vikas.shopHow Modern Encryption and Hashing Keep Your Data UntouchedAES-256 stands for Advanced Encryption Standard, and SHA-256 stands for Secure Hash Algorithm. Both these methods help organizations secure sensitive and Personally Identifiable Information (PII). They are essential tools for encrypting sensitive dat...May 18, 2025路2 min read
vikas.shopStop Pod Security Risks! How to Safely Connect to AWS ServicesWe are in the world of quick set deployment and packaging the application wanted it to deliver with ease with heavy traffic we want them to autoscale horizontally thats what K8s is build for If EKS Cluster wants to communicate with native aws service...Mar 15, 2025路2 min read
vikas.shopBoto3 Module in a NutshellIn the world of Automation Why IAC plays an important role lets have brief overview on one such AWS SDK module known as Boto3 and how we can leverage it to automate infrastructure provisioning 馃槆 Boto3 is the official Python library for working with ...Nov 5, 2024路2 min read
vikas.shopUnlocking the Secrets of SSO: Because Who Needs 27 Passwords 馃槀Whenever we dive into application modernization discussions, one approach stands out as a guiding principle the Customer First philosophy. This strategy allows us to pinpoint their pain areas and seal the deal (Paisa Hi Paisa! 馃槀馃槀). Let us Explore a...Oct 13, 2024路2 min read
vikas.shopData Is The New Oil!Hello everyone! I know I may not seem very interesting, and as an introvert, I doubt many will follow me. But let鈥檚 look at the bigger picture: we live in a world of 7 billion people, 90% of whom are in the digital era, generating petabytes of data e...Oct 3, 2024路2 min read