ShristiUnderstanding the Crucial Choices: Asynchronous vs.In today’s digital landscape, safeguarding data against unforeseen disasters or system failures is paramount for businesses of all sizes…Apr 16Apr 16
ShristiImplementing Secure Domain Redirection with AWS Route 53AWS offers powerful service , Route 53 whose powerful capabilities to seamlessly redirect traffic from one domain to another can be…Apr 11Apr 11
ShristiBuilding and Troubleshooting a Serverless Web ApplicationDelving into the intricate workings of a serverless application built atop cutting-edge technologies presents both excitement and…Apr 9Apr 9
ShristiBuilding a serverless service with AWSIn today’s digital age, automation has become an integral part of simplifying tasks and improving productivity. One area where automation…Apr 8Apr 8
ShristiSecurity Testing Tools — SAST, DAST, SCASAST (Static Application Security Testing):Mar 11Mar 11
ShristiDocker Vulnerability DetectionTrivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers and other…Nov 10, 2023Nov 10, 2023
ShristiReal-life proven strategies to reduce docker image sizeReducing the size of Docker images is crucial for optimizing resource usage, improving deployment times, and enhancing security.Nov 10, 20231Nov 10, 20231
ShristiDynamo DB high cardinality vs low cardinality attributesIn Amazon DynamoDB, the concepts of high cardinality and low cardinality attributes are related to the uniqueness and distribution of…Oct 7, 20231Oct 7, 20231
ShristiStateful and Stateless AWS Traffic HandlingIn AWS VPC (Virtual Private Cloud), the terms “stateful” and “stateless” refer to the behavior of network traffic handling in the context…Jul 6, 2023Jul 6, 2023