introducing Cloud Maker — the visual cloud design platform</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*OOg2IQ_ynlvArIm3zajY_A.png" /></figure><p><a href="https://medium.com/cloud-maker/cloud-maker-bridging-the-divide-8a9e9cb6af82?source=friends_link&amp;sk=a9cfef179b19f7fa666a5081579ff04a"><em>I previously imagined a world</em></a> where designing, deploying and managing cloud technologies was as simple as drawing a diagram. A world where Diagram-Driven-Infrastructure (DDI) would enable IT Pros, as well as software engineers, to adopt the power of cloud technologies quickly and easily.</p><p>Since launching Cloud Maker, from private beta to general availability, we have had thousands of pieces of amazing feedback from our users. Two things really stood out when we asked our users what they needed when designing cloud systems: the ability to work collaboratively with co-workers and ensuring those cloud systems that were being designed were secure.</p><p>I’m incredibly excited to announce the next step in helping our users achieve these goals. Today, we’re releasing our new pricing plans, which now come with bundled user accounts, to give even more members of your team access to Cloud Maker. We are also celebrating the launch of our brand new security scanning capability: <strong>Cloud Maker Overwatch</strong>. Now you can shift security left, and ensure that vulnerabilities are closed down at design time!</p><h3>Why Diagram Driven Infrastructure is the future</h3><p>Until now, to deploy cloud infrastructure reliably, repeatably, and at scale, engineers would have to adopt Infrastructure-as-Code and CI/CD orchestration tools.</p><p>This is exemplified by Microsoft’s crawl, walk, run methodology, which advocates for engineers to start in the Azure portal and work up to Infrastructure-as-Code and CI/CD as their experience grows.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/972/1*7VcmzOpunX5mYq6gWkR9cA.png" /><figcaption>The traditional journey of an Azure Professional to automation</figcaption></figure><p>However, there are significant hurdles to the adoption of Infrastructure-as-Code and CI/CD tools. Not only are they complex technologies that require engineers to have the skill and knowledge of a software engineer, but code templates are hard to manage. What’s more, it’s easy to introduce security vulnerabilities through poor configuration — security tokens left in templates anyone?</p><p>DDI can solve all these problems, as well as, lower the bar to entry for IT Pros, and speed up engineers with existing cloud automation skills.</p><p>Instead of learning a complex new code language and managing CI/CD systems, DDI enables IT Pros and engineers to work in a language they already know: diagrams!</p><p>Now cloud architectures can be mapped out visually, with dependencies clearly visible. Configuration can be applied in an easy to use graphical user interface, with always-on validation providing checks on configuration best practice and security.</p><p>Once the diagram and configuration have been completed, the machine can do all the heavy lifting of converting to Infrastructure-as-Code and deploying in a CI/CD methodology at the click of a button. No new coding skills required, no complex systems to manage!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HjbKnT6Itl-OgIHo96bdzA.gif" /><figcaption>Diagram Driven Infrastructure makes designing, configuring and deploying cloud solutions easy.</figcaption></figure><h3>Securing your cloud future</h3><p>In light of the recent SolarWinds hack, IT security has been brought sharply back into focus. While security has always been a key ingredient, historically it’s been common practice to scan IT environments for poor configuration and security vulnerabilities after they’ve been deployed.</p><p>However, this is a bit like closing the stable door after the horse has bolted. Attackers are becoming ever-more sophisticated, using automation to quickly identify vulnerable systems as soon as they are plugged into the Internet. This means security scanning post-deployment alone is no longer a valid option.</p><p>That’s why the security industry is advocating for a shift-left approach. Moving scanning and vulnerability detection left of the cloud workflow to the design stage. This allows for security vulnerabilities and poor configuration to be identified <em>before</em> deployment!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*H4Jy_qtvOBG1kUa8sPIDqg.png" /><figcaption>Cloud Maker Overwatch shifts security left and provides design-time security scanning.</figcaption></figure><p>DDI platforms like Cloud Maker are perfectly placed to enable a shift-left, design-time approach to security. That&#39;s why I’m incredibly excited to be able to announce Cloud Maker Overwatch. This new capability will scan your Cloud Maker blueprint and identify security issues within your design and configuration prior to any deployment to the cloud.</p><h3>We’re just getting started!</h3><p>If you would like to benefit from the power of DDI, don&#39;t hesitate to sign up at <a href="https://cloudmaker.ai/?utm_source=medium&amp;utm_medium=social&amp;utm_campaign=cmbusiness">cloudmaker.ai</a>. We’re just at the start of delivering our vision to unlock the cloud for everyone. Security is the next step, and we have more exciting features coming soon that will continue to supercharge your cloud workflow!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e71156bbce14" width="1" height="1" alt=""><hr><p><a href="https://blog.cloudmaker.ai/diagram-driven-infrastructure-e71156bbce14">Diagram Driven Infrastructure</a> was originally published in <a href="https://blog.cloudmaker.ai">Cloud Maker</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Azure Search: Implementing Partial Word Search]]></title>
            <link>https://blog.cloudmaker.ai/azure-search-implementing-partial-word-search-c770cd052f39?source=rss----fc6e1ef0d0e3---4</link>
            <guid isPermaLink="false">https://medium.com/p/c770cd052f39</guid>
            <category><![CDATA[azure-search]]></category>
            <category><![CDATA[elasticsearch]]></category>
            <category><![CDATA[azure]]></category>
            <dc:creator><![CDATA[Charis Kyriakou]]></dc:creator>
            <pubDate>Tue, 02 Jul 2019 07:18:38 GMT</pubDate>
            <atom:updated>2019-07-02T11:12:59.097Z</atom:updated>
            <content:encoded><![CDATA[<h4>In only 3 easy steps</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*0OZ59jFCCWeSuMopGvcIJg.png" /></figure><p>One of our core missions at <a href="https://cloudmaker.ai">Cloud Maker</a> is to simplify cloud design and deployment. But if users can’t even find the cloud components they need, then the design process is slowed significantly.</p><p>We’re solving this problem a number of ways, firstly through our ML powered suggestion engine. Our system analyses how each engineer likes to design their cloud solution and then, at each step of the design process, surfaces up the cloud component it thinks they will need next. But sometimes, this isn’t enough, and at this point a powerful search capability is required to enable rapid retrieval of the required component for the user.</p><p>On the surface, search may seem like a simple problem to solve. But once you start to consider the hundreds of cloud components required – with each being known by either their formal or colloquial name – whilst also factoring in spelling mistakes and partial searches, it’s clear that the problem becomes much more challenging.</p><h3>First Take</h3><p>To solve this problem, we turned to Azure Search — a fully managed, global scale, search service. Getting up and running was pretty straight forward, all we needed to do to start was provision an Azure Search service, then create an index and upload our data.</p><p>This is what our initial index definition looked like:</p><pre>{<br>  &quot;name&quot;: &quot;droplets&quot;,<br>  &quot;fields&quot;: [<br>    {<br>      &quot;name&quot;: &quot;id&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: true,<br>      &quot;searchable&quot;: false,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: true<br>    },<br>    {<br>      &quot;name&quot;: &quot;fullName&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: true,<br>      &quot;searchable&quot;: true,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: false<br>   }<br>  ],<br>  &quot;corsOptions&quot;: {<br>    &quot;allowedOrigins&quot;: [&quot;https://app.cloudmaker.ai&quot;]<br>  }<br>}</pre><p>We then hooked up the search service to Cloud Maker, and used full text search with fuzzy search to allow for spelling mistakes. To do this, Cloud Maker makes requests to the Azure Search service instance enabling the “full” query type, and also appending the tilde (~) symbol on each search term enabling fuzzy search.</p><p>For example the following web request would successfully give us the result the user was looking for — in this case, a virtual machine component.</p><pre>POST <a href="https://{{serviceInstance}}.search.windows.net/indexes/droplets/docs/search?api-version=2015-02-28&amp;queryType=full">https://{{serviceInstance}}.search.windows.net/indexes/droplets/docs/search?api-version=2015-02-28&amp;queryType=full</a><br>{<br>  &quot;search&quot;: &quot;virtul~ machnie~&quot;<br>}</pre><p>This works great, but it relies on people typing whole words for the components they are searching for. We need to make it easier for our users, and let them find things by typing only a few characters. For example if someone writes “virt” we wanted to start giving them accurate results back.</p><h3>Adding Partial Word Matching</h3><p>Achieving this requires a deeper understanding of how a search engine works and then configure the engine to do more heavy lifting to return the correct results to the user.</p><p>Firstly, when the search index is being built, the engine analyses the data, breaking down text into elements. For example, with the default analyser, if the name is “Virtual Machine” it will be broken down to “virtual” and “machine”. A similar process happens at query time.</p><p>Note that this only splits up full words. We want to be able to split it into smaller parts so that incomplete words are found easily.</p><p>In order to do that, we need to change the default index analysis behaviour to use an <a href="https://www.elastic.co/guide/en/elasticsearch/reference/current/analysis-edgengram-tokenizer.html">edge n-gram tokenizer</a> which will emit “n-grams” for each word. In our example, and if we set the minimum length to be 2, “virtual machine” will give us “vi”, “vir”, “virt”, “virtu”, “virtua”, “virtual”, “ma”, “mac”, “mach”, “machi”, “machin”, “machine”.</p><p>We only need to do that at index time, not at query time. This is because we don’t want to be searching for all n-grams — it would make the query complex and we’d get back odd results. To achieve this, we need to use different analyzers for index and search.</p><p>We introduced a new field that indexes these fragments — the partialName field.</p><p>This is the updated index definition:</p><pre>{<br>  &quot;name&quot;: &quot;droplets&quot;,<br>  &quot;fields&quot;: [<br>    {<br>      &quot;name&quot;: &quot;id&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: true,<br>      &quot;searchable&quot;: false,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: true<br>    },<br>    {<br>      &quot;name&quot;: &quot;fullName&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: true,<br>      &quot;searchable&quot;: true,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: false<br>    },<br>    <strong>{<br>      &quot;name&quot;: &quot;partialName&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: false,<br>      &quot;searchable&quot;: true,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: false,<br>      &quot;searchAnalyzer&quot;: &quot;standardCmAnalyzer&quot;,<br>      &quot;indexAnalyzer&quot;: &quot;prefixCmAnalyzer&quot;<br>    }</strong><br>  ],<br>  &quot;corsOptions&quot;: {<br>    &quot;allowedOrigins&quot;: [&quot;https://app.cloudmaker.ai&quot;]<br>  },<br><strong>  &quot;analyzers&quot;: [<br>    {<br>      &quot;name&quot;: &quot;standardCmAnalyzer&quot;,<br>      &quot;@odata.type&quot;: &quot;#Microsoft.Azure.Search.CustomAnalyzer&quot;,<br>      &quot;tokenizer&quot;: &quot;standard_v2&quot;,<br>      &quot;tokenFilters&quot;: [&quot;lowercase&quot;, &quot;asciifolding&quot;]<br>    },<br>    {<br>      &quot;name&quot;: &quot;prefixCmAnalyzer&quot;,<br>      &quot;@odata.type&quot;: &quot;#Microsoft.Azure.Search.CustomAnalyzer&quot;,<br>      &quot;tokenizer&quot;: &quot;standard_v2&quot;,<br>      &quot;tokenFilters&quot;: [ <br>        &quot;lowercase&quot;,<br>        &quot;asciifolding&quot;,<br>        &quot;edgeNGramCmTokenFilter&quot;<br>      ]<br>    }<br>  ],<br>  &quot;tokenFilters&quot;: [<br>    {<br>      &quot;name&quot;: &quot;edgeNGramCmTokenFilter&quot;,<br>      &quot;@odata.type&quot;: &quot;#Microsoft.Azure.Search.EdgeNGramTokenFilterV2&quot;,<br>      &quot;minGram&quot;: 2,<br>      &quot;maxGram&quot;: 20<br>    }<br>  ]</strong><br>}</pre><p>It’s worth noting that when uploading data to the index, the partialName field needs to get the same data as the fullName field.</p><p>If you’d like to understand more about the above setup, it’s worth reading <a href="https://docs.microsoft.com/en-us/azure/search/index-add-custom-analyzers">this </a>page from the Azure Search documentation.</p><h3>Fine Tuning Our Solution</h3><p>With this setup we were getting fast prefix matching. For example, someone would type “virt” and they’d get items with the word “virtual” in their name. However, when it came to exact matches, the results were a little bit odd.</p><p>To fix that, we needed our index to treat exact matches as more important than partial matches. Azure Search exposes the idea of a <a href="https://docs.microsoft.com/en-us/azure/search/index-add-scoring-profiles">scoring profile</a>, so we can easily set up the index to give more weight to results coming from the fullName field. We choose a two to one weight ratio for fullName to partialName matches.</p><p>Here’s the updated, and final index definition:</p><pre>{<br>  &quot;name&quot;: &quot;droplets&quot;,<br>  &quot;fields&quot;: [<br>    {<br>      &quot;name&quot;: &quot;id&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: true,<br>      &quot;searchable&quot;: false,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: true<br>    },<br>    {<br>      &quot;name&quot;: &quot;fullName&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: true,<br>      &quot;searchable&quot;: true,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: false<br>    },<br>    {<br>      &quot;name&quot;: &quot;partialName&quot;,<br>      &quot;type&quot;: &quot;Edm.String&quot;,<br>      &quot;retrievable&quot;: false,<br>      &quot;searchable&quot;: true,<br>      &quot;filterable&quot;: false,<br>      &quot;sortable&quot;: false,<br>      &quot;facetable&quot;: false,<br>      &quot;key&quot;: false,<br>      &quot;searchAnalyzer&quot;: &quot;standardCmAnalyzer&quot;,<br>      &quot;indexAnalyzer&quot;: &quot;prefixCmAnalyzer&quot;<br>    }<br>  ],<br>  &quot;corsOptions&quot;: {<br>    &quot;allowedOrigins&quot;: [&quot;https://app.cloudmaker.ai&quot;]<br>  },<br><strong>  </strong>&quot;analyzers&quot;: [<br>    {<br>      &quot;name&quot;: &quot;standardCmAnalyzer&quot;,<br>      &quot;@odata.type&quot;: &quot;#Microsoft.Azure.Search.CustomAnalyzer&quot;,<br>      &quot;tokenizer&quot;: &quot;standard_v2&quot;,<br>      &quot;tokenFilters&quot;: [&quot;lowercase&quot;, &quot;asciifolding&quot;]<br>    },<br>    {<br>      &quot;name&quot;: &quot;prefixCmAnalyzer&quot;,<br>      &quot;@odata.type&quot;: &quot;#Microsoft.Azure.Search.CustomAnalyzer&quot;,<br>      &quot;tokenizer&quot;: &quot;standard_v2&quot;,<br>      &quot;tokenFilters&quot;: [ <br>        &quot;lowercase&quot;,<br>        &quot;asciifolding&quot;,<br>        &quot;edgeNGramCmTokenFilter&quot;<br>      ]<br>    }<br>  ],<br>  &quot;tokenFilters&quot;: [<br>    {<br>      &quot;name&quot;: &quot;edgeNGramCmTokenFilter&quot;,<br>      &quot;@odata.type&quot;: &quot;#Microsoft.Azure.Search.EdgeNGramTokenFilterV2&quot;,<br>      &quot;minGram&quot;: 2,<br>      &quot;maxGram&quot;: 20<br>    }<br>  ],<br><strong>  &quot;scoringProfiles&quot;: [<br>    {<br>      &quot;name&quot;: &quot;exactFirst&quot;,<br>      &quot;text&quot;: {<br>      &quot;weights&quot;: {<br>        &quot;fullName&quot;: 2,<br>        &quot;partialName&quot;: 1<br>      }<br>    }<br>  }<br>  ],<br>  &quot;defaultScoringProfile&quot;: &quot;exactFirst&quot;</strong><br>}</pre><h3>Final Thoughts</h3><p>Azure Search is a great service that allows engineers with not much knowledge on search technologies to implement search functionality in their apps quickly. Adding partial word matching is a bit more challenging, but hopefully this post makes it easier to understand and implement.</p><p>To see our search index in action, head over to <a href="https://cloudmaker.ai">Cloud Maker</a> and sign up for an account today.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c770cd052f39" width="1" height="1" alt=""><hr><p><a href="https://blog.cloudmaker.ai/azure-search-implementing-partial-word-search-c770cd052f39">Azure Search: Implementing Partial Word Search</a> was originally published in <a href="https://blog.cloudmaker.ai">Cloud Maker</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Cloud Maker: Bridging the Divide]]></title>
            <link>https://blog.cloudmaker.ai/cloud-maker-bridging-the-divide-8a9e9cb6af82?source=rss----fc6e1ef0d0e3---4</link>
            <guid isPermaLink="false">https://medium.com/p/8a9e9cb6af82</guid>
            <category><![CDATA[industry-4-0]]></category>
            <category><![CDATA[cloud-computing]]></category>
            <category><![CDATA[devops]]></category>
            <category><![CDATA[artificial-intelligence]]></category>
            <category><![CDATA[automation]]></category>
            <dc:creator><![CDATA[Nick Smith]]></dc:creator>
            <pubDate>Mon, 25 Mar 2019 18:00:39 GMT</pubDate>
            <atom:updated>2019-04-02T13:03:30.918Z</atom:updated>
            <content:encoded><![CDATA[<h4><strong>Technology has the potential to empower us with superhuman abilities — but only if it’s accessible.</strong></h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Wn8mS00wjdI2gMdSzUOhtg.jpeg" /></figure><p>The world is changing, and the rate of change is only increasing. At eight years old I remember playing my very first computer game, simple pixels that moved around the screen. I never could have believed that 28 years later I would be involved in building next generation cloud systems, including a cloud DNA analysis solution that has cut law-enforcement crime-scene DNA analysis from two days to just 90 minutes, or building an encrypted cloud communications platform to assist teams evacuating foreign nationals at the height of the Arab Spring.</p><p>The Digital Revolution ushered in incredible changes, a lot of which we couldn’t have imagined. From powering the moon landings in 1969, to enabling instant, real-time communication across 4,000 miles with the click of a mouse and tap of a keyboard, thanks to the invention of the Internet.</p><p>But instead of seeing this new technology as an untold opportunity, many people feared it. They had an inherent distrust of a technology they didn’t fully understand, and they certainly couldn’t comprehend the potential positive impact it could have on their lives.</p><p>Fast forward to 2019 and we are now at the start of the next industrial revolution — the 4th since it all kicked off in Georgian times. We’ve come a long way since the birth of factories and the dawn of the steam engine — we’re now blurring the lines between physical, digital and biological technologies. But we’re still seeing many of the same anxieties and suspicions today that existed during the 18th and 19th century transformations.</p><p>Back then it was textile workers fearing the introduction of automated textile manufacturing<em>, </em>whereas now autonomous cars, drones, robots — previously the domain of science fiction — conjure up terrifying images of James Cameron’s Terminator, where intelligent robots are out to destroy the human race. Or even worse, steal our jobs!</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VtKwyGursIT1YCrF0-u--w.jpeg" /></figure><p>However, the reality is that cloud, AI and cyber-physical technologies are in fact solving some of the greatest and most valuable challenges faced by the human race. Deep learning algorithms can now detect potential breast cancer tumours from a mammogram with a 97% accuracy and reduce unnecessary biopsies by 30%¹. Technologies such as DeepMind’s AlphaFold are using deep learning and neural networks to solve the ‘Protein Folding Problem’ and help find a cure for diseases such as Alzheimer’s, Parkinson’s, Huntington’s and Cystic Fibrosis². And it’s not just in the medical field — automation, AI and cyber physical systems are helping us across every industry from business, manufacturing, education, transport and the environment.</p><p>Yes, automation will ultimately reshape our labour markets, but historical analysis shows that more jobs are created around these new industries than are lost due to new technologies. However, it’s not the number of jobs available, which are the concern. Rather, whether the workforce has the technological ability to do them — the reality is that as the labour market evolves, many are left behind. While this used to only apply to low-skilled jobs being automated away, the truth is that this now applies across all industries — even ones previously considered high-skilled.</p><p>Take the IT industry itself — historically the domain of highly-skilled IT engineers used to building complex physical IT systems. With the dawn of the cloud and the emergence of AI, Big Data and elastically scalable systems distributed across the globe, it’s no longer enough to be an IT Infrastructure Engineer that can build out a physical server infrastructure in a data centre. Modern IT engineers now have to have an understanding of thousands of cloud resources, and know how they go together across multiple cloud providers. Once they have designed a cloud solution from the list of cloud resources, they must then convert this to software code so it can be deployed into the cloud environment of choice.</p><p>The reality? There are very few cloud engineers in the IT industry capable of doing this³. This leaves businesses with a huge skills headache⁴ — the very best engineers command the highest salaries but are hard to find and there’s not enough of them to deliver the demand for cloud. And for those who can’t adapt their skills to the cloud, write code and deploy complex solutions, the future is bleak.</p><p>The risk of technological change is that we end up in a two-tier world — those with the knowledge, ability and means to access and benefit from the 4th industrial revolution, and those that are left behind. But it doesn’t have to be this way, and in fact the very thing that threatens to disenfranchise so many, has the ability to enable us all. If the power of the cloud, AI and cyber-physical systems can be used to augment our existing skills and capabilities, we can empower everyone.</p><p>For instance, imagine a world where the IT engineer can utilise their existing skills, and AI can translate the language of a traditional engineer into the language of the cloud. Or where AI can guide the engineer to a validated cloud solution design and help them create a functional cloud architecture diagram. What if an AI powered translation engine could automatically translate the design to code on any cloud? Imagine a world where the engineer only needs to press a button and AI will do the heavy lifting, deploying the complex cloud solution automatically.</p><p>At <a href="https://cloudmaker.ai">Cloud Maker</a> we’re not just imagining this world, we’re making it a reality. Our vision is to contribute to a world where assistive AI enables the human race to do more, closing the skills chasm and democratising the cloud for everyone.</p><p><em>If you’re interested in coming on this journey with us, visit us at </em><a href="https://cloudmaker.ai"><strong><em>cloudmaker.ai</em></strong></a></p><p><em>Nick Smith is co-founder and CEO of </em><a href="https://cloudmaker.ai"><em>Cloud Maker</em></a><em> and previously founded leading cloud solution provider </em><a href="https://www.extrinsicaglobal.com/"><em>Extrinsica Global</em></a><em>.</em></p><p>[1]: MIT News. Adam Conner-Simons (October 16, 2017)<br><a href="http://news.mit.edu/2017/artificial-intelligence-early-breast-cancer-detection-1017">http://news.mit.edu/2017/artificial-intelligence-early-breast-cancer-detection-1017</a></p><p>[2]: DeepMind AlphaFold: Using AI for scientific discovery<br><a href="https://deepmind.com/blog/alphafold/">https://deepmind.com/blog/alphafold/</a></p><p>[3]: RightScale 2018 State of the Cloud Report<br><a href="https://assets.rightscale.com/uploads/pdfs/RightScale-2018-State-of-the-Cloud-Report.pdf">https://assets.rightscale.com/uploads/pdfs/RightScale-2018-State-of-the-Cloud-Report.pdf</a></p><p>[4]: OpsRamp Cloud Skills Survey<br><a href="https://info.opsramp.com/cloud-skills">https://info.opsramp.com/cloud-skills#top</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8a9e9cb6af82" width="1" height="1" alt=""><hr><p><a href="https://blog.cloudmaker.ai/cloud-maker-bridging-the-divide-8a9e9cb6af82">Cloud Maker: Bridging the Divide</a> was originally published in <a href="https://blog.cloudmaker.ai">Cloud Maker</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>