DEV Community

Aditya Pratap Bhuyan profile picture

Aditya Pratap Bhuyan

Aditya Pratap Bhuyan is an experienced IT professional with over 20 years in enterprise and cloud applications. With more than 40 industry certifications, he specializes in DevOps, cloud computing.

Location Bangalore, India Joined Joined on  Personal website https://cloudnativeblogs.in github website

Pronouns

He/Him

Work

Cloud Native Journey

Best Practices for Using GROUP BY in MySQL for Converting Vertical Data to JSON

Best Practices for Using GROUP BY in MySQL for Converting Vertical Data to JSON

Comments
5 min read
Effective Methods for Troubleshooting Deadlocks in SQL Server

Effective Methods for Troubleshooting Deadlocks in SQL Server

Comments
7 min read
How Edge Computing is Revolutionizing Data Processing and IoT Applications

How Edge Computing is Revolutionizing Data Processing and IoT Applications

Comments
7 min read
How to Design a CPU from Scratch

How to Design a CPU from Scratch

Comments
11 min read
The Ultimate Guide to Design Patterns in Software Engineering

The Ultimate Guide to Design Patterns in Software Engineering

1
Comments
5 min read
How EDI Communication Protocols Streamline Business Data Exchange

How EDI Communication Protocols Streamline Business Data Exchange

Comments
5 min read
Best Practices in Software Architecture for Scalable, Secure, and Maintainable Systems

Best Practices in Software Architecture for Scalable, Secure, and Maintainable Systems

Comments
8 min read
Understanding the Key Stages of the Software Development Life Cycle (SDLC)

Understanding the Key Stages of the Software Development Life Cycle (SDLC)

Comments
7 min read
The Most Common Types of Databases in IT Today

The Most Common Types of Databases in IT Today

Comments
8 min read
How a Database Management System (DBMS) Works

How a Database Management System (DBMS) Works

1
Comments
6 min read
The Concept of Digital Fort: Protecting the Virtual World in the Age of Cybersecurity

The Concept of Digital Fort: Protecting the Virtual World in the Age of Cybersecurity

1
Comments
6 min read
Django vs Rails for API Development: Performance, Productivity, and Scalability Comparison

Django vs Rails for API Development: Performance, Productivity, and Scalability Comparison

1
Comments
7 min read
Cerbos Review: A Developer's Perspective on Modern Access Control

Cerbos Review: A Developer's Perspective on Modern Access Control

19
Comments
5 min read
Will ARM Processors Surpass x86 in Performance?

Will ARM Processors Surpass x86 in Performance?

1
Comments
8 min read
How Blockchain is Revolutionizing the Internet of Things (IoT)

How Blockchain is Revolutionizing the Internet of Things (IoT)

Comments
8 min read
How to Scale Stateful Services Effectively

How to Scale Stateful Services Effectively

Comments
7 min read
The Complete Guide to CPU Architecture

The Complete Guide to CPU Architecture

7
Comments
7 min read
Understanding Synchronous and Asynchronous Bus Timing

Understanding Synchronous and Asynchronous Bus Timing

Comments
6 min read
Unlocking Creativity with C++: 14 Exciting Project Ideas for Programmers

Unlocking Creativity with C++: 14 Exciting Project Ideas for Programmers

Comments
7 min read
Effective Strategies for Writing Unit Tests with External Dependencies like Databases and APIs

Effective Strategies for Writing Unit Tests with External Dependencies like Databases and APIs

Comments
7 min read
The Best Web Development Frameworks in 2024

The Best Web Development Frameworks in 2024

Comments
10 min read
Combining Scrum with Kanban and Extreme Programming

Combining Scrum with Kanban and Extreme Programming

Comments
7 min read
Connecting SQL Databases to the Cloud: PostgreSQL, MySQL, SQLite, and Cloud Integration Explained

Connecting SQL Databases to the Cloud: PostgreSQL, MySQL, SQLite, and Cloud Integration Explained

Comments
7 min read
The Drawbacks of Two-Factor Authentication (2FA) You Need to Know

The Drawbacks of Two-Factor Authentication (2FA) You Need to Know

6
Comments
8 min read
Understanding the Differences Between FPGA, AVR, PIC, and ARM Microcontrollers

Understanding the Differences Between FPGA, AVR, PIC, and ARM Microcontrollers

Comments
6 min read
Understanding the Key Differences Between NMI and Normal Interrupts

Understanding the Key Differences Between NMI and Normal Interrupts

Comments
6 min read
Understanding the Importance of Bits and Bytes in CPU Memory Addressing and Program Counters

Understanding the Importance of Bits and Bytes in CPU Memory Addressing and Program Counters

Comments
8 min read
Potential Drawbacks of Using DMA Instead of Interrupts for Data Transfer in Embedded Systems

Potential Drawbacks of Using DMA Instead of Interrupts for Data Transfer in Embedded Systems

Comments
7 min read
Why Blockchains Could Revolutionize Data Storage Over Traditional Databases for Platforms Like Twitter

Why Blockchains Could Revolutionize Data Storage Over Traditional Databases for Platforms Like Twitter

5
Comments
7 min read
Exploring Applications That Fully Utilize the Linux Kernel for Maximum Efficiency

Exploring Applications That Fully Utilize the Linux Kernel for Maximum Efficiency

Comments
7 min read
UUID as a Primary Key in Databases: Advantages, Challenges, and Best Practices

UUID as a Primary Key in Databases: Advantages, Challenges, and Best Practices

Comments
8 min read
Understanding Genetic Algorithms: Applications, Benefits, and Challenges in Soft Computing

Understanding Genetic Algorithms: Applications, Benefits, and Challenges in Soft Computing

2
Comments
7 min read
How to Become an Ethical Hacker Without Programming Skills

How to Become an Ethical Hacker Without Programming Skills

1
Comments
7 min read
Building an Event-Driven Socket Server in Python

Building an Event-Driven Socket Server in Python

6
Comments 2
6 min read
In-Memory Databases vs. Relational Databases: Key Advantages and Use Cases

In-Memory Databases vs. Relational Databases: Key Advantages and Use Cases

Comments
7 min read
Advantages of Using a Relational Database Management System (RDBMS) Over Hierarchical and Network Models

Advantages of Using a Relational Database Management System (RDBMS) Over Hierarchical and Network Models

6
Comments
8 min read
The Benefits of Wireless and IoT-Enabled Temperature Monitoring Systems over Traditional Wired Solutions

The Benefits of Wireless and IoT-Enabled Temperature Monitoring Systems over Traditional Wired Solutions

5
Comments
8 min read
Challenges in Natural Language Processing: Overcoming the Complexities of Human Language

Challenges in Natural Language Processing: Overcoming the Complexities of Human Language

1
Comments
7 min read
How Arm’s Success in Data Centers is Shaping the Future of Chip Technology

How Arm’s Success in Data Centers is Shaping the Future of Chip Technology

4
Comments
9 min read
Understanding MVVM Architecture in Android Development: Benefits, Implementation, and Best Practices

Understanding MVVM Architecture in Android Development: Benefits, Implementation, and Best Practices

Comments
8 min read
Hybrid Cloud Solutions: Why They Matter for Enterprises

Hybrid Cloud Solutions: Why They Matter for Enterprises

Comments
8 min read
Cloud Computing for the Education Sector: Revolutionizing Learning

Cloud Computing for the Education Sector: Revolutionizing Learning

Comments
9 min read
How to Choose the Right Cloud Provider for Your Business: A Comprehensive Guide

How to Choose the Right Cloud Provider for Your Business: A Comprehensive Guide

1
Comments
12 min read
Data Privacy in Cloud Computing: What You Need to Know

Data Privacy in Cloud Computing: What You Need to Know

Comments
8 min read
Understanding Kerberos: How It Manages Authentication and Encryption on Linux Systems

Understanding Kerberos: How It Manages Authentication and Encryption on Linux Systems

Comments
7 min read
How SQLynx Enhances Multi-Database Management and Boosts Developer Productivity

How SQLynx Enhances Multi-Database Management and Boosts Developer Productivity

Comments
7 min read
The Benefits of Big-Endian CPU Architecture Over Little-Endian Systems

The Benefits of Big-Endian CPU Architecture Over Little-Endian Systems

Comments
7 min read
Understanding Polish Notation

Understanding Polish Notation

1
Comments
7 min read
Why Docker is Essential for Modern Development Environments and Its Alternatives

Why Docker is Essential for Modern Development Environments and Its Alternatives

Comments
7 min read
Shift-Left Testing: The Key to Accelerating Quality in Agile Development

Shift-Left Testing: The Key to Accelerating Quality in Agile Development

Comments
8 min read
What is Ambient Computing and How It Will Transform Our Interaction with Technology

What is Ambient Computing and How It Will Transform Our Interaction with Technology

Comments
7 min read
Waterfall vs Agile: Choosing the Right Development Methodology

Waterfall vs Agile: Choosing the Right Development Methodology

Comments
7 min read
Best Practices for Organizing and Maintaining a Product Backlog in Scrum

Best Practices for Organizing and Maintaining a Product Backlog in Scrum

Comments
6 min read
Understanding Batch SQL Injection: A Real-World Threat to Data Security

Understanding Batch SQL Injection: A Real-World Threat to Data Security

2
Comments
5 min read
The Essential Guide to Testing React Components

The Essential Guide to Testing React Components

3
Comments 1
7 min read
Mastering MySQL Views

Mastering MySQL Views

Comments
6 min read
Mastering Workflow Automation with Apache Airflow for Data Engineering

Mastering Workflow Automation with Apache Airflow for Data Engineering

Comments
6 min read
Mastering Git with Effective Code Management and Branch Merging

Mastering Git with Effective Code Management and Branch Merging

Comments
5 min read
Managing Containerized Applications in Data Science with Kubernetes: A Comprehensive Guide

Managing Containerized Applications in Data Science with Kubernetes: A Comprehensive Guide

Comments
5 min read
Essential Aspects of IoT Security Assessments for Scalable and Secure Solutions

Essential Aspects of IoT Security Assessments for Scalable and Secure Solutions

Comments
6 min read
loading...