Modernize your data infrastructure with fully managed, purpose-built databases Choose the right purpose-built engine. Use case-driven, highly scalable, distributed applications suited to your specific needs. AWS offers 15+ purpose-built engines to support diverse data models, including relational, key-value, document, in-memory, graph, time series, wide column, and ledger databases. Achieve performance […]
Devamını Oku
SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and is used for hashing data and certificates. A hashing algorithm shortens the input data into a more diminutive form that cannot be understood using bitwise operations, modular additions, and compression functions. You may be wondering, can […]
Devamını Oku
AWS Kinesis Amazon Kinesis is a fully managed service that Amazon Web Services (AWS) provides for real-time processing and analyzing streaming data. It enables you to collect, process, and analyze large volumes of streaming data in real-time from various sources such as social media, logs, IoT devices, and clickstreams. Amazon […]
Devamını Oku
AWS Elastic File System (EFS) is a fully managed, scalable, and highly available file storage service that Amazon Web Services (AWS) provides. EFS allows you to create and manage file systems that can be accessed by multiple Amazon Elastic Compute Cloud (EC2) instances simultaneously, providing shared file storage for your […]
Devamını Oku
When it comes to securing your AWS environment, there are several options available to you. One such option is AWS Shield, a managed Distributed Denial of Service (DDoS) protection service offered by Amazon Web Services (AWS). We will explore what AWS Shield is, why it is used, and the competitors […]
Devamını Oku
How to Choose the Right Message Broker for Your Application If you are developing a distributed application that relies on asynchronous communication between its components, you might need a message broker to handle the data flow. A message broker is a software module that acts as an intermediary between different […]
Devamını Oku
Easily create and control the keys to encrypt or digitally sign your data. AWS Key Management Service (KMS) makes it easy to create and manage cryptographic keys and control their use across a wide range of AWS services and your applications. AWS KMS is a secure and resilient service that […]
Devamını Oku
What is a digital signature? This walkthrough demonstrates how to create a private key, public key, digitally sign a document, and verify. A digital signature and signing are critical concepts in cryptography and information security. Digital Signature: Signing (in Cryptography): Advantages of Digital Signatures: In the digital world, digital signatures […]
Devamını Oku
For some projects , I am using Bouncy Castle’s libraries. I am sharing information about Bouncy Castle . The Bouncy Castle APIs currently consist of the following: www.bouncycastle.org
Devamını Oku
How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? Asymmetric encryption, also known as public-key cryptography, is a cryptographic system that uses a pair of related keys: public and private. The public key can encrypt data, but […]
Devamını Oku