Displaying images makes for an interesting problem: on one side, you want to make them publicly available; on the other, you want to protect them against undue use.
Explore this step-by-step introduction to using the H2 database with Spring Boot, including an example that is written in the Groovy programming language.
When you mix what AWS IAM can do with how Terraform lets you manage infrastructure through code, setting up secure and effective roles becomes simpler.
Maven Archetypes enables you to apply best practices within your project or org. Learn how to create archetypes from scratch and based on an existing project.
Explore a simple example of writing a Pulumi provider for Airbyte. Instead of using the official Terraform provider, implement a Pulumi provider in Python.
In this blog on AWS, let’s do a comparison study between two filter tools available with Amazon CloudWatch Logs — Metric Filter and Subscription Filter.
Follow the steps of the creation of a lie detector's backend stack and learn the importance of remaining open to unconventional solutions for common tasks.
Learn to incorporate Mend into your IaC workflows, improve infrastructure security posture, reduce the risk of misconfigurations, and ensure compliance.
July 5, 2024
by Vidyasagar (Sarath Chandra) Machupalli FBCS
CORE