Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Iker Ramos
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
What are the common pitfalls when using Athena for log analysis?
On
Querying logs in Amazon S3 for contextual information related to security events (for example, by using Athena)
Can someone explain the main differences between AWS WAF and a traditional firewall?
On
AWS managed security services (for example, AWS Shield, AWS WAF, Amazon GuardDuty, AWS Security Hub)
Consider setting up different security groups for different components of your application to keep things organized and more secure.
On
VPC security networking concepts
Has anyone found a method to reduce costs during continuous deployment?
On
Evaluating current deployment processes for improvement opportunities
How does AWS handle session management for large-scale applications?
On
Designing large-scale application architectures for a variety of access patterns
This blog post on encryption techniques was very insightful. Can anyone explain the difference between client-side and server-side encryption?
On
Encryption technique selection (for example, client-side, server-side, symmetric, asymmetric)
Any tips on optimizing costs when using Amazon ECR for large-scale operations?
On
Creating and configuring artifact repositories (for example, AWS CodeArtifact, Amazon S3, Amazon Elastic Container Registry [Amazon ECR])
Appreciate the section on AWS SSO in IAM. Helped me get a clearer picture.
On
IAM
Great post! Could anyone elaborate on the difference between K-fold and stratified K-fold cross-validation?
On
Perform cross validation.
Does AWS offer built-in VPN solutions?
On
VPN technology, terminology, and usage
load more comments
Search for: