PinnedDeeptesh BhattacharyainAWS in Plain EnglishUnderstanding the Differences Between AWS EKS vs. ECS — When to Use What?Deploying containerized apps on AWS? In this article, I am presenting my view on how you can choose between EKS vs. ECS on Amazon Cloud.May 11, 20213May 11, 20213
Deeptesh BhattacharyaDevOps Automated Software Installations for Remote/Vendor Delivery TeamsIn today’s DevOps automation has become not only important but necessary to quickly enable your teams to be ready on a project. At times…Aug 16, 2021Aug 16, 2021
Deeptesh BhattacharyaHow to enable On Demand Installations on Windows using MS PowerShell, Chocolatey, Git and Nexus.There is always a trade-off between a centralized IT function and a federated IT function where the latter gives the developers flexibility…Jul 20, 2021Jul 20, 2021
Deeptesh BhattacharyaHow to use Terraform at Scale for Federated IT Systems.Introduction to TerraformMay 14, 2021May 14, 2021
Deeptesh BhattacharyaIt is becoming difficult day by day to manage and sustain the business continuity of a software…The most difficult or rather challenging task is accomplishing acceptable quality with the ever increasing demand in reduced delivery…Jan 20, 2021Jan 20, 2021
Deeptesh BhattacharyaMy exposure with quality and information security audits have made me realize that most of the…I will take up today one of the practices which you can use in order to protect your data at rest. I see the following people can benefit…Jan 20, 2021Jan 20, 2021
Deeptesh BhattacharyaThreat Modelling Tools Analysis 101 — OWASP THREAT DRAGONKey DevSecOps solutions available and their benefits and pitfalls through a series of evaluating different tools for Technical Architects…Jun 14, 2020Jun 14, 2020
Deeptesh BhattacharyaThreat Modelling Tools Analysis 101Microsoft Threat Modelling ToolJun 14, 2020Jun 14, 2020