Osagie Anolu

Osagie Anolu @nolunchbreaks_22

About: Software Engineer

Location:
Calgary, Alberta
Joined:
May 28, 2024

Osagie Anolu
articles - 38 total

Digital Defense Revolution: How Modern Security Landscapes Are Transforming in 2025

The cybersecurity realm is experiencing unprecedented transformation as we navigate through 2025....

Learn More 5 1May 28

Deploying AWS SNS and Lambda with Terraform: A Step-by-Step Guide (and Fixing Errors Along the Way)

Introduction Recently, I worked on deploying an AWS SNS Topic and an AWS Lambda function...

Learn More 2 4Feb 7

Building and Deploying an E-Commerce Website from Scratch Using HTML5, CSS, JavaScript, and AWS

Introduction In today's fast-paced tech world, the ability to build and deploy a project...

Learn More 2 0Jan 29

The Urgent Case for Government Cloud Adoption: Modernizing Digital Infrastructure

In an era of unprecedented technological disruption, government agencies worldwide stand at a...

Learn More 2 0Jan 25

Greenish Bee: Navigating the Cloud-Native Landscape

Prologue: The Birth of a Microservices Vision In the ever-evolving world of software...

Learn More 2 0Jan 24

Building an NBA Stats Pipeline with AWS, Python, and DynamoDB

Ever wanted to build a data pipeline that automatically fetches and stores NBA statistics? In this...

Learn More 2 0Jan 21

Building a Weather Data Collection System with AWS S3 and OpenWeather API

As I've been diving deeper into DevOps, I recently built a Weather Data Collection System that...

Learn More 4 0Jan 15

The Complete Guide to Bash Commands

Basic Syntax and Variables Variables name="John" echo $name # Basic...

Learn More 4 0Jan 9

AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

The cybersecurity landscape is witnessing a paradigm shift with the emergence of AI-generated spear...

Learn More 3 0Jan 7

The Rising Tide of Platform Engineering: Reshaping Security in Modern DevOps

The landscape of software development is undergoing a fundamental transformation, with platform...

Learn More 11 1Dec 30 '24

Containerizing a Three-Tier Application with Docker: A Hands-On Guide

Are you looking to containerize your full-stack application but don't know where to start? In this...

Learn More 10 1Dec 25 '24

From Local to Live: Deploying My Landing Page on AWS with SSL

Hey dev community! Today I'm excited to share my journey of deploying a landing page on AWS EC2,...

Learn More 5 1Dec 24 '24

Machine Learning in Code Security: A Developer-Researcher's Journey Through Neural Code Analysis

After three years of researching neural networks for code analysis, I've discovered some fascinating...

Learn More 1 0Dec 23 '24

Navigating the Security Landscape of Docker Containers: A DevSecOps Perspective

In the fast-paced world of modern software development, Docker containers have become indispensable....

Learn More 1 0Dec 21 '24

Securing Cloud Environments Against Potential Extortion Threats

As businesses increasingly migrate to the cloud for scalability and flexibility, the risk of...

Learn More 3 0Dec 19 '24

🔥 Ultimate Cheat Sheet for Kubernetes Commands 🔥

Welcome, DevOps enthusiasts! Kubernetes is the backbone of modern cloud-native applications, and...

Learn More 1 0Dec 19 '24

🚀 Mastering Docker for DevOps Success 🐳

As a DevOps engineer, mastering Docker is non-negotiable! Here's your comprehensive guide to...

Learn More 2 0Dec 16 '24

Linux Commands in DevOps: A Practical Guide with Examples

☄️ Top 70 Linux Commands Every DevOps Engineer Should Know ♾ Linux commands form the backbone of...

Learn More 53 5Dec 14 '24

Linux Commands in DevOps: A Practical Guide with Examples

File System Navigation and Management Basic Directory Operations 1. ls...

Learn More 1 0Dec 14 '24

Understanding Kubernetes Security: Common Vulnerabilities and Modern Solutions

In the rapidly evolving landscape of container orchestration, Kubernetes has become indispensable for...

Learn More 4 0Dec 13 '24

The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

When a Fortune 500 healthcare company discovered unauthorized cryptocurrency mining operations...

Learn More 2 1Dec 10 '24

Building a Scalable Anti-Hate Speech Moderation Bot for Telegram: A Deep Dive

Managing a Telegram group with 3,000 members isn't just about growing numbers—it's about fostering a...

Learn More 5 0Dec 9 '24

⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

As organizations continue to migrate their infrastructure to the cloud, ensuring robust security...

Learn More 1 0Dec 3 '24

Conquering Notification Overload: A Developer's Guide to Digital Peace

As developers, we're bombarded with notifications from multiple channels - Git repositories, CI/CD...

Learn More 2 0Dec 3 '24

Linux Kernel 6.13: Breaking New Ground in Hardware Support and System Performance

The release of Linux 6.13-rc1 by Linus Torvalds marks an exciting milestone in kernel development,...

Learn More 8 0Dec 2 '24

The Transformative Role of AI in Ridesharing Security

In recent years, Artificial Intelligence has emerged as a game-changing force in revolutionizing...

Learn More 2 0Nov 29 '24

Detecting and Mitigating PyPI Attacks Targeting AI Enthusiasts: A Deep Dive into JarkaStealer Campaigns

Recent months have seen a surge in sophisticated supply chain attacks targeting Python developers...

Learn More 2 0Nov 28 '24

Complete AWS Guide: Cloud Computing to Website Deployment

Table of Contents Cloud Computing Fundamentals Amazon EC2 Basics AWS CLI...

Learn More 3 0Nov 28 '24

How Hackers Exploit Ansible for Configuration Attacks: A Technical Deep Dive

As organizations increasingly rely on automation tools for infrastructure management, Ansible has...

Learn More 0 0Nov 28 '24

Getting Started with Ansible: A Complete Guide to IT Automation

Ansible is a powerful open-source automation tool that can help you manage servers, configure...

Learn More 1 0Nov 26 '24