technical

17. Sovereignty Part 1/4 - What is sovereignty and why it can be the next big trend in cloud computing?

In this post we explore what is sovereignty and why it is becoming increasingly more important in cloud and hybrid cloud computing environments.

16. Login using your own (common) SSH Key to - GCP, AWS, Azure, OCI and On Prem VMs๐Ÿ”‘โ˜๐Ÿ’ป

And in the process understand how SSH Key pairs work

15. Part - 2/2 - Learn AWS IOT Core with Node Red ๐Ÿšฅ๐Ÿ˜๐Ÿ›Žโš“โš™โ›“

Continue your IOT Core Learning Journey in the part 2 of the series

14. Part - 1/2 - Learn AWS IOT Core with Node Red ๐Ÿ“ปโš™๐Ÿ”—๐Ÿงท๐Ÿญ๐Ÿ›Ž

Start with the basics of IOT, includes hands on demo and code samples

13. Procure and Deploy a Free Let's Encrypt SSL Certificate on an EC2 Instance ๐Ÿ”โ˜๐Ÿ–ฅ๐Ÿ†๐Ÿ”‘

Deploy A Free SSL Certificate in less than 10 minutes

12. One click Calculate VPC and Subnet CIDR Ranges ๐Ÿ•ธ๐Ÿ’ป๐Ÿงฎ

Just 3 inputs and done!

11. AWS MACIE - DETECT PAN, AADHAR AND OTHER SENSITIVE DATA - DEMO ๐Ÿฅˆ๐Ÿ†”๐Ÿ’ณ๐Ÿ—ƒ

To protect your data, you need to first understand it!

10. Old vs New Tax Regime (Updated for Budget 1 Feb 2025) - Simplest Calculator For Your India Taxes ๐Ÿ’ฐ๐Ÿ“†๐Ÿงฎ๐Ÿ”Ž

Get Comparison and slabwise details with just a few inputs

09. AWS S3 Object Lock (With Video Demo) ๐Ÿ› โ›ˆ ๐Ÿ“‚๐Ÿ”

Learn About the WORM on S3!

08. AWS KMS Multi Region Keys ๐Ÿ” ๐ŸŒฅ ๐ŸŽŒ

One of the most awaited AWS KMS features is here - Let's take it for a ride!