Shekhar Jhainjhash-ingsSo you want to be identity engineerWhy identity engineering is a specialized field and how to get readyApr 6Apr 6
Shekhar JhainBetter Programmingpasskey - A developer guideA quick technical introduction and exploration of passkeys, W3C webauthn and FIDOOct 17, 20231Oct 17, 20231
Shekhar Jhainjhash-ingsIn past, we see futureA collection of my articles that explore how the concepts remain the same while the implementations change.Mar 25, 2023Mar 25, 2023
Shekhar Jhainjhash-ingsBuilding flexible product configurationBalancing security, preference with configurabilityFeb 23, 2023Feb 23, 2023
Shekhar Jhainjhash-ingsAWS ECS vs Google Cloud run jobsAn apple to near-apple comparisonJun 13, 20221Jun 13, 20221
Shekhar JhainBetter ProgrammingScale GitHub Workflows With AWS ECSusing a self-hosted runner without access keys, complex lambda functions, or Kubernetes clustersMay 31, 2022May 31, 2022
Shekhar JhainInfoSec Write-upsUsing PGP to enhance security and non-repudiation of terraform opsTerraform has transitioned to a lingua franca for multi-cloud infrastructure as a code. Explore approaches and script to secure terraformApr 27, 20221Apr 27, 20221
Shekhar JhainGeek CultureGo modules in mono-repoBalancing development flexibility with structured release processJan 10, 2022Jan 10, 2022
Shekhar JhainGeek CultureProject estimation with excelPerform cost and time estimation with leveled resource without complex macrosOct 29, 2021Oct 29, 2021
Shekhar JhainGeek CultureSecuring DevOps workhorseConsiderations for deploying and securing DevOps remote agentsOct 22, 2021Oct 22, 2021