Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
OMER HAMERMAN
  • Home
  • About
  • YouTube
  • Newsletter
  • Courses
  • Podcast
  • Schedule

    Yo.

    What’s up?

    Should DevOps know how to Hack?

    3 minute read

    Understanding and Leveraging Kubernetes Controllers

    5 minute read

    Factor Cost Efficiency into Platform Engineering for Growth, Profitability

    3 minute read

    Imbuing platform engineering with an additional focus on cost-efficiency can help businesses ride out difficult financial periods and put them on a flywheel ...

    Containers and Serverless—Rivals or Cohorts?

    5 minute read

    How to Select the Right Volume Type/Storage for Your Workload

    6 minute read

    The DevOps Manifesto

    8 minute read

    A collection of engineering principles

    Cloudformation or Terraform: Which Iac Platform Is the Best Fit for You?

    10 minute read

    A DevOps Guide to Kubernetes Storage on AWS

    6 minute read

    Basics, usecases and gotchas

    10 Things I wish I’d known before building a Kubernetes CRD controller

    6 minute read

    Controllers, operators, informers and other K8s mysteries

    Introduction to AWS Lambda and Serverless

    8 minute read

    What’s serverless, and what’s under AWS’s platform’s hood

    Achieving Disk Elasticity in Containerized Environments

    4 minute read

    Making the Impossible Possible

    How hackers score Covid tests for free

    4 minute read

    Introduction to Zero Trust on AWS ECS Fargate

    8 minute read

    Setting up identity aware proxy on ECS with Fargate

    How to NOT secure web payment systems

    4 minute read

    Or: getting a Covid test for free

    Hacking your application may be easier than you think

    6 minute read

    Or “How I hacked my favorite coffee shop, and why it matters”

    An interview with Meir Gabay of Prodops

    less than 1 minute read

    5 Things you need to know to optimize your company’s approach to data

    17 minute read

    How hackers steal your keys and secrets

    9 minute read

    And hack your organization walking through the front door

    Protect your application from CSRF attacks

    8 minute read

    Cross Site Request Forgery attack and mitigations explained

    Getting started with Vim (video)

    less than 1 minute read

    SQL injection for developers

    11 minute read

    The basics of how to test and protect your application

    How to build a HIPAA-compliant cloud infrastructure - Part II

    8 minute read

    Deploying the AWS HIPAA-compliant environment and important techincal considerations

    How to build a HIPAA compliant cloud infrastructure - Part I

    4 minute read

    Considerations for technical and business leaders

    A shot at solving the world of cloud infrastructure and integrations

    9 minute read

    Unleash the Power of Vim Macros

    4 minute read

    A quick introduction to one of Vim’s most powerful and underrated features

    Vim A to Z, Literally.

    11 minute read

    A list of options and keystrokes in Vim

    An 8-Minute Introduction To K8s

    7 minute read

    Core concepts, features and building blocks

    Vim: from foe to friend in 9 minutes

    9 minute read

    Lessons from 3-years of intensive learning

    Running Kubernetes and AWS in CHINA

    7 minute read

    The Chinese firewall, Pitfalls to avoid and keys to success

    Building a 2.5x lighter, faster ELK monitoring pipeline

    4 minute read

    Solving git merge conflicts with VIM

    3 minute read

    A 6-minute introduction to HELM

    5 minute read

    On-prem resources slow you down

    8 minute read

    Creating Homebrew taps for private internal tools

    3 minute read

    K8s will not solve your storage problems

    2 minute read

    Migrating a 100K requests-per-minute production from AWS Elastic Beanstalk to ECS

    8 minute read

    There is no such thing as a DevOps engineer

    6 minute read

    Why your startup has to do DevOps from day one

    8 minute read

    Managing application secrets on AWS with SSM and Chamber

    4 minute read

    Security for dummies: Protecting application secrets made easy

    7 minute read

    Deploying and using Drone CI like a pro

    6 minute read

    Deploying FARGATE services using CloudFormation

    7 minute read

    How to scale in ECS hosts

    3 minute read

    How to Manage AWS Cross-Account Quick Access

    2 minute read

    Learn how to quick switch between AWS accounts

    • Follow:
    • YouTube
    • Twitter
    • GitHub
    • Linkedin
    • Dev
    • Medium
    • Feed
    © 2024 Omer Hamerman.