Thoughts on technology and career …


  • Serverless Computing Explained

    Serverless Computing Explained

    Serverless computing is a term used by the Cloud Computing industry to enable customers to run programs without having to worry about the underlying resources used to run the program. This blog will explain what “Serverless” really means and the Pro’s and Con’s of this approach. Let’s face it, “Serverless Computing” is an oxymoron, like Read more

  • How To Secure AWS Resources with AWS Tags

    How To Secure AWS Resources with AWS Tags

    This is a follow-on blog to Practical Application of AWS Tags. In this blog, we will see how Tags can be used to create flexible Identity Access Management (IAM) Policies based on simple Tags. These flexible IAM Policies can be applied across any AWS Account without modification. Flexibility of Tags AWS Tags are extremely flexible. Read more

  • Practical Application of AWS Tags

    Practical Application of AWS Tags

    AWS Tags are a very simple concept. However, if AWS Tags are applied in a clear and consistent manner, they can make overall Cloud Governance much easier. This blog will cover some practical advice on applying AWS Tags for better oversight of resources. Applying AWS Tags AWS Tags can be applied to virtually any resource, Read more

  • Data Encryption Explained

    Data Encryption Explained

    Data encryption is an important topic and everyone should have a basic understanding of why it is important and how data encryption is used. Data encryption is the process of encoding the data into a non-readable format so only the intended recipient can decode the data. This process of encoding is done by the sender Read more