Insights
Stay ahead of trends and techniques in data analytics and AI-ML from our densely certified team of engineering leaders, including 4 AWS Ambassadors along with experts on every cloud and data platform.
How to Securely Use Open Source in the Enterprise
Open source software can be secured for enterprise applications, and may in fact be more secure than proprietary software. This is good news for...
Read moreRoll Back or Resolve Forward? How to Deal With Database Errors
When you apply database changes, whether automated as part of a CICD process, or manually in the legacy solution, what do you do when an error occurs? Do you...
Read moreMoving at the Speed of Cryptocurrency with Infrastructure as Code
Blue Sentry works with many of the world’s largest financial institutions. LukkaTech is one of those customers and provides the world with...
Read moreAutomating API Information Storage with AWS - Introduction
APIs serve as the backbone of software development, enabling applications to communicate with one another seamlessly. As organizations grow and their...
Read moreAWS EKS Identity is Not Mapped Error
If you are using AWS IAM Identity Center and grant a role access to an AWS EKS (Elastic Kubernetes Service) and you are...
Read moreAWS Lake Formation: Part 1 Architectural Deep Dive
This series will investigate how Lake Formation can define your data lake or mesh governance. We will take a comprehensive technical examination of AWS Lake...
Read moreAWS Lake Formation: Part 10 Troubleshooting and Optimization
In the final part of the AWS Lake Formation series, I address common issues and their resolutions and performance optimization tips for large-scale...
Read moreAWS Lake Formation: Part 3 Configuring Complex AWS Glue Workflows
In this series installment on AWS Lake Formation, I'll discuss configuring the complex AWS Glue workflows using Terraform. Specifically, I focus on setting...
Read moreAWS Lake Formation: Part 4 Fine-Grained Access Control with Lake Formation and IAM
This series installment on AWS Lake Formation dives deep into fine-grained access control mechanisms, focusing on how Lake Formation integrates...
Read more