Logo
Login
Tech Posts 31249
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

Choosing Between IAM vs PAM in GCP: Overview, Features, Use Cases, and Cost

Overview: IAM: IAM (Identity and Access Management) in Google Cloud Platform (GCP) is a core security service that defines who (user or service) has what access to which resources.PAM: PAM (Privileged...
27.04.2025 0 Read More

When to Use StatefulSets in Kubernetes: Real-Time Scenarios

Lets get Started!.. A real-world use case of StatefulSets in Kubernetes is deploying a highly available database or distributed system that requires stable network identities, persistent storage, and ...
27.04.2025 0 Read More

Setting Up Auto Scaling Groups and Load Balancer on AWS EC2: A Step-by Step Guide

Setting Up Auto Scaling Groups and Load Balancer on AWS EC2: A Step-by Step Guide
Ensuring high availability and scalability for your application is crucial when deploying on AWS.In this guide, we'll walk through setting up Auto Scaling Groups (ASG), an Application Load Balancer (A...
27.04.2025 0 Read More

Control Firewall, OpenSSH & Other System Services with systemctl (Day 8 of 30)

Table of Contents Introduction Understanding systemctl Basic operations (start, stop, status, enable, disable, restart, reload) Advanced operations (mask, unmask) Practical Examp...
27.04.2025 0 Read More

🎓 How to Redeem Your Azure for Students Subscription (Step-by-Step)

If you're a student, you're eligible for some awesome free cloud benefits through Microsoft Azure for Students! 🚀Microsoft offers $100 in free Azure credits, free developer tools, and access to AI ...
27.04.2025 0 Read More

Simple PHP OOP for IP Blocking and Whitelisting

Keeping your web application secure is a continuous effort. One basic yet effective technique is controlling access based on IP addresses. Whether you need to block malicious actors or restrict access...
27.04.2025 0 Read More

Understanding AWS Regions and Availability Zones: A Guide for Beginners

Understanding AWS Regions and Availability Zones: A Guide for Beginners
Amazon Web Services (AWS) has completely changed the game for how we build and manage infrastructure. Gone are the days when spinning up a new service meant begging your sys team for hardware, waiting...
28.04.2025 0 Read More

How to Set Up a Free Oracle Cloud VM for Web Development (2025 Guide)

How to Set Up a Free Oracle Cloud VM for Web Development (2025 Guide)
As a web developer, having access to a persistent, virtual machine in the cloud is often useful for testing and development. While many cloud-based providers offer limited free tiers (e.g. AWS, GCP, o...
28.04.2025 0 Read More

AWS CDK and the Hidden Risks to Least Privilege

Have we given up on the least privileged principle? Personally, I am a big fan of it. But let’s be honest, it can also be tough to follow the principle strictly. With the rise of CDK, it became even...
28.04.2025 0 Read More

Oracle Cloud HCM 25B Release: What's New?

Oracle Cloud HCM 25B Release: What's New?
Does your organization use Oracle HCM Cloud? If so, get ready Oracle’s 25B release is around the corner, with a planned go-live in April 2025. These quarterly updates are not just routine maintenan...
28.04.2025 0 Read More
Loading...
#reading
The Past, Present and Future of Multitenancy
0
Daily React Learning -13
0
May the 4th Be With You: Inside the Star Wars Intro Creator
0
Day 1123 : Power
0
Cooking with TypeScript enums
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
1
What is Model Context Protocol (MCP): Explained in detail
0
Beginner's Guide to the Model Context Protocol (MCP)
0
How to Run DeepSeek Locally Using Ollama
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0