Published injhash-ingsSo you want to be identity engineerWhy identity engineering is a specialized field and how to get readyApr 6, 2024Apr 6, 2024
Published inBetter Programmingpasskey - A developer guideA quick technical introduction and exploration of passkeys, W3C webauthn and FIDOOct 17, 20231Oct 17, 20231
Published injhash-ingsIn past, we see futureA collection of my articles that explore how the concepts remain the same while the implementations change.Mar 25, 2023Mar 25, 2023
Published injhash-ingsBuilding flexible product configurationBalancing security, preference with configurabilityFeb 23, 2023Feb 23, 2023
Published injhash-ingsAWS ECS vs Google Cloud run jobsAn apple to near-apple comparisonJun 13, 20221Jun 13, 20221
Published inBetter ProgrammingScale GitHub Workflows With AWS ECSusing a self-hosted runner without access keys, complex lambda functions, or Kubernetes clustersMay 31, 20221May 31, 20221
Published inInfoSec Write-upsUsing PGP to enhance security and non-repudiation of terraform opsTerraform has transitioned to a lingua franca for multi-cloud infrastructure as a code. Explore approaches and script to secure terraformApr 27, 20221Apr 27, 20221
Published inGeek CultureGo modules in mono-repoBalancing development flexibility with structured release processJan 10, 2022Jan 10, 2022
Published inGeek CultureProject estimation with excelPerform cost and time estimation with leveled resource without complex macrosOct 29, 2021Oct 29, 2021
Published inGeek CultureSecuring DevOps workhorseConsiderations for deploying and securing DevOps remote agentsOct 22, 2021Oct 22, 2021