Why is SaaS considered the industry of the future?
top of page


The work today has varied a lot, it is no longer defined by the physical or traditional limitations of yesteryear. We are in a globalized world and borders no longer exist, business opportunities can appear anywhere, so employees and companies must have the appropriate means to facilitate productivity, be agile, and adapt to real-time according to market dynamics. Taking into account the above, the SaaS (Software as a service) software distribution model is of great help to c

How to Deploy IAM conditional policies with Terraform
Nowadays, AWS is the top cloud provider around the world and has a wide variety of services that provide to us One of the most important services is IAM (Identity and Access Management). Here, we can manage the correct Access to AWS services and resources in a secure way and the best part is this is a free feature, so there is no additional charge. The way to manage the Access and permissions is by creating IAM Policies. Once we have the policies created, the correct way to w

Do you want to import an ECDSA certificate into AWS?
Don't waste your time trying to import into ACM, Amazon Certificate Manager says ECDSA is supported but if almost impossible to import the certificate, so you just have to import it as an IAM certificate An example aws iam upload-server-certificate --server-certificate-name ecdsa-certificate-example --certificate-body file://Certificate.pem --certificate-chain file://CertificateChain.pem --private-key file://PrivateKey.pem For more information https://aws.amazon.com/premiumsu

Serverless deployment
There are many ways to deploy infrastructure as code, but today’s Teratip is about a special one we like to use: Serverless. As with many IAC tools, we start by writing a text file and then running a binary that controls the creation of what we declared. But serverless has a control advantage over the infrastructure that requires AWS resources like Lambda functions or DynamoDB. In less than 50 lines of Yaml code, you can create a state-of-the-art infrastructure using S3 Bucke

Did you know there is a better way to connect to your AWS Linux Instances than SSH?
For years, you used SSH as the only way to access your ec2 instances, surely you've exposed port 22 to anywhere (0.0.0.0/0) making your instances or bastion instances reachable from anyone on the internet. Some people prevent this by implementing VPN solutions, which increases the complexity and potential points of failure and tons of maintenance tasks. Your search ended right here, there is a great tool that allows you to connect to the Linux terminal, SSM Session Manager. T

What does the Cloud bring to Companies in 2021?
In business, the pressure on the workforce and responsibility keeps increasing. We have been in a pandemic for almost a year and many companies have been affected by the Covid-19 effect; many expect 2021 to be a year of recovery and improvement, to adapt to changes and take their businesses to another level. This is why to meet customer demands and work in real-time, companies have been adopting cloud computing. Cloud computing offers modern business advantages that include a

Quick AWS Region change
Happens very often that you have to manage an account with Console control. But when your infrastructure is multi region, you need to change the AWS_REGION environmental variable constantly and it is very easy to confuse their names because they don't change much, do they? Well, here you have a Teratip to make a descriptive variable change: Copy and paste the following function into your .bashrc file. function region(){
export AWS_REGION=$(dialog --stdou

Pending Pods: Limits in EKS
It is annoying to finally deploy our application in an EKS cluster to get the eternal “pending” state of our pods. There are several reasons that might get a pod in a pending state; most of them are related to computing resource limits, but some others are related to IP address limits in our worker nodes. However, reaching this kind of limit is an easy problem to solve. You can find the right type of instance for your Kubernetes workloads by checking this handy document provi

What Constitutes a HIPAA Violation?
Before cloud services can be used by healthcare organizations for storing or processing protected health information (PHI) or for creating web-based applications that collect, store, maintain, or transmit PHI, covered entities must ensure the services are secure. "For large organizations, the most common uses of the cloud are for hosting analytics applications and data (48%), hosting financial applications and data (42%), for operational applications and data (42%), and HR ap

We decided to see the glass half full, Goodbye 2020 Welcome 2021!
The world stopped. Yes, it might be a good way to start to describe it. We don't realize it or maybe we do, but we are writing the story of an unusual year. A year where for the first time in 115 the New York subway was closed. A year where the planes stayed on the ground. A year where humans took refuge in their homes and animals took to the streets. A year where pollution dropped for a while. A year where hugging with a friend or family member turned into an act of madness.
Entradas destacadas
Recient posts
Archive
tags
Follow us
bottom of page