What is merge conflict and how does it occur?

Conflict merge occurs when changes have been made to the same part of a file in both the source (branch A) and target (branch B) branches, and the system cannot determine which version to keep, consider the following example:

How to use YubiKey with AWS CLI

This post add a up-to-date guide on how to use YubiKey with AWS CLI, including installation steps and creating an oath account for AWS. It also includes a JSON policy for MFA management actions. Install Install YubiKey Manager CLI Install YubiKey Manager CLI https://developers.

AWS Allocation Tags

Cost allocation tags are used by AWS to categorize and track resource costs on your cost allocation report. There are two types of cost allocation tags: AWS-generated tags and user-defined tags. AWS automatically generates and applies certain tags, while you have the ability to define and apply your own tags user-defined tags.

Exploring Amazon Athena: A Powerful and Intelligent Query Engine

Amazon Athena, a serverless interactive query service, has revolutionized the way organizations analyze and gain insights from vast amounts of data. In this post, we will explore the key features and capabilities of Amazon Athena, highlighting its ability to directly connect to various data sources

How to hide the title of embedded note in Obsidian

In Obsidian, embedding notes into a document can be a powerful way to organise and relate information. The only issue is when you wish to add a different title or level of header to the emdbded note to make the master note appear to be cohesive.

Pricing and Cost Optimization for AWS RDS

AWS provides backup storage for your database at no additional cost for up to 100% of the total database storage, you might be wondering whether someone would exhaust the 100% very first day of backup, but that is not the case when compression and incremental techniques are in play, let’s consider a hypothetical scenario to illustrate that

Encryption at Rest: What is it good for?

Encryption at rest also called server-side encryption involves encrypting data as it is written to disk and decrypting it when read from the disk. Cloud infrastructure services typically offer