Shekhar Jhainjhash-ingsSo you want to be identity engineerWhy identity engineering is a specialized field and how to get ready5 min read·Apr 6, 2024----
Shekhar JhainBetter Programmingpasskey - A developer guideA quick technical introduction and exploration of passkeys, W3C webauthn and FIDO6 min read·Oct 17, 2023--1--1
Shekhar Jhainjhash-ingsIn past, we see futureA collection of my articles that explore how the concepts remain the same while the implementations change.2 min read·Mar 25, 2023----
Shekhar Jhainjhash-ingsBuilding flexible product configurationBalancing security, preference with configurability7 min read·Feb 23, 2023----
Shekhar Jhainjhash-ingsAWS ECS vs Google Cloud run jobsAn apple to near-apple comparison4 min read·Jun 13, 2022--1--1
Shekhar JhainBetter ProgrammingScale GitHub Workflows With AWS ECSusing a self-hosted runner without access keys, complex lambda functions, or Kubernetes clusters8 min read·May 31, 2022----
Shekhar JhainInfoSec Write-upsUsing PGP to enhance security and non-repudiation of terraform opsTerraform has transitioned to a lingua franca for multi-cloud infrastructure as a code. Explore approaches and script to secure terraform5 min read·Apr 27, 2022--1--1
Shekhar JhainGeek CultureGo modules in mono-repoBalancing development flexibility with structured release process5 min read·Jan 10, 2022----
Shekhar JhainGeek CultureProject estimation with excelPerform cost and time estimation with leveled resource without complex macros5 min read·Oct 29, 2021----
Shekhar JhainGeek CultureSecuring DevOps workhorseConsiderations for deploying and securing DevOps remote agents7 min read·Oct 22, 2021----