top of page
Search
The Tech Platform
Jul 5
Vendor Lock-in with your Cloud Service Provider
Vendor lock-in happens when an organization becomes overly reliant on a specific vendor's products, services, or technologies. It occurs...
The Tech Platform
Mar 20
A Guide to Google Gemini Integration
Google Gemini is a cutting-edge large language model, like a super-powered brain for computers. Imagine a program that can: Write...
The Tech Platform
Apr 11, 2023
Top 10 NoSQL Database in 2023
NoSQL databases have become increasingly popular due to their ability to handle large amounts of data quickly and efficiently. As we move...
Sofia Sondh
Apr 3, 2023
Public Cloud vs Private Cloud vs Hybrid Cloud
When it comes to cloud computing, there are different types of cloud environments: public, private, and hybrid. Each type of cloud has...
The Tech Platform
Aug 8, 2022
Top 10 Web Scraping Tools
Web Scraping is an automatic method to obtain large amounts of data from websites. Most of this data is unstructured data in an HTML...
The Tech Platform
May 30, 2022
What is Multifactor Authentication and How does it work?
Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of...
The Tech Platform
May 28, 2022
The Best Programming Languages for Cloud Computing
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct...
The Tech Platform
May 26, 2022
Notification System Design : Types and Features
A notification system has become a mandatory feature os any system that helps touch it users, collect analytics data, etc. It's more than...
The Tech Platform
Apr 18, 2022
Go Application Vulnerability Cheatsheet
Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data...
The Tech Platform
Jan 27, 2022
Integrating Azure Key Vault with .NET Web Apps and Function Apps
Azure Key Vault is a cloud service that provides secure storage to store your keys, secrets, and other sensitive configuration data for...
bottom of page