Tech EvangelistTop 10 Microservices Design PrinciplesMicroservice principles and best practicesMar 24Mar 24
Tech EvangelistGenerative AI — Navigating the World of GANsGenerative AI — GANs best practices and challenges in Computer VisionMar 231Mar 231
Tech EvangelistSecure OAuth - Token Protection And Security Best PracticesHow to secure OAuth token and implement security best practicesMar 201Mar 201
Tech EvangelistinAWS TipAWS CDK for Python: Streamlining Infrastructure as CodeHow to use AWS CDK to provision infrastructure on AWSAug 8, 2023Aug 8, 2023
Tech EvangelistFinding Balance in ImbalanceEmbracing the Hidden Harmony and Wisdom in Life’s ImbalancesJul 4, 2023Jul 4, 2023
Tech EvangelistMagic Methods in PythonA Comprehensive Guide to Python’s Special Methods for Enhanced Object Manipulation and CustomizationJul 2, 2023Jul 2, 2023
Tech EvangelistData Privacy Vault — Design for Better Architecture, Security, and Safeguarding Sensitive…How to build a Data Privacy Vault and understand its importance & benefits.Mar 20, 2023Mar 20, 2023
Tech EvangelistinAWS TipMastering the Art of Installing Python Packages in AWS LambdaA Comprehensive Guide to Install Python Packages like (requests, NumPy, and Pandas) in AWS Lambda including pip install, requirements.txt…Jan 23, 2023Jan 23, 2023
Tech EvangelistComplete code to build GPT3 to your websiteLearn How to Monetize Your Website with GPT3. A Step-by-Step Guide to Integrating GPT-3 with Complete CodeJan 20, 2023Jan 20, 2023
Tech Evangelist“Is GPT-3’s ethical use jeopardized?”My Conversation with 12 year old and the reason to dive deep on ethical usage of GPTJan 9, 20231Jan 9, 20231