Here are some technology focused articles from our featured authors.

Credential Holder Directories for Google Cloud Certified Professionals

Google recently started the Credential Holder Directory initiative for Google Cloud Certified Professionals. Google Cloud Certifications are around for a while, but Google didn’t have a centralized listing of certified professionals in the past. With the Credential Holder Directory initiative, Google gives an option for professionals to maintain their own personal directories with all relevant …

Continue reading “Credential Holder Directories for Google Cloud Certified Professionals”

The post Credential Holder Directories for Google Cloud Certified Professionals appeared first on Raju Alluri.

Brave Browser

Started using Brave browser recently. I am quite impressed with the security features. Now a days it is my browser of choice for reading several news and entertainment sites. It limits the eye-catching distractions that are otherwise irksome. I like the way shields work and I often control the security settings either at global level …

Continue reading “Brave Browser”

The post Brave Browser appeared first on Raju Alluri.

IPv6 on AWS

IPv6 is finally gaining some momentum, thanks to support from several public cloud vendors and data center players in the recent months. Beyond the infrastructure players, the slow migration of several ISPs and corporations towards IPv6 is evident in Google’s IPv6 traffic statistics: Hovering around 13%, the adoption rate is impressive in the recent months …

Continue reading “IPv6 on AWS”

The post IPv6 on AWS appeared first on Raju Alluri.

Identity as the Perimeter

The perimeter of an enterprise has been its LAN and WAN for quite a number of years. The popularity of VPN based remote access did extend the definition of an enterprise’s perimeter to the remote presence of its employees, albeit for short bursts of time more often than not. As trends like Cloud based services … Continue reading Identity as the Perimeter

The post Identity as the Perimeter appeared first on Raju Alluri.

Identity as the Perimeter

The perimeter of an enterprise has been its LAN and WAN for quite a number of years. The popularity of VPN based remote access did extend the definition of an enterprise’s perimeter to the remote presence of its employees, albeit for short bursts of time more often than not. As trends like Cloud based services …

Continue reading “Identity as the Perimeter”

The post Identity as the Perimeter appeared first on Raju Alluri.

Driverless Cars: Moral and Legal Considerations

Driverless cars are no longer a fantasy. Despite being far from general purpose use, this technology is evolving leaps and bounds, thanks to players like Google and Tesla making steady progress on this technology. As the technology evolves and enters into public life, several legal and moral issues are going to crop up. The recent …

Continue reading “Driverless Cars: Moral and Legal Considerations”

The post Driverless Cars: Moral and Legal Considerations appeared first on Raju Alluri.

Driverless Cars: Moral and Legal Considerations

Driverless cars are no longer a fantasy. Despite being far from general purpose use, this technology is evolving leaps and bounds, thanks to players like Google and Tesla making steady progress on this technology. As the technology evolves and enters into public life, several legal and moral issues are going to crop up. The recent … Continue reading Driverless Cars: Moral and Legal Considerations

The post Driverless Cars: Moral and Legal Considerations appeared first on Raju Alluri.

Availability is a fundamental requirement of Security

When people talk about security, they often picture confidentiality and integrity in their mind. However, the role of availability is equally important while defining the security. In fact, the term security is defined as a combination of confidentiality, integrity and availability by major standards and certifications. There is a quote on a lighter tone in … Continue reading Availability is a fundamental requirement of Security

The post Availability is a fundamental requirement of Security appeared first on Raju Alluri.