technical

24. Confidential RAG (and some other AI use cases) on GCP

Use GCP's confidential compute VMs and Ubiquitious Data Encryption to create a confidential knowledge base and interact with it.

23. Part 2/2 - Why are there so many cybersecurity products and what do they *really* do?

Journey of cybersecurity products πŸ—ΊπŸŽ―πŸš«

22. Part 1/2 - Why are there so many cybersecurity products and what do they *really* do?

Journey of cybersecurity products πŸ—ΊπŸŽ―πŸš«

21. Services Health Dashboard - Lightweight and feature rich dashboard for your services and applications

Keep your customers aware of the statuses of the services / applications they consume. Secure and can be run in the free tier of GCP!

20. Sovereignty Part 4/4 - Setting up sovereignty demo on GCP - Google cloud EKM + Confidential Computing + Ubiquitous Data Encryption/UDE + Thales CKM

Setting up a real world sovereignty setup between GCP and your DC (we use AWS here)

19. Sovereignty Part 3/4 - Practical sovereignty - Sovereign solutions on Public Cloud

Sovereignty is great and the need of the hour but what makes a **practical** sovereign solution?

18. Sovereignty Part 2/4 - Encryption to power data sovereignty on Google Cloud (Demo GCP EKM + KAJ and Confidential computing)

While it is **one** of the three types of sovereignties, most people mean data sovereignty when they say sovereignty/digital sovereignty. Let's delve a bit deeper and check out a real world demo

17. Sovereignty Part 1/4 - What is sovereignty and why it can be the next big trend in cloud computing?

In this post we explore what is sovereignty and why it is becoming increasingly more important in cloud and hybrid cloud computing environments.

16. Login using your own (common) SSH Key to - GCP, AWS, Azure, OCI and On Prem VMsπŸ”‘β˜πŸ’»

And in the process understand how SSH Key pairs work

15. Part - 2/2 - Learn AWS IOT Core with Node Red πŸš₯πŸ˜πŸ›Žβš“βš™β›“

Continue your IOT Core Learning Journey in the part 2 of the series