Homepage
Open in app
Sign in
Get started
Cloud Space
Application Development
DevOps
Cloud Ops
Cloud Migration
Cloud Security
Digital Workspaces
Cloud News
Axiom
Follow
Following
Streamlining Storage Management: Integrating Amazon EBS Volumes with Amazon ECS Fargate
Streamlining Storage Management: Integrating Amazon EBS Volumes with Amazon ECS Fargate
Introduction: The integration of Amazon Elastic Container Service (ECS) with Amazon Elastic Block Store (EBS) marks a significant…
Anjibabu P
May 9
Podman: A Secure Alternative to Docker for Containerization
Podman: A Secure Alternative to Docker for Containerization
Introduction
Subbaraju N
Apr 18
Revolutionizing Remote Work with Amazon Workspace
Revolutionizing Remote Work with Amazon Workspace
Introduction
Sasipriyanka Sabbavarapu
Mar 28
Transforming Access Dynamics: AxiomIO’s Solution for Multi-Identity AWS Integration
Transforming Access Dynamics: AxiomIO’s Solution for Multi-Identity AWS Integration
Problem Statement:
Sriram Kesavarapu
Mar 18
AWS Security Compliance: A Hands-On Approach with SSM Automation
AWS Security Compliance: A Hands-On Approach with SSM Automation
What is the subject matter of this blog?
Mallikarjuna M
Mar 1
Demystifying Kubernetes: Understanding CNI, CSI, and CRI
Kubernetes has revolutionized container orchestration, offering unparalleled efficiency and scalability. Central to its success are three…
Sri Harsha Tolety
Feb 14
Integrating AWS GuardDuty Findings with Amazon S3
Introduction:
Kishan Kalidindi
Feb 1
How to Stream Logs from CloudWatch to OpenSearch Using AWS Kinesis
How to Stream Logs from CloudWatch to OpenSearch Using AWS Kinesis
This comprehensive guide will take you through the process of streaming logs from Amazon CloudWatch to Amazon OpenSearch via AWS Kinesis…
Krishna teja
Dec 4, 2023
How to Set Up AWS Resources Configuration Change Alerts for AWS Resource Management Users
How to Set Up AWS Resources Configuration Change Alerts for AWS Resource Management Users
Introduction:
Mallikarjuna M
Dec 4, 2023
Everything You Need to Know About Hacks, Malware, and Cyberattacks
Everything You Need to Know About Hacks, Malware, and Cyberattacks
The digital world is now the real world. Businesses are digitizing their services everywhere you look to keep up with changing market…
PK
Oct 25, 2022
Cybersecurity Trends to Look for in the Coming Years
Cybersecurity Trends to Look for in the Coming Years
Today, cyber threats are more complex and widely distributed than ever. This makes it challenging for businesses of all sizes to protect…
PK
Oct 25, 2022
Step-by-Step Guide for Image Builder
Step-by-Step Guide for Image Builder
AxiomIO has been working with Wipro on a project to deploy Citrix on Azure using DevOps as a service in Azure. The project scope includes…
PK
Oct 24, 2022
Five Essential Cybersecurity Tips for Small Businesses
Five Essential Cybersecurity Tips for Small Businesses
You don’t need to be a tech giant like Amazon or Facebook to fall victim to cybercrime. Small businesses are just as likely to suffer from…
PK
Oct 19, 2022
How to Spot Phishing Scam: Eight Warning Signs to Look Out For
How to Spot Phishing Scam: Eight Warning Signs to Look Out For
Phishing scams have been around for a long time, but they continue to thrive due to their effectiveness. These malicious cyberattacks are…
PK
Oct 5, 2022
Step-by-Step Guide to Setup Bitcoin Node in AWS
Blockchain technology is the one that enables cryptocurrency. A blockchain is a decentralized ledger of all transactions across a network…
PK
Sep 26, 2022
Scanning your AWS account for misconfigurations with Trivy
Scanning your AWS account for misconfigurations with Trivy
Trivy is an open-source security scanner developed by Aqua Security. Trivy does a lot of things like scanning container images for…
PK
Sep 26, 2022
What is Multifactor Authentication and Why Your Business Needs to Use It
What is Multifactor Authentication and Why Your Business Needs to Use It
Today, users want access to digital services as quickly and conveniently as possible. As a result, many businesses have adopted new…
PK
Sep 26, 2022
Cybersecurity Best Practices: What Every Small Business Needs to Know
Cybersecurity Best Practices: What Every Small Business Needs to Know
Small businesses are the backbone of our economy. They drive local communities, create jobs, and invest in their communities. However, they…
PK
Sep 20, 2022
Using KMS for External Key Material for Encryption
Using KMS for External Key Material for Encryption
AWS Key Management Service (AWS KMS) is a managed service that makes it easy to create and control cryptographic keys to protect data. AWS…
PK
Sep 20, 2022
How to Secure and Restore email Function to a Suspected Compromised Microsoft 365 Account and…
How to Secure and Restore email Function to a Suspected Compromised Microsoft 365 Account and…
In this digital era, security breaches are bound to happen. Compromised accounts significantly threaten a company’s overall protection…
PK
Sep 20, 2022
What Is Low-code Application Development? Here’s Everything You Need to Know
Digital app development involves learning coding and programming logic to develop apps. But low-code app development provides a…
PK
Sep 8, 2022
An Introduction to AWS Cloud Trail Service
What Is AWS CloudTrail?
PK
Sep 7, 2022
Top Five Benefits of Using Low-code App Builder Platforms
Top Five Benefits of Using Low-code App Builder Platforms
The inception of smartphones has introduced a new way of browsing the web. Mobile application development was the latest and hottest trend…
PK
Aug 29, 2022
Top Five Kubernetes Challenges and How to Solve Them
Top Five Kubernetes Challenges and How to Solve Them
Kubernetes has quickly emerged as a go-to choice for container orchestration for all developers considering its open-source benefits.
PK
Aug 26, 2022
Seven Kubernetes Trends to Watch in Upcoming Years
Seven Kubernetes Trends to Watch in Upcoming Years
Kubernetes has proved to be one of the robust and popular DevOps tools due to its world-class features. Especially the customer-centric…
PK
Aug 19, 2022
About Axiom
Latest Stories
Archive
About Medium
Terms
Privacy
Teams