<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Gbemisola Esho</title>
    <description>The latest articles on Forem by Gbemisola Esho (@apinke).</description>
    <link>https://forem.com/apinke</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F789959%2F48c62081-a7f3-48b0-92e3-0c3781831886.jpeg</url>
      <title>Forem: Gbemisola Esho</title>
      <link>https://forem.com/apinke</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/apinke"/>
    <language>en</language>
    <item>
      <title>Harnessing Google’s AI for a Sustainable Future: From Data to Action</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Sat, 14 Feb 2026 03:44:13 +0000</pubDate>
      <link>https://forem.com/gde/harnessing-googles-ai-for-a-sustainable-future-from-data-to-action-1ci2</link>
      <guid>https://forem.com/gde/harnessing-googles-ai-for-a-sustainable-future-from-data-to-action-1ci2</guid>
      <description>&lt;p&gt;&lt;strong&gt;The intersection of technology and environmental stewardship&lt;/strong&gt; is no longer a futuristic concept, it is a present-day necessity. As a GDE and investigative researcher, I have always looked for tools that bridge the gap between complex data and actionable policy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Yale GDG on Campus series&lt;/strong&gt; provided a deep dive into a powerful ecosystem that allows us to monitor, model, and communicate environmental challenges with unprecedented precision.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Sustainability Trinity:&lt;/strong&gt; Earth Engine, Vertex AI, Gemini and &lt;strong&gt;more&lt;/strong&gt;&lt;br&gt;
To achieve true environmental accountability, we need a workflow that moves from observation to intelligence.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhsmmlscw4wqkfidrxx86.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhsmmlscw4wqkfidrxx86.png" alt=" " width="800" height="445"&gt;&lt;/a&gt;© Nadia B Ahmad&lt;/p&gt;

&lt;h2&gt;
  
  
  Google Earth Engine
&lt;/h2&gt;

&lt;p&gt;: Our Planetary Dashboard&lt;br&gt;
Earth Engine serves as the ultimate tool for environmental OSINT (Open Source Intelligence). It allows us to monitor the “Right to a Healthy Environment” by analyzing decades of satellite imagery. Whether we are tracking deforestation in the Sahel or urban heat islands in Lagos, Earth Engine provides the empirical evidence needed to verify corporate sustainability claims and fight “greenwashing.”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpizauthlir314jxa8ljy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpizauthlir314jxa8ljy.png" alt="Image of Earth Engine" width="800" height="434"&gt;&lt;/a&gt;© Nadia B Ahmad&lt;/p&gt;

&lt;h2&gt;
  
  
  Vertex AI
&lt;/h2&gt;

&lt;p&gt;: Engineering the Solutions&lt;br&gt;
While Earth Engine gives us the data, Vertex AI allows us to build the solutions. As a Professional Security Engineer, I see Vertex AI as the bedrock for training custom machine learning models that can predict energy consumption or simulate climate risks. It allows us to create inclusive tools that are “secure by design,” ensuring that climate data remains protected while being accessible for impactful decision-making.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7jiqm0hduu9n12bhk8ix.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7jiqm0hduu9n12bhk8ix.png" alt="Image of Vertex AI" width="800" height="443"&gt;&lt;/a&gt;© Nadia B Ahmad&lt;/p&gt;

&lt;h2&gt;
  
  
  Gemini
&lt;/h2&gt;

&lt;p&gt;: The Bridge to Human Understanding&lt;br&gt;
The greatest barrier to climate action is often the complexity of the data. Gemini changes this by acting as a multimodal translator with advanced reasoning. I can explore how Gemini can take complex geospatial reports and localize them into languages like Yoruba, Hausa, or Igbo — making climate literacy a reality for everyone.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fisacrtikl2auh721ijvh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fisacrtikl2auh721ijvh.png" alt="Image of Gemini" width="800" height="411"&gt;&lt;/a&gt;©Nadia B Ahmad&lt;/p&gt;

&lt;h2&gt;
  
  
  Google Maps
&lt;/h2&gt;

&lt;p&gt;: The Interface for Real-World Action&lt;br&gt;
Google Maps has evolved from a navigation tool into a “digital powerhouse” for environmental awareness and city planning.&lt;/p&gt;

&lt;p&gt;Project Green Light: Uses AI and Google Maps driving trends to model traffic patterns and optimize traffic lights. This can reduce stops at intersections by up to 30% and emissions by over 10%.&lt;br&gt;
Fuel-Efficient Routing: Suggests routes that take a similar amount of time but have fewer hills and less traffic, which enabled an estimated 2.7 million metric tons of GHG emissions reductions in 2024 alone.&lt;br&gt;
Environment APIs: New tools like the Solar API (mapping solar potential for 320 million+ buildings) and the Air Quality API (tracking pollutants in 100+ countries) empower businesses and citizens to make healthier, greener choices.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp2ybfbyqvgjuymmdx8p8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp2ybfbyqvgjuymmdx8p8.png" alt="Image of Google Maps" width="800" height="450"&gt;&lt;/a&gt;© Nadia B Ahmad&lt;/p&gt;

&lt;h2&gt;
  
  
  Google Colab
&lt;/h2&gt;

&lt;p&gt;: The Scientific Engine for Analysis&lt;br&gt;
Google Colab is a zero-configuration, cloud-based platform that allows you to write and execute Python code directly in your browser, with free access to powerful GPUs and TPUs.&lt;/p&gt;

&lt;p&gt;Geospatial Processing: Colab integrates seamlessly with Google Earth Engine and BigQuery, allowing researchers to process petabytes of satellite imagery without needing local high-end hardware.&lt;br&gt;
AI Model Training: It is used extensively to develop and train machine learning models for sustainability, such as predicting deforestation risk or mapping species distributions.&lt;br&gt;
Interactive Storytelling: Researchers use Colab to create interactive notebooks that combine live code with visualizations (like heatmaps of urban heat islands), making it an ideal tool for investigative journalists to “ground” their environmental reports in reproducible data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhc2ekp9b054poxokgh3w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhc2ekp9b054poxokgh3w.png" alt="Image of Google Colabs" width="800" height="442"&gt;&lt;/a&gt;© Nadia B Ahmad&lt;/p&gt;

</description>
      <category>sustainability</category>
      <category>gemini</category>
      <category>vertexai</category>
      <category>builwithai</category>
    </item>
    <item>
      <title>The Portfolio Challenge by Google AI</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Sat, 07 Feb 2026 13:00:49 +0000</pubDate>
      <link>https://forem.com/gde/the-portfolio-challenge-by-google-ai-47gh</link>
      <guid>https://forem.com/gde/the-portfolio-challenge-by-google-ai-47gh</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the [New Year, New You Portfolio Challenge Presented by Google AI] Not really!(&lt;a href="https://dev.to/challenges/new-year-new-you-google-ai-2025-12-31"&gt;https://dev.to/challenges/new-year-new-you-google-ai-2025-12-31&lt;/a&gt;)&lt;/em&gt;&lt;br&gt;
The Portfolio Challenge has come and gone but I still have this write up which well, I forgot to submit.&lt;br&gt;
I followed the format for submission, I hope you enjoy it and learn from it.&lt;br&gt;
Happy reading!&lt;/p&gt;

&lt;h2&gt;
  
  
  About Me
&lt;/h2&gt;

&lt;p&gt;Gbemisola Esho is a multidisciplinary technology leader operating at the critical intersection of cloud security, artificial intelligence, and digital inclusion. With a career that spans technical infrastructure and investigative journalism, she brings a dual perspective to the global dialogue on AI: how to build secure, scalable systems, and how to ensure they serve the public interest in emerging economies.&lt;/p&gt;

&lt;p&gt;As a cybersecurity practitioner, Gbemisola specializes in securing cloud architectures against complex threats. She is a recognized voice in the developer ecosystem, recently speaking at DevFest Kigali 2025 at Carnegie Mellon University Africa on "Bot Management with Google Cloud Armor and reCAPTCHA." &lt;br&gt;
She is the Founder and Lead of Connectobridge, an initiative dedicated to closing the digital skills gap for women, youth, and underrepresented communities. Through this platform, she champions AI literacy and online safety, aligning her advocacy with the United Nations Sustainable Development Goals. As a journalist trained in the Pulitzer AI Spotlight Reporting program, she also wields the investigative skills to interrogate AI systems for bias, transparency, and accountability, challenging hype-driven narratives with evidence-based reporting.&lt;/p&gt;

&lt;h2&gt;
  
  
  Portfolio
&lt;/h2&gt;

&lt;p&gt;This is the link to my portfolio with some projects and deployed on Cloud Run&lt;br&gt;
{&lt;a href="https://gbemisolaportfolio-627390562920.us-west1.run.app/" rel="noopener noreferrer"&gt;https://gbemisolaportfolio-627390562920.us-west1.run.app/&lt;/a&gt;}&lt;/p&gt;

&lt;h2&gt;
  
  
  How I Built It
&lt;/h2&gt;

&lt;p&gt;Gbemisola's Portfolio: Creation &amp;amp; Deployment Process&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Technical Stack &amp;amp; Development
Frontend Architecture: Built using React 19 with TypeScript for type safety. The UI is crafted with Tailwind CSS, utilizing a "glassmorphism" aesthetic to reflect a modern, high-tech security vibe.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;AI Integration: The "Resume Agent" uses the Gemini 3 Flash model. It's configured with a specific system instruction that defines your professional persona, project history, and technical expertise.&lt;/p&gt;

&lt;p&gt;Security Features: The app implements a secure API key management flow. It uses the window.aistudio interface to let users provide their own keys, ensuring no sensitive credentials are hardcoded or stored on the server.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Containerization (Docker)
To ensure the app runs identically in any environment, we use Docker.
Base Image: A lightweight Nginx Alpine image.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Configuration: The Dockerfile copies the static assets (HTML, TSX, CSS) and configures Nginx to serve them. Crucially, it includes a template for nginx.conf that listens on the $PORT environment variable, which is a requirement for Google Cloud Run.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Automated CI/CD (Google Cloud Build)
The deployment is fully automated using a cloudbuild.yaml pipeline:
Step 1 (Build): When you push code, Cloud Build triggers a docker build, tagging the image with the specific Git commit SHA for version control.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Step 2 (Push): The built image is pushed to Google Container Registry (GCR).&lt;/p&gt;

&lt;p&gt;Step 3 (Deploy): Cloud Build tells Google Cloud Run to pull the new image and update the service.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Serverless Hosting (Google Cloud Run)
We chose Cloud Run for deployment because:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Zero-Scale: It scales to zero instances when there's no traffic, making it practically free for a personal portfolio.&lt;/p&gt;

&lt;p&gt;Concurrency: It can handle multiple simultaneous requests efficiently.&lt;/p&gt;

&lt;p&gt;Security: It provides an isolated, managed environment with automatic HTTPS and built-in protection against common infrastructure threats.&lt;/p&gt;

&lt;p&gt;What I'm Most Proud Of&lt;br&gt;
The Evolution from Static to Intelligent:&lt;br&gt;
Most portfolios are digital paper. With Google AI studio I  built a living technical agent integrating Gemini 3 Flash, I demonstrated how Generative AI can be used not just for "chat," but as a professional proxy that understands context, projects, and your professional persona.&lt;/p&gt;

&lt;p&gt;Architectural Sophistication (Cloud-Native):&lt;br&gt;
This isn't just hosted on a simple web provider, It is a production-grade pipeline that uses:&lt;br&gt;
Dockerization for immutable deployments.&lt;br&gt;
Google Cloud Run for serverless, cost-effective scaling.&lt;br&gt;
Cloud Build CI/CD for automated security-focused delivery&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiexcu4e78o3bojcpnxx0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiexcu4e78o3bojcpnxx0.png" alt="A screenshoot of Gbemisola's Portfolio describing her .it also has feature buttons for skill,experience,projects,comtact me and chatbot"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NB:Most of what is in the portfolio is true but the actual projects disguised.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foc1njf94k0j793nxi52x.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foc1njf94k0j793nxi52x.gif" alt="A gif the image of a cat typing"&gt;&lt;/a&gt;&lt;br&gt;
The Portfolio challenge was used to demonstrate the power of Gemini, AI Studio and Cloud Run Google technologies demonstrating how these technologies can make your projects come alive.&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>googleaichallenge</category>
      <category>portfolio</category>
      <category>gemini</category>
    </item>
    <item>
      <title>From Zero to Global: A Complete AI Video Workflow Using Google Cloud &amp; Gemini</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Sun, 18 Jan 2026 08:58:08 +0000</pubDate>
      <link>https://forem.com/gde/from-zero-to-global-a-complete-ai-video-workflow-using-google-cloud-gemini-j3k</link>
      <guid>https://forem.com/gde/from-zero-to-global-a-complete-ai-video-workflow-using-google-cloud-gemini-j3k</guid>
      <description>&lt;p&gt;Content is king, but context is queen. In a country as diverse as Nigeria, creating digital content is only half the battle. The real challenge and opportunity lies in making that content accessible to everyone, whether they speak Yoruba, Hausa, or Igbo.&lt;/p&gt;

&lt;p&gt;I recently explored the power of Google Vertex AI Studio to create a short film. I used cutting-edge tools like Google Veo and Imagen (via the “Nano Banana” MCP server) to generate stunning visuals. But I didn’t want to stop at just great visuals. I wanted to ensure the message could resonate across Nigeria’s linguistic landscape.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ywbzflaybq2nmoes99y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ywbzflaybq2nmoes99y.png" alt=" " width="800" height="374"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;                Vertex AI Studio
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Here is the step-by-step technical workflow I discovered for localizing AI-generated video content using the Google Cloud ecosystem.&lt;br&gt;
The Visual Foundation&lt;br&gt;
First, the video itself was created using Vertex AI Studio. By leveraging generative video models like Veo, I was able to turn text prompts into high-quality video clips. This formed the visual base of the project.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbps4xxt8s5cq2o666xmc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbps4xxt8s5cq2o666xmc.png" alt="Vertex AI Studio" width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Creating viuals and films in Google Flow&lt;/p&gt;

&lt;p&gt;But to take this video from a silent clip to a localized story, I needed a suite of Google Cloud APIs. Here is the architecture for localization.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzt4igfqp47ztrvqk7he8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzt4igfqp47ztrvqk7he8.png" alt="Sene creation in Flow by Giigle" width="800" height="352"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Prompting in Vertex AI Studio&lt;/p&gt;

&lt;p&gt;Step 1: Transcription (The Ear)&lt;br&gt;
Tool: Google Cloud Speech-to-Text API&lt;br&gt;
If your source video already has English audio (or any other language), the first step is extraction. You cannot translate what you haven't captured.&lt;br&gt;
The Speech-to-Text API listens to the audio track of the video and converts spoken words into a text transcript. It's highly accurate and serves as the foundation for the rest of the pipeline.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsuzvij2duele9m80sun8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsuzvij2duele9m80sun8.png" alt=" " width="800" height="304"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2: Translation (The Brain)&lt;br&gt;
Tool: Google Cloud Translation API&lt;br&gt;
Once I had the raw text, the next step was bridging the culture gap. I used the Cloud Translation API to convert the English transcript into Nigeria's major languages: Yoruba, Hausa, and Igbo.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffy1jnudaun5ux1v94h6u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffy1jnudaun5ux1v94h6u.png" alt=" " width="800" height="324"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Google has been actively expanding support for African languages, meaning the translations are becoming increasingly nuanced, handling idioms and context better than ever before.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1046kotvovm7itokmdkj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1046kotvovm7itokmdkj.png" alt=" " width="800" height="320"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3: Vocalization (The Voice)&lt;br&gt;
Tool: Google Cloud Text-to-Speech API&lt;br&gt;
This is where the magic happens. Reading subtitles is great, but hearing a message in your mother tongue is powerful.&lt;br&gt;
Using the Text-to-Speech API, I converted the translated Yoruba, Hausa, and Igbo scripts back into audio. This service synthesizes lifelike, neural speech. Instead of a robotic monotone, you get a voice-over that feels natural and engaging, which can then be synced back to the original video.&lt;br&gt;
Step 4: Subtitling (The Eyes)&lt;br&gt;
Tool: Google Cloud Transcoder API&lt;br&gt;
For accessibility (and for those watching on mute), subtitles are non-negotiable.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftnjvgt56zurlhvpr0wrh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftnjvgt56zurlhvpr0wrh.png" alt=" " width="800" height="448"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Using the same translated text from Step 2, the Transcoder API allows you to burn captions directly into the video file or generate sidecar files (like .SRT). This ensures that even if the audio isn't played, the message is readable in the user's local language.&lt;br&gt;
Why This Matters for African Tech&lt;br&gt;
While Vertex AI handles the heavy lifting of creative generation (building the world, the characters, and the movement), these specialized APIs are the bridge to the user.&lt;br&gt;
For independent media houses, creators, and developers in Africa, this stack represents a massive opportunity. We can now build:&lt;br&gt;
Educational content that scales to every region.&lt;br&gt;
News broadcasts that automatically generate local versions.&lt;br&gt;
Entertainment that feels homegrown, regardless of where it was produced.&lt;br&gt;
The tools are there. It is up to us to build the pipelines.&lt;/p&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/LW8P2OLpOs4"&gt;
  &lt;/iframe&gt;
 &lt;/p&gt;

&lt;p&gt;Did you find this workflow helpful? Follow me for more insights on building with Google Cloud and Vertex AI.&lt;/p&gt;

&lt;h1&gt;
  
  
  GoogleCloud #VertexAI #GenAI #Localization #AfricanTech
&lt;/h1&gt;

</description>
      <category>ai</category>
      <category>gemini</category>
      <category>google</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Cyber resilience in applications on AWS-Using AWS Security Hub.</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Sat, 30 Dec 2023 14:59:38 +0000</pubDate>
      <link>https://forem.com/aws-builders/cyber-resilience-in-applications-on-aws-using-aws-security-hub-361g</link>
      <guid>https://forem.com/aws-builders/cyber-resilience-in-applications-on-aws-using-aws-security-hub-361g</guid>
      <description>&lt;p&gt;With the rise of digital, the interconnectivity of the world is unquestionable and cyberspace is the world that was born, making the saying “The world is now a village” My words are “The world is now an interconnected village”.&lt;/p&gt;

&lt;p&gt;As we are in the era of “digital everything” the need for cyber resilience has increased, paving the way to sustainable development and growth in the cybersecurity landscape.&lt;/p&gt;

&lt;p&gt;A synergy between public and private sector stakeholders will help to find solutions. The late UN scribe Mr Kofi Annan said “There is no development with security and no security without development”&lt;/p&gt;

&lt;p&gt;Solutions to problems of increase in cybertheft and data breaches lead only to the place of capacity building so cyber professionals are well equipped to identify, contain, and stop attacks that occur in cyberspace.&lt;/p&gt;

&lt;p&gt;What is Cyber resilience?&lt;br&gt;
This is the ability of an organisation to prevent withstand and recover from cyber-attacks.&lt;/p&gt;

&lt;p&gt;Cyber resilience goes beyond preventing cyber attacks and has a proactive approach to cybersecurity. It anticipates that it still needs to detect and respond with minimal damage occurring as it recovers from attacks.&lt;/p&gt;

&lt;p&gt;Components of Cyber resilience&lt;br&gt;
Risk Assessment: It is important to take stock of the assets of your organisation, their value, and the potential vulnerability to know the cyber threat severity and impact&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafcticazuvr1x6m0hb3d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafcticazuvr1x6m0hb3d.png" alt=" " width="270" height="148"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Prevention: Best security practices will be without fail help with prevention some examples include setting up firewalls, anti-virus, and security awareness training.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9ze6fy90vxzmc33a5b7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9ze6fy90vxzmc33a5b7.png" alt=" " width="239" height="211"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Detection: Intrusion detection systems, security information, event management systems, and monitoring tools should be addressed.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh6gjsuizf6wukusl7giz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh6gjsuizf6wukusl7giz.png" alt=" " width="267" height="189"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Response: A well-defined and drafted plan should always be in place and ready to be activated.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa8amdvryfvj5nkn1nxs8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa8amdvryfvj5nkn1nxs8.png" alt=" " width="228" height="221"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Recovery: The ability of an organisation to recover from a breach or an attack and return to normalcy as quickly as possible is very important to be resilient.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2qsckkof7ohly6tst9dt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2qsckkof7ohly6tst9dt.png" alt=" " width="246" height="204"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Adaptability: The ability to adjust to the fast pace of cyberspace and changing threats&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flxd1zw8gkupvvaiw5e3w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flxd1zw8gkupvvaiw5e3w.png" alt=" " width="308" height="163"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ensuring your applications are cyber-resilient is a continuous process you achieve this by ensuring best practices are followed and the right security posture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Posture in Cyber Resilience&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F88bkhp4eghi27kwcw55j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F88bkhp4eghi27kwcw55j.png" alt=" " width="375" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The security posture of an organisation is the organisation's overall cyber security readiness.&lt;br&gt;
In AWS cloud security posture is managed by the AWS Security Hub &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is the AWS Security Hub?&lt;/strong&gt;&lt;br&gt;
The AWS security hub is an AWS resource that has the following function&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automates Security best practices: Security best practices in AWS are linked to a Well-Architected Framework which helps in making decisions on how to deploy our workload bearing in mind the need for secure deployments in the Cloud.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Aggregate security alerts into a single place and format&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Helps in understanding your overall security posture across all of your AWS accounts.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Security Best Practises in AWS&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html" rel="noopener noreferrer"&gt;security pillar in the Well-Architected Framework&lt;/a&gt; emphasizes the advantage of cloud technologies by describing how to protect data, systems, and assets in a way that can improve your security posture.&lt;/p&gt;

&lt;p&gt;There are several principles associated with this like&lt;br&gt;
&lt;em&gt;Implement a strong identity foundation&lt;/em&gt;:  This requires implementing the principle of least privilege and enforcing separation of duties with appropriate authorization for each interaction with your AWS resources. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Maintain traceability&lt;/em&gt;: Logging and monitoring are key factors in maintaining traceability. The need for alerts and audits is critical as well.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Apply security at all layers&lt;/em&gt;: Defense-in-depth approach is applied with multiple security controls. Applied to all layers from networking, load balancing, operating systems, and application layers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Automate security best practices&lt;/em&gt;: To securely scale more rapidly and cost-effectively, using automated software-based security mechanisms enhances your ability.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Protect data in transit and at rest&lt;/em&gt;: Encryption and classification of data into sensitivity levels is a best practice as well as the use of tokenization, and access control as well.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Data Restriction and Control&lt;/em&gt;: Reduce or eliminate the need for direct access or manual processing of data. This reduces the risk of mishandling or modification and human error when handling sensitive data.&lt;/p&gt;

&lt;p&gt;_Security events readiness: Incident readiness is a priority with the robust incident management and investigation policy and processes that align with your organizational requirements.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The security Hub centrally manages security alerts&lt;/strong&gt;&lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/K7V5kNBjGCI"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it works&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyo962pk51k1seky259z5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyo962pk51k1seky259z5.png" alt=" " width="800" height="360"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The security Hub Centre is a central security tool that is used to manage the security across several AWS accounts and automate security checks.&lt;/p&gt;

&lt;p&gt;It has an integrated dashboard that displays the security and compliance status that helps in decision-making and taking action.&lt;/p&gt;

&lt;p&gt;The AWS Security Hub aggregates alerts across different services  like  AWS Config, AWS GuardDuty, AWS Macie, IAM Aces Analyzer, AWS Systems Manager, AWS Firewall, AWS Health &lt;/p&gt;

&lt;p&gt;AWS Config service is enabled for the Security Hub to work, looking at the diagram we can see that the Security Hub can cover multiple accounts at a time taking the findings from the AWS services mentioned finding out the potential issues and findings, and visualizing it on the dashboard.&lt;/p&gt;

&lt;p&gt;EventBridge generates an event and Amazon Dectective investigates the source of the threat.&lt;/p&gt;

&lt;p&gt;And finally, to investigate the source of these issues you can use Amazon Detective.&lt;/p&gt;

&lt;p&gt;To know more about AWS Security Hub like this &lt;a href="https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html" rel="noopener noreferrer"&gt;link &lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>cyberresilience</category>
      <category>cyberposture</category>
      <category>cyberthreat</category>
    </item>
    <item>
      <title>Introduction to Cloud I AM:Can I come in? Access Control in Google Cloud</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Tue, 22 Aug 2023 01:28:04 +0000</pubDate>
      <link>https://forem.com/apinke/introduction-to-cloud-i-amcan-i-come-in-access-control-in-google-cloud-31dj</link>
      <guid>https://forem.com/apinke/introduction-to-cloud-i-amcan-i-come-in-access-control-in-google-cloud-31dj</guid>
      <description>&lt;p&gt;In Google Cloud resources are arranged in a hierarchy with the organisation as the root node.To be able to access resources in Google Cloud you need identity access management in short called I AM.&lt;br&gt;
Cloud I AM is how you decide who can do what in Google Cloud resources.To navigate this Google Cloud provides policies, identities and roles.&lt;br&gt;
Lets get back to the hierarchy,every workload deployed in Google Cloud are organised as projects.The hierarchy flows from the organisation which is the root node to the folder and then the projects.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9joe96grikn19iq9mptv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9joe96grikn19iq9mptv.png" alt=" " width="586" height="778"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With I AM  you manage "who" that is the &lt;em&gt;identity&lt;/em&gt; does "what" access the &lt;em&gt;role&lt;/em&gt; to which resource..&lt;br&gt;
The organisation, folder and projects are used to organize your resources.&lt;br&gt;
I AM ensures that the resources are accessed by those authenticated to do so and not by all users, for a user to gain access you need to have a role.Authenticated users/members are called &lt;strong&gt;Principals&lt;/strong&gt;&lt;br&gt;
An I AM policy also called an "allow policy" defines what role or roles are given to the principals and enforce them as well.&lt;br&gt;
The I AM policies are attached to resources, if there are any attempts  to access this resource, the policy will check if the user/principal is allowed to do so.&lt;br&gt;
This is called &lt;strong&gt;Authorization&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authentication vs Authorization&lt;/strong&gt;&lt;br&gt;
Authentication verifies "who" it proves  who you say you are ,a &lt;strong&gt;principal&lt;/strong&gt;, while authorization determines "what" you have access to, that is to say you can do what you want to do the "who" (authenticated) the "what"(role).&lt;br&gt;
Authentication offers a general scope in security of your resources at a granular level whereas authentication is more fine-grained.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Credentials&lt;/strong&gt;&lt;br&gt;
Credentials are digital objects that provide prove  of authentication that you are really who you say you are.&lt;br&gt;
Examples of credentials include passwords,pins, and biometric data,a great example of this is logging into an email account with a password, and in trying to secure your account,you could protect it with a two-factor authentication in short 2FA.&lt;/p&gt;

</description>
      <category>cloudiam</category>
      <category>security</category>
      <category>roles</category>
      <category>access</category>
    </item>
    <item>
      <title>AWS and Cyber Insurance</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Fri, 23 Jun 2023 09:10:18 +0000</pubDate>
      <link>https://forem.com/aws-builders/aws-and-cyber-insurance-29kk</link>
      <guid>https://forem.com/aws-builders/aws-and-cyber-insurance-29kk</guid>
      <description>&lt;p&gt;Data breaches have been on the rise, this is because data is the new currency. The growth and the spread of  the internet in establishing "digital "have moved most businesses online this development has changed how data is managed.&lt;br&gt;
AWS have a number of services and tools ensuring security in the cloud to make sure that the triple A of any basic security infrastructure is preserved that is Authentication, authorization and accounting framework is in place.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5cqqnzuuie7g2wfmmvbv.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5cqqnzuuie7g2wfmmvbv.gif" alt=" " width="500" height="500"&gt;&lt;/a&gt;Triple A&lt;/p&gt;

&lt;p&gt;Bearing that in mind, AWS help customers harden their infrastructure preventing cyber incidences by mitigating threats and compromises through detection with &lt;a href="https://aws.amazon.com/guardduty/" rel="noopener noreferrer"&gt;Amazon Guard Duty&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwfgs5ehucwqyxia19opw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwfgs5ehucwqyxia19opw.png" alt="Visualisation of Amazon Guard Duty" width="750" height="458"&gt;&lt;/a&gt;Amazon Guard Duty.&lt;/p&gt;

&lt;p&gt;Amazon Guard Duty protects by using intelligent threat detection, continuously monitoring malicious behaviour in your aws account and workloads.&lt;br&gt;
AWS have taken security a notch higher by  launching AWS Cyber insurance programme  helping to link AWS partners with cyber security insurance otherwise know as "cyber insurance" and is foremost in this thrust, AWS shows its commitment to securing everything in the cloud and well as helping its partners  improve their security posture by getting insurance at the snap of the finger.&lt;br&gt;
AWS through its partner networks lead by Ryan Orsi who at AWS re:inforce said" AWS focuses on all partners in the security landscape the whole spectrum from Professional Services to the large conglomerates in helping to make security easier &lt;br&gt;
Ryan Orsi, the head of AWS worldwide head of cloud foundations for the AWS Partner Network describes this as "A defining moment for here at AWS and our partners" this was unveiled at AWS reinforce 2023.&lt;/p&gt;

&lt;p&gt;The AWS Cyber Insurance programme offering  helps to take the stress of a lot paperwork and processes minimizing time and days spent in getting a quote.&lt;br&gt;
AWS Cyber insurance Programme gives the assurance of getting a quote in 2 days or less helping to keep insurance premium down and these are all hinged on AWS Security Hub.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhmjlh9nvvd387m6p27bt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhmjlh9nvvd387m6p27bt.png" alt="Visualisation of Amazon Security Hub" width="800" height="360"&gt;&lt;/a&gt;Amazon Security Hub&lt;br&gt;
Amazon Security Hub a cloud security posture management service that performs security best practice checks, aggregates alerts, and enables automated remediation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F47r6wszl91h7ctfxnuu6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F47r6wszl91h7ctfxnuu6.png" alt="Amazon security hub flow process in the AWS Cyber insurance programme" width="800" height="600"&gt;&lt;/a&gt;&lt;br&gt;
The programme is open to all enterprises from small to giant and AWS channel partners can choose any insurance dealer that is a designate of the programme whether they individual insurers,brokers or insurance companies, as AWS helps in the facilitate the relationship between their partners and the insurance company.&lt;br&gt;
The AWS partner network create programmes to help the customers understand the best practices in AWS environment and the experts who help out the partners have technical checklist to assist every customer.&lt;br&gt;
To know more about the AWS Cyber Insurance Programme visit the &lt;a href="https://aws.amazon.com/partners/" rel="noopener noreferrer"&gt;AWS Partners Network&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Culled from CRN &lt;/p&gt;

</description>
      <category>aws</category>
      <category>cybersecurity</category>
      <category>cyberinsurance</category>
      <category>security</category>
    </item>
    <item>
      <title>What is the AWS Builder Programme all about?</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Tue, 10 Jan 2023 12:36:45 +0000</pubDate>
      <link>https://forem.com/aws-builders/what-is-the-aws-builder-programme-all-about-5hmo</link>
      <guid>https://forem.com/aws-builders/what-is-the-aws-builder-programme-all-about-5hmo</guid>
      <description>&lt;p&gt;This is a programme that offers growth and networking opportunities to AWS enthusiasts .&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe7y6oj8xc4vp57w68e11.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe7y6oj8xc4vp57w68e11.png" alt="A picture of the AWS Builders banner" width="800" height="418"&gt;&lt;/a&gt;&lt;br&gt;
Do you love teaching, writing and sharing about technology? The Builders programme is the right place for you.&lt;br&gt;
You will have access to resources like human resource and materials to grow in your career and you would be  part of an &lt;strong&gt;elite set of people&lt;/strong&gt; privy to AWS products and services before they are launched in the public.&lt;/p&gt;

&lt;p&gt;That's not all! You have access to AWS staff, Product Managers and AWS Heros!&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb3f34qhts0xgv93b7qco.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb3f34qhts0xgv93b7qco.gif" alt=" " width="720" height="1080"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Guess what? That's not all, you say impossible right?&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwwxctqirqh8mee6hky2l.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwwxctqirqh8mee6hky2l.jpg" alt=" " width="225" height="225"&gt;&lt;/a&gt; You also get swags!!&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2opyj8o1d82lndaigkr5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2opyj8o1d82lndaigkr5.jpg" alt=" " width="800" height="800"&gt;&lt;/a&gt;&lt;br&gt;
What are you waiting for? Apply &lt;a href="https://amazonmr.au1.qualtrics.com/jfe/form/SV_bJwBQXrT2LhBawS" rel="noopener noreferrer"&gt;here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To know more about the programme visit this &lt;a href="https://aws.amazon.com/developer/community/community-builders/" rel="noopener noreferrer"&gt;website&lt;/a&gt;&lt;/p&gt;

</description>
      <category>discuss</category>
      <category>productivity</category>
      <category>ui</category>
      <category>learning</category>
    </item>
    <item>
      <title>Deploying Wordpress on Aws Lightsail and enabling HTTPS.</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Wed, 07 Dec 2022 20:33:01 +0000</pubDate>
      <link>https://forem.com/aws-builders/deploying-wordpress-on-aws-lightsail-and-enabling-https-4ij</link>
      <guid>https://forem.com/aws-builders/deploying-wordpress-on-aws-lightsail-and-enabling-https-4ij</guid>
      <description>&lt;p&gt;Lightsail is a powerful virtual server and one of the easiest way to launch and deploy your web apps and websites.&lt;br&gt;
This saves you from building a site from the scratch at the snap of your fingers because as developers time is critical.&lt;br&gt;
You can deploy wordpress in Lightsailand authenticate with the following steps.&lt;br&gt;
 Log into the lightsail console and create an instance&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7pxrb9nw9z3cob13vk85.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7pxrb9nw9z3cob13vk85.PNG" alt=" " width="792" height="348"&gt;&lt;/a&gt;&lt;br&gt;
 Choose your prefered instance and image and blue print,select your instance location and your availability zone&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc1ytfr4mk9eo9ky9r6j3.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc1ytfr4mk9eo9ky9r6j3.PNG" alt=" " width="770" height="368"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Go on to choose the plan you want and can afford&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuxqsfcailore0nwakzf0.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuxqsfcailore0nwakzf0.PNG" alt=" " width="785" height="372"&gt;&lt;/a&gt;&lt;br&gt;
Go ahead and create your wordpress blue print deployed on lightsail instance&lt;br&gt;
The next step is to connect to you instance through the SSH so you can get the Wordpress password&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flz8uucue6w1pd2e1klvk.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flz8uucue6w1pd2e1klvk.PNG" alt=" " width="789" height="339"&gt;&lt;/a&gt;&lt;br&gt;
It results to this SSH  session where you run the &lt;br&gt;
cat $HOME/bitnami_application_password&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5e5newyth8rcm4yfnnlh.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5e5newyth8rcm4yfnnlh.PNG" alt=" " width="774" height="395"&gt;&lt;/a&gt;&lt;br&gt;
This retrieves the application password and you sign into wordpress by using the public IP address going to the browser using this url &lt;a href="http://PublicIpAddress/wp-login.php" rel="noopener noreferrer"&gt;http://PublicIpAddress/wp-login.php&lt;/a&gt; replacing "PublicIpAddress" with the public address IP of the instance&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4lma5afle4dp1omd0ju.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4lma5afle4dp1omd0ju.jpg" alt=" " width="789" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You go ahead to sign in to your wordpress site.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9aczwupe6v8a82rgkb9q.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9aczwupe6v8a82rgkb9q.PNG" alt=" " width="770" height="339"&gt;&lt;/a&gt;&lt;br&gt;
There you are! signed into your administration dashboard of your wordpress website.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbh74qnnngl779itlpt1h.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbh74qnnngl779itlpt1h.PNG" alt=" " width="768" height="355"&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
You need to attach a permanent IP address which is the static IP address because the public IP changes when you start and stop the instance then you connect the static IP to the instance.You find this under networking,name it then create.&lt;/p&gt;

&lt;p&gt;Go ahead to create your DNS ZONE this is also found under networking to and map a domain to the lightsail instance.To deloy checkout the tutorial &lt;a href="https://dev.tourl"&gt;https://aws.amazon.com/getting-started/hands-on/launch-a-wordpress-website/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Websites security gains the trust of users and you can achieve this by enabling Hyper text Protocol Secure (HTTPS) on your WordPress site .The assurance of encrypted data transfer on the website is gives the assurance of security.&lt;br&gt;
 The Bitnami HTTPS configuration tool (bncert) is used enable HTTPS on your Certified by Bitnami WordPress instance on Amazon Lightsail. &lt;br&gt;
The tool requests certificates only for the domains and subdomains that  specified when making your requests&lt;br&gt;
To enable the tool ,you will connect to the instance via SSH and it opens when you are successfully connected&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvz5gqg0z84qoe9sz0i8a.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvz5gqg0z84qoe9sz0i8a.PNG" alt=" " width="774" height="395"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Enter the following command to run the tool to ascertain it is installed &lt;br&gt;
sudo /opt/bitnami/bncert-tool this is the output&lt;/p&gt;

&lt;p&gt;If it informs about an updated version,accept download then re-run the command again.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8kv8hzkvco4csv5kfj35.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8kv8hzkvco4csv5kfj35.jpg" alt=" " width="588" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It will proceed further asking you to enter your primary domain name and alternate domain names separated by a space as shown.It would also ask how you want your website to be redirected.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjtvutkampvg6cef2tnjw.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjtvutkampvg6cef2tnjw.PNG" alt=" " width="584" height="372"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Answer with a yes and continue&lt;br&gt;
This was the website before it was encrypted&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpfz96iygrodhzo75p9dv.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpfz96iygrodhzo75p9dv.PNG" alt=" " width="724" height="398"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When bcert tool enabled encryption&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fot9zptdf63pqv012vm76.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fot9zptdf63pqv012vm76.PNG" alt=" " width="582" height="345"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The website after http has been added&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv8ijqmpnvmxzan81s6dn.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv8ijqmpnvmxzan81s6dn.PNG" alt=" " width="735" height="402"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>wordpress</category>
      <category>awslightsail</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Build,Host and Authenticate your fullstack react app with AWS Amplify in minutes.</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Sun, 04 Dec 2022 10:13:36 +0000</pubDate>
      <link>https://forem.com/aws-builders/buildhost-and-authenticate-your-fullstack-react-app-with-aws-amplify-in-minutes-1ckp</link>
      <guid>https://forem.com/aws-builders/buildhost-and-authenticate-your-fullstack-react-app-with-aws-amplify-in-minutes-1ckp</guid>
      <description>&lt;p&gt;Building a fullstack react app now really easy, AWS amplify has enabled the building ,hosting and deploying your app.&lt;br&gt;
It is a development resource that makes building fast on AWS&lt;br&gt;
It creates a workflow from Git-hub using a continuous integration and deployment pipeline.&lt;br&gt;
The resource builds,hosts basic and static websites with serverless backends.&lt;/p&gt;

&lt;p&gt;The first step is to create the app by running the following commands in the command prompton in the terminal:&lt;/p&gt;

&lt;p&gt;npx create-react-app amplifyapp&lt;br&gt;
cd amplifyapp&lt;br&gt;
npm start&lt;br&gt;
For the commands to work, you must have nodejs on your machine then you run the scripts on your command prompt&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fotagze8zmblmttqt65i2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fotagze8zmblmttqt65i2.PNG" alt=" " width="559" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Initialize github and create a new repo for the app and push application to new git repo by running this commands.&lt;br&gt;
git remote add origin &lt;a href="mailto:git@github.com"&gt;git@github.com&lt;/a&gt;:username/reponame.git&lt;br&gt;
git branch -M main&lt;br&gt;
git push -u origin main&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F341lf4nls8kpe6mk8x54.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F341lf4nls8kpe6mk8x54.PNG" alt=" " width="554" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Log into the management console search for Amplify&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4g8lswh74wh2pgp68ixj.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4g8lswh74wh2pgp68ixj.PNG" alt=" " width="538" height="285"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Under Amplify hosting, go to get started&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjy6d4vr4nza04livt3hi.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjy6d4vr4nza04livt3hi.PNG" alt=" " width="666" height="356"&gt;&lt;/a&gt;&lt;br&gt;
Click Github repository then continue&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3p92rsko57gcij1fmpt3.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3p92rsko57gcij1fmpt3.PNG" alt=" " width="617" height="352"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Authenticate with Github and choose the newly created repo plus main branch and click next&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3br6ls2mz3bcd9c498r4.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3br6ls2mz3bcd9c498r4.PNG" alt=" " width="681" height="341"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Configure your build settings, save and deploy&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkdyobad1oue0cvb4i8nf.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkdyobad1oue0cvb4i8nf.PNG" alt=" " width="525" height="401"&gt;&lt;/a&gt;&lt;br&gt;
 Aws amplify goes ahead to build source code and deploys the app&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fusx2cilviawn4gm7vxij.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fusx2cilviawn4gm7vxij.PNG" alt=" " width="769" height="301"&gt;&lt;/a&gt;&lt;br&gt;
There sits your fullstack app in minutes once the build completes&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frx19u39inl53za5rw0nf.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frx19u39inl53za5rw0nf.PNG" alt=" " width="800" height="369"&gt;&lt;/a&gt;&lt;br&gt;
To automatically deploy code changes edit src/App.js , I prefer to it in Vscode&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkx94c32tomvm6q6hekz.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkx94c32tomvm6q6hekz.PNG" alt=" " width="800" height="561"&gt;&lt;/a&gt;&lt;br&gt;
Here is my &lt;a href="https://dev.tourl"&gt;https://main.doukipuj2x592.amplifyapp.com/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>wordpress</category>
    </item>
    <item>
      <title>Build,Host and Authenticate your fullstack react app with AWS Amplify in minutes 1.</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Sun, 04 Dec 2022 09:12:34 +0000</pubDate>
      <link>https://forem.com/aws-builders/buildhost-and-authenticate-your-fullstack-react-app-with-aws-amplify-in-minutes-4nj</link>
      <guid>https://forem.com/aws-builders/buildhost-and-authenticate-your-fullstack-react-app-with-aws-amplify-in-minutes-4nj</guid>
      <description>&lt;p&gt;Building a fullstack react app now really easy, AWS amplify has enabled the building ,hosting and deploying your app.&lt;br&gt;
It is a development resource that makes building fast on AWS&lt;br&gt;
It creates a workflow from Git-hub using a continuous integration and deployment pipeline.&lt;br&gt;
The resource builds,hosts basic and static websites with serverless backends.&lt;/p&gt;

&lt;p&gt;The first step is to create the app by running the following commands in the command prompton in the terminal:&lt;/p&gt;

&lt;p&gt;npx create-react-app amplifyapp&lt;br&gt;
cd amplifyapp&lt;br&gt;
npm start&lt;br&gt;
For the commands to work, you must have nodejs on your machine then you run the scripts on your command prompt&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fotagze8zmblmttqt65i2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fotagze8zmblmttqt65i2.PNG" alt=" " width="559" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Initialize github and create a new repo for the app and push application to new git repo by running this commands.&lt;br&gt;
git remote add origin &lt;a href="mailto:git@github.com"&gt;git@github.com&lt;/a&gt;:username/reponame.git&lt;br&gt;
git branch -M main&lt;br&gt;
git push -u origin main&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F341lf4nls8kpe6mk8x54.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F341lf4nls8kpe6mk8x54.PNG" alt=" " width="554" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Log into the management console search for Amplify&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4g8lswh74wh2pgp68ixj.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4g8lswh74wh2pgp68ixj.PNG" alt=" " width="538" height="285"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Under Amplify hosting, go to get started&lt;/p&gt;

&lt;p&gt;Click Github repository then continue&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3p92rsko57gcij1fmpt3.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3p92rsko57gcij1fmpt3.PNG" alt=" " width="617" height="352"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Authenticate with Github and choose the newly created repo plus main branch and click next&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3br6ls2mz3bcd9c498r4.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3br6ls2mz3bcd9c498r4.PNG" alt=" " width="681" height="341"&gt;&lt;/a&gt;&lt;br&gt;
Then you go right ahead to configure build setting, review&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyu9hil98840vnrk4wngz.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyu9hil98840vnrk4wngz.PNG" alt=" " width="525" height="401"&gt;&lt;/a&gt;&lt;br&gt;
Amplify goes ahead to build source code&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikhbr5pg1hdaiz07r5az.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikhbr5pg1hdaiz07r5az.PNG" alt=" " width="785" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb9as6o4qlwtu8k5tiok3.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb9as6o4qlwtu8k5tiok3.PNG" alt=" " width="769" height="301"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Your app is ready&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frcekq45rw3cvbkh111k0.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frcekq45rw3cvbkh111k0.PNG" alt=" " width="800" height="369"&gt;&lt;/a&gt;&lt;br&gt;
You can then automatically deploy code changes from src/app.js in a text editor like Visual studio&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffubjac7p2oairvwqmy1p.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffubjac7p2oairvwqmy1p.PNG" alt=" " width="800" height="561"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Push to github and run the following command in the terminal &lt;/p&gt;

&lt;p&gt;git add .&lt;br&gt;
git commit -m “changes for v2”&lt;br&gt;
git push origin main&lt;/p&gt;

&lt;p&gt;When the build completes view your app in the Amplify console&lt;br&gt;
&lt;a href="https://main.doukipuj2x592.amplifyapp.com/" rel="noopener noreferrer"&gt;https://main.doukipuj2x592.amplifyapp.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;First step is get an AWS free-tier account &lt;a href="https://www.googleadservices.com/pagead/aclk?sa=L&amp;amp;ai=DChcSEwiAqpjN3N_7AhULR5EFHZ6hB6kYABAAGgJscg&amp;amp;ohost=www.google.com&amp;amp;cid=CAESbOD2VZf0VHVqbZy7np0cAjGTqXuBQfc3ovSD0bw077xUkAVFwGQn6lHJOhokVzzYbXfhTQpfx4_4OOIn8u2u0dYH3NlWmeKRlJxLuWj-x_cp3bmyMxCVuQdT4GP2LOSfd9v5_pKYZtom3eJeYQ&amp;amp;sig=AOD64_0hg2qXMyJBSwQtz1MdM4ACJw1kBA&amp;amp;q&amp;amp;adurl&amp;amp;ved=2ahUKEwjq9o_N3N_7AhUfTKQEHR3EAE4Q0Qx6BAgIEAE" rel="noopener noreferrer"&gt;here &lt;/a&gt;&lt;/p&gt;

</description>
      <category>hosting</category>
      <category>react</category>
      <category>javascript</category>
      <category>webdev</category>
    </item>
    <item>
      <title>What Machine Learning can do in an Outbreak Pt 1</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Fri, 02 Sep 2022 15:08:39 +0000</pubDate>
      <link>https://forem.com/apinke/what-machine-learning-can-do-in-an-outbreak-pt-1-2mc4</link>
      <guid>https://forem.com/apinke/what-machine-learning-can-do-in-an-outbreak-pt-1-2mc4</guid>
      <description>&lt;p&gt;The World around is constantly seeking for attention,often times we never pay attention till defining moments occur.&lt;br&gt;
We live in critical times now,from disease outbreaks to public Health Emergency concerns,the need for decisive actions cannot be overemphasized.&lt;br&gt;
Experts need to curtail this outbreaks with accurate data and speed to curb the spread and eventually get figures to drop as the health concerns die out.&lt;br&gt;
Research and efficient service delivery is always prioritised as well as getting vaccines to curb the virus. &lt;br&gt;
AWS Machine learning resources are there, to help you make sense of it all, starting from the data collected and keeping at pace with innovation.&lt;br&gt;
AWS Service delivery pretty much covers it all,always conforming to the "Well Architected" framework  delivering reliability, security, and data privacy also. &lt;br&gt;
 AWS machine learning has empowered healthcare providers and the stakeholders in the ecosystem to improve and accelerate,  accelerating diagnosis while managing global health, enabling drug discovery, and using technology to update health infrastructure globally.&lt;br&gt;
Amazon healthlake has acted as an aggregator,of diverse data collected in healthcare and making sense of it by analysis, organizing in with modern architecture and performs advanced analytics.&lt;br&gt;
The actions of healthlake compound in helping with critical decisions made by health stakeholders in resource allocation and predictions made on patient health and mode of treatment.&lt;br&gt;
Machine learning draws out important data to make decisions on advancing science,drug discovering and health management.&lt;/p&gt;

&lt;p&gt;Healthlake flow of activity are as follows:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Import
2.Store
3.Transform
4.Query and Search
5.Analyze&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmgsf5b0a1i86edgfihs2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmgsf5b0a1i86edgfihs2.png" alt=" " width="641" height="287"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For more information visit &lt;a href="https://pages.awscloud.com/HealthContactSales.html?languages=english" rel="noopener noreferrer"&gt;https://pages.awscloud.com/HealthContactSales.html?languages=english&lt;/a&gt;&lt;/p&gt;

</description>
      <category>pandemic</category>
      <category>outbreak</category>
      <category>healthcare</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>Why you need AWS I AM Identity Centre.</title>
      <dc:creator>Gbemisola Esho</dc:creator>
      <pubDate>Thu, 25 Aug 2022 11:05:00 +0000</pubDate>
      <link>https://forem.com/apinke/why-you-need-aws-i-am-identity-centre-2d09</link>
      <guid>https://forem.com/apinke/why-you-need-aws-i-am-identity-centre-2d09</guid>
      <description>&lt;h2&gt;
  
  
  AWS I AM  identity centre
&lt;/h2&gt;

&lt;p&gt;formerly known as AWS SSO is a centralized, one stop centre where access is managed for AWS accounts and application.&lt;br&gt;
I AM which is Identity Access Management holds a pivotal place in cloud computing and in Aws resources because functionality of resources and architecture.&lt;br&gt;
IAM  basically provides authentication on a granular level resource by resource in the AWS environment. It gives flexibility and creativity on how you design ,tailor accessibility and permissions. &lt;br&gt;
As interesting as this may sound, the limitation is that you have to grant permission to an account by account basis.&lt;br&gt;
&lt;a href="https://aws.amazon.com/architecture/well-architected/" rel="noopener noreferrer"&gt;The Well Architected Framework&lt;/a&gt; was a way out of this otherwise cumbersome task in helping to build scalable designs.&lt;/p&gt;

&lt;h2&gt;
  
  
  AWS Single Sign-On (AWS SSO)
&lt;/h2&gt;

&lt;p&gt;—is an expression of IAM, built on its structure to provide centralized access management to  across AWS accounts. The need was further enforced by and through customers use and  adoption of multi-account AWS environments made AWS decide to provide the service.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi0pjdqtr9hrzq3p2cvdl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi0pjdqtr9hrzq3p2cvdl.png" alt=" " width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I AM identity center is free and it helps in simplifying  access to the aws environment with multiple accounts.Although the AWS IAM center formerly known as AWS Single Sign on(AWS SSO) was used for multi -account&lt;/p&gt;

&lt;p&gt;I AM IDENTITY CENTER helps you connect to your existing workforce directory, create users in one place to use across aws services.&lt;br&gt;
The youtube video below explains more&lt;br&gt;
&lt;a href="https://youtu.be/4yJp5-jGGNk" rel="noopener noreferrer"&gt;https://youtu.be/4yJp5-jGGNk&lt;/a&gt;&lt;br&gt;
I am identity center can do the following:&lt;/p&gt;

&lt;p&gt;1.Enable multi-account access to your AWS accounts.&lt;br&gt;
2.Enable single sign-on access to your AWS applications.&lt;br&gt;
3.Enable single sign-on access to Amazon EC2 Windows instances.&lt;br&gt;
4.Enable single sign-on access to cloud-based applications.&lt;/p&gt;

</description>
      <category>identity</category>
      <category>security</category>
      <category>iam</category>
    </item>
  </channel>
</rss>
