Sirius ChanSimplify AWS MFA Authentication in PowerShellImplementing MFA enforcement on IAM user accounts is a fundamental security necessity. But it can get a little cumbersome to authenticate…20h ago
Netflix Technology BlogContent DriveHow we organize and share billions of files in Netflix studio6d ago3
Joud W. AwadAWS Lambda Architecture Deep DiveMaster AWS Lambda: Deep Dive into Architecture, Invocations & Execution Phases for Optimized Serverless PerformanceNov 17Nov 17
PraveensamCut Your AWS Bill by scaling down Instance During Off-HoursThis document is going to explain AWS verical scale using lambda. The overall expection is scale down ec2 instance during off hour. I have…2h ago2h ago
Joud W. AwadAWS Kinesis Data Streams Deep DiveIn-depth guide to AWS Kinesis Data Streams: learn architecture, consumer models, and optimize data streaming for scalable applications.Nov 52Nov 52
Sirius ChanSimplify AWS MFA Authentication in PowerShellImplementing MFA enforcement on IAM user accounts is a fundamental security necessity. But it can get a little cumbersome to authenticate…20h ago
Netflix Technology BlogContent DriveHow we organize and share billions of files in Netflix studio6d ago3
Joud W. AwadAWS Lambda Architecture Deep DiveMaster AWS Lambda: Deep Dive into Architecture, Invocations & Execution Phases for Optimized Serverless PerformanceNov 17
PraveensamCut Your AWS Bill by scaling down Instance During Off-HoursThis document is going to explain AWS verical scale using lambda. The overall expection is scale down ec2 instance during off hour. I have…2h ago
Joud W. AwadAWS Kinesis Data Streams Deep DiveIn-depth guide to AWS Kinesis Data Streams: learn architecture, consumer models, and optimize data streaming for scalable applications.Nov 52
Zudonu Osomudeya10 Bash scripts that every beginner DevOps engineer can use to automate workflows10 Simple Bash Scripts for Automation and Faster Workflow in DevOpsNov 171
InInfoSec Write-upsbyOfir YakovianLarge-Scale Data Exfiltration: Exploiting Secrets in .env Files to Compromise Cloud AccountsPart 1: A comprehensive analysis of the techniques used by attackers in this malicious operationSep 112