Open in app

Sign In

Write

Sign In

Bruno Amaro Almeida
Bruno Amaro Almeida

846 Followers

Home

About

Mar 28

3 AWS Certifications That Shaped My Career

Cloud computing has become a vital technology across all industries, providing unprecedented scalability, cost-effectiveness, and efficiency for businesses of all sizes. As a technology professional, I’ve witnessed the transformative power of cloud firsthand, both in my career and in the industry at large. In particular, I’ve found that AWS certifications…

Software Development

5 min read

3 AWS Certifications That Shaped My Career
3 AWS Certifications That Shaped My Career
Software Development

5 min read


Published in

Fortum Technology Blog

·Nov 26, 2021

AWS re:Invent 2021: What to Expect? Predictions from the Fortum Tech Community

The annual AWS event (or as AWS would call it — learning conference), aka re:Invent is almost knocking at the door. This AWS re:Invent edition marks its 10-year anniversary and it’s a return to a Las Vegas in-person format after a two-year gap. Traditionally, AWS has been using this yearly…

Cloud

5 min read

AWS re:Invent 2021: What to expect? Predictions from the Fortum Tech Community
AWS re:Invent 2021: What to expect? Predictions from the Fortum Tech Community
Cloud

5 min read


Published in

Towards Data Science

·Jun 23, 2020

How to Use the Aito Engine to Predict Animals

A Step by Step Guide to Leverage Automated Machine Learning Predictions — Today is not possible to talk about data without bringing to the table topics such as: artificial intelligence, machine learning and data engineering. Indeed, albeit AI has been researched and debated since the 50’s, only over the past years it hyped and became a part of the business vocabulary. It…

Machine Learning

7 min read

How to Use the Aito Engine to Predict Animals
How to Use the Aito Engine to Predict Animals
Machine Learning

7 min read


Feb 11, 2019

RogueOne: Creating a Rogue Wi-Fi Access Point using a Raspberry Pi

Having access to internet anywhere and everywhere became essential in our day to day. In the short span of a couple of years, we went from internet being considered a luxury (specially on the go, i.e. mobile) to a everyday commodity. WiFi became part of our everyday vocabulary, yet, it’s…

Raspberry Pi

7 min read

RogueOne: Creating a Rogue Wi-Fi Access Point using a Raspberry Pi
RogueOne: Creating a Rogue Wi-Fi Access Point using a Raspberry Pi
Raspberry Pi

7 min read


Jan 16, 2019

What I wish someone had told me about pursuing an AWS Certification: Tips & Tricks for Self-Study

I was working with AWS everyday for over a year when the thought of pursuing an AWS Certification came to my mind. Why get certified? Validating your existing knowledge, challenge yourself and enhancing your resume are always good reasons to do so, but in addition to those, I was really…

Cloud Computing

5 min read

What I wish someone had told me about pursuing an AWS Certification: Tips & Tricks for Self-Study
What I wish someone had told me about pursuing an AWS Certification: Tips & Tricks for Self-Study
Cloud Computing

5 min read


Published in

DataDrivenInvestor

·Nov 13, 2018

How to transparently use a proxy with any application (Docker) using Iptables and RedSocks

The usage of internet proxies is quite common nowadays as means to impose restrictions (for security purposes) on how an application or machine can connect to the internet. The vast majority of applications or libraries provide support for HTTP/HTTPS/FTP proxy. …

Docker

5 min read

How to transparently use a proxy with any application (Docker)  using Iptables and RedSocks
How to transparently use a proxy with any application (Docker)  using Iptables and RedSocks
Docker

5 min read


Oct 8, 2018

DevSecOps, Threat Modeling and You: Get started using the STRIDE method

Nowadays more and more DevOps teams are starting to shift towards DevSecOps. The security aspect in Software Engineering is now crucial and fundamental taking into account the world we live in. No longer we can simply rely on Infosec departments to get involved in a later phase and help to…

Security

3 min read

DevSecOps, Threat Modelling and You: Get started using the STRIDE method
DevSecOps, Threat Modelling and You: Get started using the STRIDE method
Security

3 min read


Sep 25, 2018

Enabling Centralized Application Logging using the Elastic (ELK) Stack from Stratch: A 15-minutes walkthrough

A Quick 15-minutes walkthrough with a Squid Proxy and Docker It has been a couple of years since I setup an Elastic stack (ELK) to be used for centralized application logging. …

Elasticsearch

12 min read

Enabling Centralized Application Logging using the Elastic (ELK) Stack from Stratch: A 15-minutes…
Enabling Centralized Application Logging using the Elastic (ELK) Stack from Stratch: A 15-minutes…
Elasticsearch

12 min read


Published in

Towards Data Science

·Sep 15, 2018

Explore and get value out of your raw data: An Introduction to Splunk

You just got your hands into some raw data files (json, csv, etc). What happens now? How do you make sense of it? You open a console and start using less, grep, jq and other tools. …

Data Visualization

9 min read

Explore and get value out of your raw data: An Introduction to Splunk
Explore and get value out of your raw data: An Introduction to Splunk
Data Visualization

9 min read

Bruno Amaro Almeida

Bruno Amaro Almeida

846 Followers

Head of Technology & Architecture @Fortum | Independent Consultant / Advisor in Cloud, Security and Data | brunoamaro.com

Following
  • Futurice

    Futurice

  • Fortum Tech

    Fortum Tech

  • Ruslan Gainutdinov

    Ruslan Gainutdinov

  • Chanukya Pekala

    Chanukya Pekala

  • Sunil Kumar Mohanty

    Sunil Kumar Mohanty

See all (23)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams