98 – Open Talk – How to detect deepfake

A deepfake refers to a specific kind of media or photo where a person in an image or video is transacted with another person however it will look like the original person in an image or video. To make a deep fake video, a creator swaps one person’s face and replaces it with another, using a […]


97 – What are the leading cloud migration challenges?

Cloud migration is challenging, cumbersome, and risky for traditional organizations relying on in-house custom-built systems to support achieving revenue from years on years. Today I will be discussing a wide variety of challenges organizations are facing while planning for cloud migration. These typical challenges are talks of every board room and the agenda of the […]


95- Cloud Security with CIS Benchmarks

The Center for Internet Security is a nonprofit organization with the mission to ‘identify, develop, validate, promote, and sustain best practice solutions for cyber defense.’ Experts and IT professionals from different governments, institutes, and businesses across the globe are participating and finalizing the controls based on the consensus decision-making model. Now let us link this to why […]


94- How to develop a cloud migration strategy?

A cloud migration strategy is a plan which any organization develops to move its systems and applications from on-premises architecture to the cloud.  Not all applications and systems benefit from running on the cloud; that’s why you must indorse the most efficient way to work on it and migrate applications. Therefore, a systematic, documented strategy […]


93-Cloud Migration Workload Assessment

Implementing cloud or cloud migration is challenging. Organizations that have built thousands of applications over the past two to three decades require re-architecting to run efficiently, securely, and resiliently in the cloud. Your next steps are to perform a cloud migration assessment based on your cloud strategy and business objectives. It will help identify the […]


Cloud Security Posture Management Tech Talk

Cloud Security Posture Management is the most important factor in multi-cloud deployments. Detecting and preventing the misconfigurations and threats that lead to data breaches and compliance violations in your multi-cloud environments. For organizations embarking on a multi-cloud strategy, cloud security posture management (CSPM) helps them secure multiple cloud infrastructure as a service (IaaS) providers. According […]


Workload Migration to Cloud – Getting Started

Workload migration to Cloud has become integral to IT optimization and driving business forward with the increased espousal of cloud technologies. Moving to the cloud enables firms to be more agile, remove inefficiencies and provide required customer, employee experiences. Migration of on-premise enterprise workload to the public cloud has reached the situation of being considered […]


Deploy a Server on the OCI Arm Ampere A1 Compute – Part 8

How to deploy a server/instance on the newly released Arm Ampere AI compute shape in Oracle OCI. In this session, we will summarize what we have learned from the last seven sessions on the basics of OCI and you will see how those basics concepts are helping us create a new virtual machine. Three weeks […]


Oracle OCI – VNICs, Private, IP addresses, DNS, DHCP options – Part 7

In this session part 7 to learn Oracle OCI, we will cover three topics: How to manage the virtual network interface cards (VNICs) in a virtual cloud network (VCN). How your instances are assigned private and public IP addresses, and the use of DNS within your cloud network. How to manage the Dynamic Host Configuration Protocol (DHCP) […]


Oracle OCI – How to Secure Your Network – Part 5 & 6

How to secure your cloud network and compute instances in Oracle Cloud Infrastructure; you will be using private subnets, Security rules, Firewall rules, Gateways and route tables, IAM policies, and Security zones. we will also compare the Security Lists and Network Security Groups. what are the top 5 best practices to be followed for the Security […]