Solution Design PrinciplesThis is another of my blog about IT solutions design principles which are general rules and guidelines.Apr 30, 2023Apr 30, 2023
Unpacking the 4Vs of Big Data: Why Size, Speed, Variety, and Accuracy Matter!Big data is like a huge toy box filled with tons of information from different places, such as social media and online shopping. It’s too…Apr 30, 2023Apr 30, 2023
Unleashing the Power of Data: K-Means Clustering for Finding Your TribeK-means clustering is a popular unsupervised machine learning technique used to group data points into distinct clusters based on…Apr 30, 2023Apr 30, 2023
Simplifying Authentication: Understanding OAuth, OIDC, and SAMLOAuth, OIDC, and SAML are all protocols used for user authentication and authorization in web applications.Apr 30, 2023Apr 30, 2023
From Lift and Shift to Cloud-Native: The 6 Most Common Application Migration StrategiesAre you considering migrating your applications to the cloud?Apr 30, 2023Apr 30, 2023
Learning Made Simple: The Feynman Technique ExplainedLearning is an important aspect of our lives, and it is essential to comprehend the ideas we come across.Apr 30, 2023Apr 30, 2023
Windows Hello vs Windows Hello for BusinessIs it the end game for Passwords and Credential Theft?Jun 15, 2021Jun 15, 2021
What the heck is EDA (Exploratory Data Analysis) Part IIn this article, I'll try to explain Exploratory Data Analysis (EDA) in a five-part series. If you’re new to EDA, i recommend to read all…Jun 15, 2021Jun 15, 2021
What the heck is Account-driven Apple User Enrollment?In this article, i’ll discuss Apple’s enrollment method called ‘User Enrollment’ which can help you support “bring your own device”…Jun 14, 2021Jun 14, 2021