Vaishnavi Modakwardevopscloudhub.hashnode.dev·Aug 10, 2024🚀DevOps Demystified: Bridging the gap between Development and Operations # Day1What is DevOps? In today's rapidly evolving tech landscape, the term DevOps is frequently mentioned. But what does it truly mean? At its core, DevOps is a blend of Development (Dev) and Operations (Ops) practices designed to enhance the software deve...3 likes·64 readsDevOps#technicalblog
Pranit Kolamkarkpranit.hashnode.dev·Jul 15, 2024AWS IAM Basics: Essential Concepts and How to Use ThemAWS Identity and Access Management (IAM) is a fundamental service within the AWS cloud platform. It serves as the cornerstone for securing your AWS resources by managing users, groups, roles, and the permissions they have to access and interact with ...day10
Mallika Gautamvbnm.hashnode.dev·Jul 4, 2024Mastering Cybersecurity: Day 11 of the 100-Day ChallengeVirtual Network And Privacy Common network protocols Network protocols are used to direct traffic to the correct device and service depending on the kind of communication being performed by the devices on the network. Protocols are the rules used by ...#cybersecurity
Mallika Gautamvbnm.hashnode.dev·Jul 3, 2024Mastering Cybersecurity: Day 11 of the 100-Day ChallengeIntroduction to network protocols Networks benefit from having rules. Rules ensure that data sent over the network gets to the right place. These rules are known as network protocols. Network protocols are a set of rules used by two or more devices ...day10
Mallika Gautamvbnm.hashnode.dev·Jul 2, 2024Unleashing Creativity: Day 2 of 30-Day Figma Animation ChallengeGallery: Subtle Animation [ PART -2 ] Today we are going to add more fun elements to our animations. Let's get started with the second part and the second day. Yesterday, we created our landing page and completed the first part of the animation. We a...animation
Mallika Gautamvbnm.hashnode.dev·Jun 29, 2024Mastering Cybersecurity: Day 6 of the 100-Day ChallengeAbout cybersecurity tools Open-source tools Open-source tools are often free to use and can be user friendly. The objective of open-source tools is to provide users with software that is built by the public in a collaborative way, which can result in...#cybersecurity
Mallika Gautamvbnm.hashnode.dev·Jun 27, 2024Mastering Cybersecurity: Day 5 of the 100-Day ChallengeOWASP: Security Principles The first OWASP principle is to minimize the attack surface area. An attack surface refers to all the potential vulnerabilities that a threat actor could exploit. Examples of common attack vectors are phishing emails and w...#cybersecurity
Suresh Kumar Simsuresh.hashnode.dev·Mar 8, 2024Day5: The Power of Failing Fast: Accelerating Innovation in DevSecOpsIn the dynamic realm of DevSecOps, where speed and security are paramount, the concept of failing fast has emerged as a powerful strategy for driving innovation. This approach advocates for quick experimentation, rapid iteration, and learning from fa...30daysdevsecops
Gokulakrishnan Sgokuldevops.hashnode.dev·Feb 2, 2024Day-5 of DevOpsWhen you press the system's power button, you will see the login screen on your screen and the system will begin working. Have you ever wondered what happens between pressing the power button and seeing the login screen show up? For any operating sys...1 like#90daysofdevops
Hardikk Kambojhardikkwrites.hashnode.dev·Nov 27, 2023Why 30 day challenges are important and why do people fail?Let's Start We all need a good challenge to push ourselves. Challenge builds resilience capacity and hard times stimulate growth in a way that good times don't. You might have seen multiple challenges that go around the internet, mostly on Twitter a...5 likes·329 reads30 Days of Code