PinnedAinomugisha SolomonAmazon Web Services Well Architected Application Designs1. AWS SOLUTION ARCHITECTUREJun 21, 2022Jun 21, 2022
Ainomugisha SolomonCYBERSECURITY IN THE CLOUDCybersecurity in cloud environments has become a paramount concern for organizations worldwide due to the increasing reliance on cloud…May 30May 30
Ainomugisha SolomoninStackademicTerraform and AWS Control Tower for Provisioning a Complete AWS Landing ZoneAWS Control Tower simplifies setting up and governing a new multi-account AWS environment. It automates the setup of a well-architected…May 6May 6
Ainomugisha SolomoninStackademicBig Data Engineering with Embedded systems — Internet of Things (IoT) DevicesOf recent got curious about the how different devices in our homes, automobiles and industries coordinate to operate and also manage…Jan 9Jan 9
Ainomugisha SolomoninStackademicReliability and Consistence in Database Engineering — ACID Concepts for PostgreSQL DatabasesWas having a chat with a work colleague at Stanbic Uganda who asked me about ACID concepts of Database Engineering; he inspired me to go…Nov 27, 2023Nov 27, 2023
Ainomugisha SolomonHandling changing business requirements in a dimensional model for analyticsHandling changing business requirements in a dimensional model for analytics involves several steps and best practices.Oct 26, 2023Oct 26, 2023
Ainomugisha SolomoninStackademicFuture Web with Production Ready Next.js ApplicationsNext.js is a flexible React framework that provides building blocks to create fast web applications. It handles the tooling and…Oct 16, 2023Oct 16, 2023
Ainomugisha SolomonThreat Modeling Threat modeling involves identifying and communicating information about the…Aside from protecting networks and applications, threat modeling can also aid in securing Internet-of-Things (IoT) devices, as well as…Oct 10, 2022Oct 10, 2022