Forem

Lulu Cheng profile picture

Lulu Cheng

Engineer by day. Engineer by night.

Work

Software Engineer

One Off to One Data Platform: Design with Intent [Part 2]
Cover image for One Off to One Data Platform: Design with Intent [Part 2]

One Off to One Data Platform: Design with Intent [Part 2]

1
Comments
5 min read
One Off to One Data Platform: The Unscalable Data Platform [Part 1]
Cover image for One Off to One Data Platform: The Unscalable Data Platform [Part 1]

One Off to One Data Platform: The Unscalable Data Platform [Part 1]

1
Comments
3 min read
End the Never-ending Migrations: Platform Adoption Economics Explained
Cover image for End the Never-ending Migrations: Platform Adoption Economics Explained

End the Never-ending Migrations: Platform Adoption Economics Explained

1
Comments
7 min read
Why Data Security is Broken and How to Fix it?
Cover image for Why Data Security is Broken and How to Fix it?

Why Data Security is Broken and How to Fix it?

1
Comments
5 min read
Platform Engineering Abstraction: How to Scale IaC for Enterprise
Cover image for Platform Engineering Abstraction: How to Scale IaC for Enterprise

Platform Engineering Abstraction: How to Scale IaC for Enterprise

8
Comments
6 min read
End-to-End AWS KMS Encryption and Decryption Tutorial
Cover image for End-to-End AWS KMS Encryption and Decryption Tutorial

End-to-End AWS KMS Encryption and Decryption Tutorial

2
Comments
3 min read
Secure Data Stack: Navigating Adoption Challenges of Data Encryption
Cover image for Secure Data Stack: Navigating Adoption Challenges of Data Encryption

Secure Data Stack: Navigating Adoption Challenges of Data Encryption

1
Comments 1
5 min read
Data Security Strategy Beyond Access Control: Data Encryption
Cover image for Data Security Strategy Beyond Access Control: Data Encryption

Data Security Strategy Beyond Access Control: Data Encryption

2
Comments
5 min read
Step by Step Guide to Remediate Data Vulnerability
Cover image for Step by Step Guide to Remediate Data Vulnerability

Step by Step Guide to Remediate Data Vulnerability

1
Comments
2 min read
How Data Encryption Can Simplify Infrastructure Architecture

How Data Encryption Can Simplify Infrastructure Architecture

1
Comments
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans

The Data Security Duo: Data Encryption and Vulnerability Scans

1
Comments
5 min read
Keyper by Jarrid: Introduce Integrated Key + Role Management
Cover image for Keyper by Jarrid: Introduce Integrated Key + Role Management

Keyper by Jarrid: Introduce Integrated Key + Role Management

1
Comments
3 min read
loading...