Cyber-SecurityThe technique of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as…Jul 16Jul 16
Artificial Intelligence in OCROptical Character Recognition processes the data from images or text (physical documents) and converts that text into machine-readable…Jul 15Jul 15
Bypassing the S3 origin via Origin Access ControlCreated one bucket and uploaded the HTML file.Mar 21Mar 21
Attach Load Balancer to multiple servers in Linux EC2See the article click here, how to create the web page in AWS EC2 Linux. Here we are going to see, how to attach the load balancer to the…Mar 17Mar 17
How to create a web page in Linux ec2 by copying content from S3In this article, we will be going to discuss how to create the web page in the Linux ec2 instance by copying the files from the s3 bucket.Mar 17Mar 17
Run python program in AWS ec2 Linux using instance connectThis article shows how to write and execute the Python program in an AWS EC2 Linux instance using Instance Connect.Mar 3Mar 3
Python program in AWS EC2 Windows instanceIn this blog, we see how to install the python application and write and execute the python program in AWS EC2 windows instance.Mar 1Mar 1
Azure Load BalancerNormally, Load Balancer is used to distribute incoming network traffic across multiple servers to improve application performance…Jan 28Jan 28