adekemiadisa.hashnode.devComplete Guide to Using DevOps for Single-Tier Application Deployment.Introduction Deploying a three-tier application can be complex, which is why I decided to document my journey in deploying this application. To simplify the process, I started with a single-tier setup before scaling up to two-tier and three-tier arch...Oct 14, 2025·9 min read
adekemiadisa.hashnode.devFrom Code to Cloud: How to Deploy Your Static Website on AWS S3Introduction In today’s digital-first world, a website often serves as your front door to the internet, whether you’re a developer showcasing projects, a business reaching new customers, or an individual building a personal brand. Static websites, in...Aug 19, 2025·7 min read
adekemiadisa.hashnode.devStep-by-Step Guide to Setting Up AWS IAM, Identity Center, and OrganizationIntroduction Effectively managing access and security across multiple AWS accounts can be challenging without the appropriate tools. This comprehensive guide offers a detailed, step-by-step approach to setting up AWS IAM, AWS Identity Center, and AWS...Aug 9, 2025·4 min read
adekemiadisa.hashnode.devNavigating the Dangers of Public Wi-Fi: Protect Your Data and PrivacyGiven Nigeria's current economic situation and the high data cost, it's tempting to use public Wi-Fi. However, it's important to be aware of the risks. When using public Wi-Fi networks, your personal information, such as passwords and financial data,...Apr 1, 2025·1 min read
adekemiadisa.hashnode.devTop Strategies for Preventing Phishing and Social Engineering in Your OrganizationData is the new oil, as they say, and the future of work revolves around data, so does the rise in cybercrimes and cyberattacks. Every organization faces cyberattacks and cybercrimes, and if not dealt with, these might lead to shutting down or even d...Jul 8, 2023·6 min read