AWS Compliance, Identity and Security Services (Part 2)
This second part of AWS compliance, identity, and security-related services should feel familiar. These are solutions that nearly everyone needs, and has used, at some... Read more
This second part of AWS compliance, identity, and security-related services should feel familiar. These are solutions that nearly everyone needs, and has used, at some... Read more
In this episode, we will look at Microsoft Office alternatives. The suite of applications can run up to over one thousand dollars which are not in... Read more
The Composite Pattern is one that is not taken advantage of as often as it might outside of frameworks. This is an approach to design... Read more
The compliance, identity, and security services of AWS covers a large number of offerings. Therefore, we will review these in a multi-part series of episodes. ... Read more
Social networking is all the rage. Unfortunately, all of those platforms that allow us to share our story can be hard to keep up with. ... Read more
The Bridge Pattern is commonly configured but often due to templates and generators rather than understanding the true intent. Since it is more of a design than... Read more