Suman DhakalHow to pop the filter bubbles ?In the previous two articles, we discussed what filter bubbles are, how they impact everything we see and touch and hear on the internet…Aug 21Aug 21
Suman DhakalFilter Frenzy: Instances of Social Media Segregating Shapes DiscourseCase Study: The FacebookAug 21Aug 21
Suman DhakalFiltered Realities: Fueling Social PolarizationOur interactions and the consumption patterns on the internet are increasingly shaped by algorithms. Among these digital gatekeepers…Aug 21Aug 21
Suman DhakalWhat is AWS Macie? Protect the Sensitive Data in Your S3 BucketsAs more and more organizations move into the cloud, protecting PII and compliance are a priority of Organizations. Cloud has been a…May 5, 2023May 5, 2023
Suman DhakalInfrastructure as Code and CI/CDTechnologies: AWS, Git, Gitlab CI/CD, IaC (Terraform)Aug 26, 2022Aug 26, 2022
Suman DhakalGetting started with TerraformInfrastructure as Code(IaC) as the name stands is a practice, where resources in the cloud are maintained as code, so they can be treated…Apr 2, 2022Apr 2, 2022
Suman DhakalHosting a static website on AWS S3 with SSL.Services we shall be usingJan 26, 2021Jan 26, 2021
Suman DhakalCreating hosted zone in AWS for imported domains.Before going further into the discussion, I assume you’re familiar with AWS’s DNS service, AWS Route53, hosted zones and DNS records.Dec 28, 2020Dec 28, 2020
Suman DhakalImplementing assume roleAssume role is one of AWS’s best practices, why?May 29, 2020May 29, 2020
Suman DhakalCopying encrypted buckets between AWS accounts.Provided that both source bucket and destination bucket have already been created and versioning has been enabled on both buckets, this…May 22, 2020May 22, 2020