Sep 28Member-onlyHow to Access Amazon S3 Buckets from Your VPC or On-Premises NetworkHow to Access Amazon S3 Buckets from Your VPC or On-Premises Network Amazon S3 is a popular cloud storage service that allows you to store and retrieve any amount of data from anywhere on the web. However, accessing S3 buckets from your virtual private cloud (VPC) or on-premises network can be challenging if you don’t know the best practices and options available…S34 min readS34 min read
Sep 27Member-onlyHow to use Fine-grained access control in Amazon OpenSearch ServiceHow to use Fine-grained access control in Amazon OpenSearch Service In this blog post, I will show you how to use Fine-grained access control in Amazon OpenSearch Service, which is a fully managed service that makes it easy to deploy, operate, and scale OpenSearch clusters in the AWS Cloud. Fine-grained access control enables you to control who can access your…Fine Grained5 min readFine Grained5 min read
Sep 27Member-onlyHow to use SAML authentication with AzureAD for Amazon OpenSearch Service and OpenSearch ServerlessIn this blog post, I will show you how to use SAML authentication with AzureAD for Amazon OpenSearch Service and OpenSearch Serverless. SAML authentication lets you use your existing identity provider to offer single sign-on (SSO) for OpenSearch Dashboards, which is a visualization tool for analyzing your search results. …Opensearch5 min readOpensearch5 min read
Aug 2Member-onlyHow to Secure Blockchains from Attacks: A Security Reference Architecture for Distributed Ledger TechnologiesTable of Contents Introduction What are blockchains and why are they important? What are the main security challenges and limitations of blockchains? What is the main goal and contribution of the paper? The Security Reference Architecture What is the security reference architecture (SRA) and how does it work? What are the two models…Distributed Ledgers11 min readDistributed Ledgers11 min read
Jul 29Member-onlyThreat ModelingThreat modeling is a structured way to identify and mitigate security risks in your software projects. It helps you to think like an attacker and anticipate the possible ways that your system can be compromised or abused. By doing so, you can design and implement more secure and resilient solutions. …Threat Modeling8 min readThreat Modeling8 min read
Jul 29Member-onlyNudge TheorySo, when economists make their models, they generally assume that people are rational and predictable. But When we look at actual human beings, it turns out that people are impulsive, short sighted, and, a lot of times, just plain irrational. …Nudge Theory8 min readNudge Theory8 min read
Mar 26Member-onlyA story written by Generative AI using LLMsI have a complete story written by #GPT images are created by #bing #openjourney #text2speech by #huggingface more then 20 voices. Some Other tools used are #pinecone #langchain #llmindex lots of data preparation and automated #promptengineering etc. All automated and this is the end result is a video. https://www.linkedin.com/posts/ealtili_gpt-bing-openjourney-activity-7045650814366838784-EoAK Bellatrix…Gpt 36 min readGpt 36 min read
Mar 16Member-onlyVNET Integration of Azure ServicesDeploy dedicated Azure services into virtual networks When you deploy dedicated Azure services in a virtual network, you can communicate with the service resources privately, through private IP addresses. The services can then be privately accessed within the virtual network and from on-premises networks. Subnet delegation in Azure virtual network enables you to designate a specific subnet…Vnet3 min readVnet3 min read
Mar 8Member-onlyAzure AD Conditional Access Automation OverviewIn this article I want to give an overview about benefits and existing solutions to automate management of Conditional Access Policies. Benefits of automation of CA Using DevSecOps There are some real advantages in the implementation by a DevOps operating model. This includes: Using approval workflows and repository/branch policies for advanced governance Version control which includes backup/restore…Conditional Access4 min readConditional Access4 min read
Mar 5Member-onlyCognitive ArchitecturesWhat is Cognitive Architecture A cognitive architecture is not a single algorithm or method for solving a specific problem; rather, it is the task-independent infrastructure that learns, encodes, and applies an agent’s knowledge to produce behavior, making a cognitive architecture a software implementation of a general theory of intelligence. Cognitive architecture is a hypothesis…Cognitive Architecture10 min readCognitive Architecture10 min read