Sukesh is a Technical Manager by profession and an IT enterprise and Technology enthusiast by passion. He holds a Master's degree in Software Engineering and has filled in various roles including software development, analysis, consultation, and management predominantly in SaaS and service-driven industries. He's currently a Technical Program Manager at AWS.
Last Update: Sep 20, 2024
Microsoft Loop vs OneNote, which is the right note-taking and collaboration tool for you? In this article, we will look at these two tools from Microsoft. Microsoft Loop is a new collaboration platform that integrates seamlessly with the Microsoft ecosystem of applications for real-time collaboration. OneNote on the other hand is a staple for personal…
An access control list (ACL) is a fundamental component of computer security. ACLs help to control and manage access permissions to organizational resources. In this article, I will explain in detail what an access control list is and how you can use them to secure access to local and networked resources. ACLs are an integral part…
Last Update: Apr 08, 2024
Identity and Access Management (IAM), is a crucial cybersecurity framework that governs and secures digital access to resources. It plays a pivotal role in helping organizations control and secure their digital resources such as apps, files, user identities, permissions, and all other organizational data. IAM also helps ensure the confidentiality and integrity of sensitive information….
Azure Data Studio is a database management tool from Microsoft. It offers a modern and user-friendly UI for performing several database operations and building customizable dashboards. In this article, I’ll explain how Azure Data Studio works, how it differs from SQL Server Management Studio, and how you can download and install it on your PC….
Last Update: Nov 19, 2024
In today’s rapidly evolving technology landscape, Amazon Web Services (AWS) remains one of the biggest players in the cloud computing industry. For most IT pros, AWS certifications have become a crucial stepping stone for career advancement. These certifications validate professionals’ expertise with AWS services and indicate their ability to design, deploy, and manage applications on…
AWS Lambda is an event-driven, serverless compute service offered by Amazon Web Services (AWS). It enables developers to run code in response to events without having to manage the computing resources and infrastructure needed to run these applications. In this article, I’ll explain how AWS Lambda works and detail the best use cases for this…
Last Update: Jun 23, 2023
AWS Amplify is an Amazon Web Services (AWS) application development framework that organizations can use to develop and deploy web and mobile applications. It’s an end-to-end solution for creating an app backend and a frontend UI in just a couple of hours. In this article, I will explain how AWS Amplify works and how it…
Last Update: Mar 14, 2023
The Intel vPro platform was first announced by the chip maker back in 2007, and it designates a collection of advanced CPU technologies for business PCs. As of today, it provides various features to increase security and manageability to support IT departments in organizations of all sizes. In this article, I’ll explain how the Intel vPro…
Last Update: Nov 19, 2024
Hyperconverged infrastructure (HCI) is a software-defined infrastructure that virtualizes and packages all the components of a conventional data center including network, storage, and computing resources. Hyperconverged infrastructure platforms allow businesses to virtualize servers, storage, and underlying networks and implement a software-driven control of their IT environment. In this article, we’ll look at the top 5…
Last Update: Dec 20, 2022
ClickUp is a cloud-based project management tool that provides various collaboration features. In this article, we’ll explain how ClickUp works and how it can help organizations of all sizes to improve how they operate with a full-featured project management platform. The ongoing COVID-19 pandemic has pushed businesses all over the world to look for better…
Last Update: Jan 16, 2023
Redundant Array of Independent Disks (RAID) is a data storage technique that groups multiple physical storage disks (HDDs or SSDs) to work together as a single virtual storage drive. In this article, we’ll be detailing two of the most used RAID levels – RAID 5 and RAID 6. We’ll be highlighting the major differences between…
A software-defined perimeter (SDP) is a modern network security framework for creating a virtual network perimeter to protect an organizational infrastructure from outsiders. In this article, I’ll explain how a software-defined perimeter works and what are the main use cases for this new computer security approach. With increasingly complex network and application security requirements, a…