<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Vishal Alhat</title>
    <description>The latest articles on DEV Community by Vishal Alhat (@vishalcloud).</description>
    <link>https://dev.to/vishalcloud</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F884559%2F83d14d58-85b7-4b9c-82ea-c84bc57d5c12.jpg</url>
      <title>DEV Community: Vishal Alhat</title>
      <link>https://dev.to/vishalcloud</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/vishalcloud"/>
    <language>en</language>
    <item>
      <title>Generative AI Based Application Development on AWS - Security perspective</title>
      <dc:creator>Vishal Alhat</dc:creator>
      <pubDate>Tue, 26 Sep 2023 18:47:46 +0000</pubDate>
      <link>https://dev.to/vishalcloud/generative-ai-based-application-development-on-aws-security-perspective-4p96</link>
      <guid>https://dev.to/vishalcloud/generative-ai-based-application-development-on-aws-security-perspective-4p96</guid>
      <description>&lt;h2&gt;
  
  
  Introduction to Generative AI Based Application Development on AWS
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--L-OWNW3X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e02w99k8ilybp013zv48.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--L-OWNW3X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/e02w99k8ilybp013zv48.png" alt="genai-security" width="800" height="436"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Definition of generative AI and its applications
&lt;/h3&gt;

&lt;p&gt;Generative AI refers to the use of artificial intelligence algorithms to create or generate new content, such as images, texts, or even music. Unlike traditional AI models that rely on pre-existing data for analysis, generative AI has the ability to generate new content based on patterns and examples it has learned. This technology has wide-ranging applications, including image synthesis, video game development, text generation, and even drug discovery. By leveraging the power of generative AI, developers can create highly creative and unique applications that were once limited to human imagination.&lt;/p&gt;

&lt;h3&gt;
  
  
  Overview of AWS as a platform for AI development
&lt;/h3&gt;

&lt;p&gt;Amazon Web Services (AWS) is a comprehensive cloud computing platform that offers a wide range of services and tools for developers. With its scalability, flexibility, and reliability, AWS has become a popular choice for AI development. AWS provides various services specifically designed for AI, such as Amazon SageMaker, which allows developers to build, train, and deploy machine learning models at scale. Additionally, AWS offers a range of AI services, including Amazon Rekognition for image and video analysis, Amazon Polly for text-to-speech conversion, and Amazon Lex for building chatbots. These services make it easier for developers to incorporate generative AI into their applications, as they can leverage the power of AWS infrastructure and tools to accelerate their development process.&lt;/p&gt;

&lt;h3&gt;
  
  
  Understanding the Importance of Security in AI Development
&lt;/h3&gt;

&lt;h4&gt;
  
  
  The potential risks and vulnerabilities associated with generative AI applications
&lt;/h4&gt;

&lt;p&gt;Generative AI applications have gained significant popularity and are being used in various domains such as art, music, and content creation. However, these applications also pose potential risks and vulnerabilities that need to be understood. One key risk is the potential for malicious actors to exploit the AI models and use them for generating harmful or misleading content. For example, a generative AI application could be used to create deepfake videos that can be used to spread misinformation or defame individuals. Additionally, generative AI models can also be vulnerable to adversarial attacks, where malicious actors can manipulate the input data to trick the model into generating incorrect or biased outputs. These risks highlight the importance of implementing strong security measures in AI development.&lt;/p&gt;

&lt;h3&gt;
  
  
  The consequences of security breaches in AI systems
&lt;/h3&gt;

&lt;p&gt;Security breaches in AI systems can have severe consequences with wide-ranging implications. If an AI system is compromised, it can lead to the unauthorized access and misuse of sensitive data. This can result in privacy breaches, financial losses, and reputational damage for individuals and organizations. Furthermore, security breaches can also lead to the manipulation or alteration of AI models, causing them to generate inaccurate or biased outputs. This can have serious implications in critical domains such as healthcare, finance, and autonomous vehicles, where incorrect or biased decisions can have life-threatening consequences. Therefore, it is crucial to prioritize security in AI development to mitigate the potential consequences of security breaches and ensure the trustworthiness of AI systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security Best Practices for Generative AI Application Development on AWS
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Implementing strong authentication and access controls
&lt;/h3&gt;

&lt;p&gt;When developing generative AI applications on AWS, it is crucial to implement strong authentication and access controls to protect sensitive data and prevent unauthorized access. This can be achieved by using multi-factor authentication (MFA), which requires users to provide multiple forms of identification, such as a password and a unique code sent to their mobile device. Additionally, access controls should be set up to ensure that only authorized individuals have access to the application and its data. This can be done by assigning specific roles and permissions to users, granting them access only to the resources they need.&lt;/p&gt;

&lt;h3&gt;
  
  
  Ensuring secure data storage and transmission
&lt;/h3&gt;

&lt;p&gt;Another important security best practice for generative AI application development on AWS is to ensure secure data storage and transmission. This involves encrypting data both at rest and in transit. AWS provides services such as Amazon S3 and Amazon EBS, which offer encryption options to protect data stored on these platforms. Additionally, when transmitting data between different components of the application or to external systems, secure protocols like HTTPS should be used to encrypt the data during transit and prevent eavesdropping or tampering.&lt;/p&gt;

&lt;h3&gt;
  
  
  Regularly updating and patching software components
&lt;/h3&gt;

&lt;p&gt;To maintain a secure environment for generative AI applications on AWS, it is essential to regularly update and patch software components. This includes not only the operating system but also any libraries, frameworks, or dependencies used in the application. AWS provides tools such as AWS Systems Manager and AWS Elastic Beanstalk that can automate the process of updating and patching software components, ensuring that the latest security patches are applied promptly. Regularly updating and patching software helps to address any known vulnerabilities and minimize the risk of exploitation.&lt;/p&gt;

&lt;h3&gt;
  
  
  Conducting thorough security testing and vulnerability assessments
&lt;/h3&gt;

&lt;p&gt;Lastly, conducting thorough security testing and vulnerability assessments is a critical practice for generative AI application development on AWS. This involves regularly testing the application for potential vulnerabilities and weaknesses, both during development and after deployment. Techniques such as penetration testing, code review, and vulnerability scanning can help identify and address any security flaws. AWS provides services like AWS Identity and Access Management (IAM) tools and AWS Inspector that can assist in assessing the security posture of the application and identifying any potential vulnerabilities or misconfigurations.&lt;/p&gt;

&lt;p&gt;By implementing strong authentication and access controls, ensuring secure data storage and transmission, regularly updating and patching software components, and conducting thorough security testing and vulnerability assessments, developers can enhance the security of generative AI applications on AWS and protect against potential threats and breaches.&lt;/p&gt;

&lt;h2&gt;
  
  
  Leveraging AWS Security Services for Generative AI Development
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Overview of AWS security services relevant to AI development
&lt;/h3&gt;

&lt;p&gt;When it comes to generative AI development on AWS, there are several security services that can be leveraged to ensure the safety and protection of data and resources. These services include AWS Identity and Access Management (IAM), AWS Key Management Service (KMS), and AWS CloudTrail. Each of these services plays a crucial role in securing the AI development process and ensuring that only authorized individuals have access to sensitive information.&lt;/p&gt;

&lt;h3&gt;
  
  
  Implementing AWS Identity and Access Management (IAM)
&lt;/h3&gt;

&lt;p&gt;One of the key aspects of securing AI development on AWS is implementing AWS Identity and Access Management (IAM). IAM allows administrators to manage access to AWS resources by creating and managing users, groups, and permissions. With IAM, developers can define granular access controls, ensuring that only authorized individuals have access to the AI development environment. IAM also provides the ability to enforce multi-factor authentication, adding an extra layer of security to prevent unauthorized access.&lt;/p&gt;

&lt;h3&gt;
  
  
  Utilizing AWS Key Management Service (KMS) for encryption
&lt;/h3&gt;

&lt;p&gt;Encryption is a vital component of securing sensitive data in AI development. AWS Key Management Service (KMS) provides a secure and scalable solution for managing encryption keys. KMS allows developers to generate, store, and manage encryption keys that can be used to encrypt and decrypt data. By utilizing KMS, AI developers can ensure that data is protected both in transit and at rest, safeguarding it from unauthorized access or tampering.&lt;/p&gt;

&lt;h3&gt;
  
  
  Leveraging AWS CloudTrail for auditing and monitoring
&lt;/h3&gt;

&lt;p&gt;To ensure the security and compliance of AI development on AWS, it is essential to have robust auditing and monitoring capabilities. AWS CloudTrail is a service that enables developers to monitor and log all API calls made within their AWS account. By enabling CloudTrail, developers can gain visibility into who is making API calls, when they are being made, and what actions are being performed. This allows for effective auditing and monitoring of the AI development environment, helping to detect and respond to any suspicious or unauthorized activities promptly. Additionally, CloudTrail logs can be integrated with other AWS services, such as AWS CloudWatch, for real-time monitoring and alerting.&lt;/p&gt;

&lt;h2&gt;
  
  
  Ensuring Compliance and Privacy in Generative AI Development on AWS
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Overview of relevant compliance frameworks (e.g., GDPR, HIPAA)
&lt;/h3&gt;

&lt;p&gt;When developing generative AI applications on AWS, it is crucial to be aware of and comply with relevant compliance frameworks, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA). The GDPR sets guidelines for the protection of personal data of individuals within the European Union, while HIPAA regulates the handling of protected health information in the United States. Understanding these frameworks is essential to ensure the privacy and security of user data and to avoid legal consequences.&lt;/p&gt;

&lt;h3&gt;
  
  
  Implementing data privacy measures in AI applications
&lt;/h3&gt;

&lt;p&gt;To ensure compliance with privacy frameworks, it is necessary to implement data privacy measures in generative AI applications on AWS. This includes incorporating data encryption, both at rest and in transit, to protect sensitive information from unauthorized access. Additionally, implementing access controls and user authentication mechanisms can help safeguard data privacy by limiting access to authorized individuals. It is also important to regularly monitor and audit data access and usage to detect any potential privacy breaches and take appropriate actions.&lt;/p&gt;

&lt;h3&gt;
  
  
  Ensuring transparency and user consent in data processing
&lt;/h3&gt;

&lt;p&gt;Transparency and user consent play a significant role in maintaining compliance and privacy in generative AI development. It is essential to provide clear and accessible information about how user data is collected, processed, and used. This can be achieved by creating easily understandable privacy policies and terms of service that outline the purpose and scope of data processing. Furthermore, obtaining explicit consent from users before collecting and processing their data ensures that they are aware of and agree to the usage of their personal information. Implementing mechanisms for users to easily withdraw their consent or request the deletion of their data is also crucial to respect individuals' privacy rights.&lt;/p&gt;

&lt;p&gt;By prioritizing compliance with relevant frameworks, implementing data privacy measures, and ensuring transparency and user consent, developers can confidently develop generative AI applications on AWS while upholding privacy and complying with legal requirements.&lt;/p&gt;

&lt;h3&gt;
  
  
  Recap of the importance of security in generative AI development
&lt;/h3&gt;

&lt;p&gt;In conclusion, security is of utmost importance in generative AI development. The potential risks and vulnerabilities associated with AI systems can have significant consequences, both in terms of privacy breaches and malicious use. It is crucial for developers and organizations to prioritize security measures to ensure the integrity and safety of their AI systems. By addressing security concerns from the early stages of development, potential risks can be mitigated, and the benefits of generative AI can be leveraged responsibly.&lt;/p&gt;

&lt;h3&gt;
  
  
  Summary of key security best practices on AWS
&lt;/h3&gt;

&lt;p&gt;When developing generative AI on AWS, there are several key security best practices that should be followed. First and foremost, utilizing strong authentication mechanisms, such as multi-factor authentication, can help prevent unauthorized access to sensitive data and systems. Additionally, implementing encryption at rest and in transit can safeguard data from unauthorized interception or access. Regularly monitoring and auditing system logs can help identify and respond to any security incidents promptly. Implementing least privilege access controls and regularly patching and updating software are also critical to ensuring the security of generative AI systems on AWS.&lt;/p&gt;

&lt;h3&gt;
  
  
  Encouraging responsible and ethical AI development practices
&lt;/h3&gt;

&lt;p&gt;it is important to emphasize the importance of responsible and ethical AI development practices. As AI continues to advance, it is crucial to prioritize transparency, fairness, and accountability in AI systems. Developers should strive to understand and address the potential biases and ethical implications of their generative AI models. By adopting ethical guidelines and incorporating diverse perspectives in AI development, we can ensure that generative AI benefits society as a whole while minimizing potential harms.&lt;/p&gt;

&lt;p&gt;So to conclude this -  security, summarized security best practices, and promoting responsible and ethical AI development practices are all critical aspects in the development of generative AI. By prioritizing security, adhering to best practices, and considering ethical implications, we can harness the potential of generative AI while minimizing potential risks and ensuring the overall benefit to society.&lt;/p&gt;

</description>
      <category>cloudsecurity</category>
      <category>aws</category>
    </item>
    <item>
      <title>AWS Security Fundamentals: Safeguarding Your Applications and Data</title>
      <dc:creator>Vishal Alhat</dc:creator>
      <pubDate>Wed, 06 Sep 2023 20:44:06 +0000</pubDate>
      <link>https://dev.to/vishalcloud/aws-security-fundamentals-safeguarding-your-applications-and-data-54he</link>
      <guid>https://dev.to/vishalcloud/aws-security-fundamentals-safeguarding-your-applications-and-data-54he</guid>
      <description>&lt;p&gt;With the ever-evolving cyber threats and the increasing need for improved security, it's no wonder that many businesses are looking to Amazon Web Services (AWS) as their provider of choice. From data protection to identity and access management, AWS offers a wide range of security features and services designed to help protect your applications and data. But while AWS is incredibly secure, it’s up to you as the user to ensure proper implementation of security measures. There are a number of steps you can take to ensure your applications and data remain safe, including understanding the basics of Amazon security fundamentals. In this blog post, we’ll break down how you can use AWS security features and services to safeguard your business. We’ll cover everything from basic best practices, such as using strong passwords and implementing multi-factor authentication (MFA), to more advanced topics like configuring IAM roles for application users. By following these guidelines, you’ll understand how to secure your applications on AWS and keep your data safe from malicious actors or cyber threats.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why is it important to secure your applications and data in the cloud?
&lt;/h3&gt;

&lt;p&gt;This is a comprehensive guide to protecting your applications and data in the cloud. With this step-by-step guide, you’ll learn how cloud security solutions provide a holistic view of your security posture and enable you to respond quickly to threats. Cloud security solutions can also help you detect, respond and recover from incidents faster and more efficiently, while helping reduce costs associated with data breaches and other security incidents. Plus, they help protect against data loss, unauthorized access and data corruption. AWS Security Fundamentals equips you with the tools necessary to secure your applications and data in the cloud so that you can focus on building great products for your customers.&lt;/p&gt;

&lt;h3&gt;
  
  
  The components of AWS security
&lt;/h3&gt;

&lt;p&gt;AWS Security Fundamentals is a step-by-step guide to safeguarding your applications and data. It’s based on the shared responsibility model between Customers and AWS, wherein customers are responsible for configuring the security settings of their AWS resources, while AWS provides a range of security services and features to secure the infrastructure, data, and applications.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ar7Kk9Kd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0artx6u21uygk15wdb6c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ar7Kk9Kd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/0artx6u21uygk15wdb6c.png" alt="aws shared responsibility model" width="800" height="434"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The core components of AWS Security include identity and access management, network security, encryption, monitoring and logging, as well as a variety of tools to help customers securely store, manage, and protect their data and applications. With this guide in hand you can be confident that your business is safely secured against unauthorized access with state-of-the art security solutions from Amazon Web Services.&lt;/p&gt;

&lt;h3&gt;
  
  
  How to protect your data in the cloud environment.
&lt;/h3&gt;

&lt;p&gt;As a business owner or IT professional, it’s important to secure your applications and data hosted in the cloud. AWS offers you an easy-to-follow roadmap that will help keep your applications safe and secure. This guide is designed to ensure your cloud-based data is encrypted both in transit and at rest, as well as monitor your cloud infrastructure for any suspicious activity or threats. Additionally, this guide will show you how to utilize multi-factor authentication for user access and login credentials, implement industry standard security protocols to protect your data from unauthorized access, and regularly backup your data and store it offline to prevent accidental or malicious data loss. Stay one step ahead of the hackers with AWS Security Fundamentals: A Step-by-Step Guide to Safeguarding Your Applications and Data.&lt;/p&gt;

&lt;h3&gt;
  
  
  Best practices for designing secure applications on AWS.
&lt;/h3&gt;

&lt;p&gt;Setting up the right mechanisms to protect your applications and data on AWS is critical. Thankfully, you have a range of security tools at your disposal that will help you achieve this goal. With the step-by-step guide of AWS Security Fundamentals, you can learn how to best utilize AWS Identity and Access Management (IAM) to control access to AWS resources. You can also use Amazon CloudWatch to monitor and log activities, as well as Amazon Virtual Private Cloud (VPC) for securing the network environment. Additionally, you'll be able to encrypt data at rest with AWS Key Management Service (KMS), and track user activity and API usage with AWS CloudTrail. All these steps will help establish a secure foundation so that you can develop applications without worrying about potential threats or breaches.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PSo9b2LA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pm2yqs0n31kuk20c49a5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PSo9b2LA--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/pm2yqs0n31kuk20c49a5.png" alt="aws security best practices" width="800" height="323"&gt;&lt;/a&gt;&lt;br&gt;
 We will dive deep into these best practices in upcoming posts, stay tuned!&lt;/p&gt;

&lt;p&gt;Securing applications and data in the cloud is an essential part of using cloud services, such as AWS. AWS provides a wide range of security components to help protect your applications and data. To ensure that your applications and data are properly secured, it is important to understand the different components of AWS security and how to use them effectively. Additionally, there are best practices for designing secure applications on AWS that should be followed in order to keep your environment safe. By following these guidelines and taking advantage of all the security features provided by AWS, you can ensure that your applications and data are properly secured in the cloud environment.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cybersecurity</category>
      <category>devops</category>
      <category>cloudsecurity</category>
    </item>
    <item>
      <title>Creating a AWS Free tier account and setting up budget and usage alerts</title>
      <dc:creator>Vishal Alhat</dc:creator>
      <pubDate>Thu, 23 Feb 2023 15:22:13 +0000</pubDate>
      <link>https://dev.to/vishalcloud/creating-a-aws-free-tier-account-and-setting-up-budget-and-usage-alerts-2l96</link>
      <guid>https://dev.to/vishalcloud/creating-a-aws-free-tier-account-and-setting-up-budget-and-usage-alerts-2l96</guid>
      <description>&lt;p&gt;Hello,&lt;br&gt;
As a prerequisite to &lt;a href="https://www.meetup.com/puneawsug/events/291730558/"&gt;AWS and DevOps workshop&lt;/a&gt; or if you want to get started with AWS, Please follow below steps to create a free AWS account :&lt;/p&gt;

&lt;p&gt;How to create AWS Free Tier Account?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1 -&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Go to your browser your web browser and open aws.amazon.com/free&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 -&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;On the screen, click Create a Free Account button.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yqaS1Q4b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2n7my45o8h1ww4ue1hvz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yqaS1Q4b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2n7my45o8h1ww4ue1hvz.png" alt="aws free tier screen" width="800" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3 -&lt;/strong&gt; &lt;br&gt;
Enter below details for your AWS account and click on Continue&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--1sNFRWOo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/48cywcmksszzzednr7em.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1sNFRWOo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/48cywcmksszzzednr7em.png" alt="personal-details" width="791" height="437"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Email address: Your email that has not been used with AWS earlier.&lt;br&gt;
Password: Type your password. Make sure it is complex with mix of capital, small letters, numbers and symbols.&lt;br&gt;
Confirm password: Re-type your password.&lt;br&gt;
AWS Account name: Any nick name for account. You can set this later as well in account settings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4 -&lt;/strong&gt;&lt;br&gt;
Contact Information : &lt;br&gt;
Select your AWS type - personal, &lt;br&gt;
Enter your personal details.&lt;br&gt;
Accept the Terms and condition by checking the checkbox and then click on button - Create Account and Continue&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--LYxkigOM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/soeo35mrsr3zqgnlda60.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--LYxkigOM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/soeo35mrsr3zqgnlda60.png" alt="details" width="474" height="609"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In a later step, you will need to verify you number provided here, using the OTP you will receive from AWS on it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5 -&lt;/strong&gt; &lt;br&gt;
Payment information: &lt;br&gt;
Enter your credit card /Debit Card info and billing address and click on Submit. Don't Worry! This is to verify your identity. you won't be charged for your free tier usage.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MvHq_VuE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gr1mjyshj2edscfwg1vj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MvHq_VuE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gr1mjyshj2edscfwg1vj.png" alt="payment-screen" width="509" height="551"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6 -&lt;/strong&gt; &lt;br&gt;
Next, you will redirected to your credit/debit card transaction authentication screen, where you will be charged Rs.2 for verifying with your bank, and it will be returned back in account within 24 to 48 hours. This is the same process you do while shopping online with debit / credit cards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 7 -&lt;/strong&gt; &lt;br&gt;
Verify your phone number -  Through text message or voice call.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OAqY1-gt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xeuypcyuvuxjaf1y8k9x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OAqY1-gt--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/xeuypcyuvuxjaf1y8k9x.png" alt="Phone number verification" width="557" height="564"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When you click on Send SMS or Call me Now, you will receive a call or SMS from Amazon containing verification code having 4 digits generally. Enter received code on screen and click on Verify Code. Once verified you will be redirected to next screen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 8 -&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Support plan: AWS provides multiple support plans according to the services they provide. For free tier account we will be using Basic plan which is free. Click on button 'Free' to continue.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KVyG2uRY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rgi9nw3u7jmgi890kufz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KVyG2uRY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/rgi9nw3u7jmgi890kufz.png" alt="support-plans" width="603" height="616"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 9 -&lt;/strong&gt;&lt;br&gt;
Registration Confirmed!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--W6c2YqtP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/i61y260vfqxpwxzkx8h8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--W6c2YqtP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/i61y260vfqxpwxzkx8h8.png" alt="registration complete" width="643" height="151"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You will receive an email confirming that your account has been activated. It is pretty quick, but sometimes it might take around 30 minutes to verify your details and activate account.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Congratulations, You have created your first account&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
Once activation is successful, you can go to console.aws.amazon.com and login with your credentials.&lt;/p&gt;

&lt;p&gt;Select Region from top bar. We recommend to use default N. Virginia region for this workshop.&lt;/p&gt;

&lt;p&gt;This entire process will take less than 10 minutes to complete.&lt;br&gt;
Please go through &lt;a href="https://aws.amazon.com/free/?awsf.Free%20Tier%20Types=tier%2312monthsfree&amp;amp;all-free-tier.sort-by=item.additionalFields.SortRank&amp;amp;all-free-tier.sort-order=asc&amp;amp;awsf.Free%20Tier%20Categories=*all"&gt;this section&lt;/a&gt; of AWS free tier account details to understand what is included with free tier.&lt;/p&gt;

&lt;p&gt;Further steps are optional, but &lt;em&gt;I would strongly recommend&lt;/em&gt; to setup AWS free tier usage alerts in order to get alerts when free tier usage is about to exceed.&lt;/p&gt;

&lt;p&gt;Go to account menu on top header, then click on Billing Dashboard.&lt;/p&gt;

&lt;p&gt;To change who gets these email alerts, choose Billing Preferences from the left navigation bar.&lt;/p&gt;

&lt;p&gt;To opt other people in to receive Free Tier Usage Alerts, in the Email Address field, add their email address and choose Save preferences.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lqlNTQVD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/js9eud3mvbbnuhwmv6ht.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lqlNTQVD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/js9eud3mvbbnuhwmv6ht.png" alt="usage-alerts" width="800" height="435"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can follow &lt;a href="https://aws.amazon.com/premiumsupport/knowledge-center/free-tier-charges/"&gt;this page&lt;/a&gt; to setup budget for you account to make sure you don't incur charges when I'm using the AWS Free Tier. &lt;/p&gt;

&lt;p&gt;All the Best..!!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>awscommunity</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>AWS Re:invent Recap Pune Edition</title>
      <dc:creator>Vishal Alhat</dc:creator>
      <pubDate>Mon, 06 Feb 2023 20:38:55 +0000</pubDate>
      <link>https://dev.to/vishalcloud/aws-reinvent-recap-pune-edition-513n</link>
      <guid>https://dev.to/vishalcloud/aws-reinvent-recap-pune-edition-513n</guid>
      <description>&lt;p&gt;Hello everyone,&lt;/p&gt;

&lt;p&gt;I am excited to announce that we at AWS User group Pune recently hosted a series of technical meetups for AWS re:invent recap. This meetup series was organized to bring together professionals and enthusiasts from the IT and cloud computing to network, share their knowledge and experiences, and engage in lively discussions and debates.&lt;/p&gt;

&lt;p&gt;These meetups were held at EPAM Systems Pune and were attended by around cumulative 500+ individuals from diverse backgrounds and expertise levels. The atmosphere was electric with energy and excitement as attendees arrived, greeted each other, and settled in for the days of engaging discussions and presentations.&lt;/p&gt;

&lt;p&gt;The first part of this series was hosted on 21st January and second part on 5th of February 2023, which kicked off with a welcome speech from yours truly, where I introduced the theme of the meetup, described about AWS Reinvent and thanked everyone for attending. This was followed by a series of presentations by some of the industry's leading experts Mayur Bhagia,Toshal Khawale, Dheeraj Choudhary, Somesh Shrivastava who shared the stage with me and we shared our insights and expertise on new launches and announcements in various AWS technologies like AI/ML, serverless, security, compute, devops, builder tools etc. The presentations were informative, thought-provoking, and sparked some great conversations among the attendees. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6hldkj3eh3nuopoxkdt3.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6hldkj3eh3nuopoxkdt3.jpeg" alt="vishal talking about serverless" width="800" height="1066"&gt;&lt;/a&gt;&lt;br&gt;
I spoke about serverless computing in first part, and security and compliance in second part, for which I could observe the curiosity for these technologies in participant’s minds by the questions they were asking during those talks!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxolsi9bl7co33byl6gvv.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxolsi9bl7co33byl6gvv.jpeg" alt="AWS security session by vishal" width="800" height="360"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After each session, we had an interactive Q&amp;amp;A session where attendees had the opportunity to ask questions and engage in discussions with the speakers. The discussions were lively and enlightening, with attendees sharing their own experiences and perspectives on the topic.&lt;/p&gt;

&lt;p&gt;These meetups ended with networking and refreshments, where attendees had the chance to mingle, exchange contacts, and continue the discussions in a more relaxed setting. It was a fantastic opportunity for attendees to connect with each other and build meaningful professional relationships.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb22xp2fvjl1h5wbqzg3y.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb22xp2fvjl1h5wbqzg3y.jpeg" alt="Image description" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Most exciting part of both meetups was quizzes which I hosted related to the content covered in sessions, and attendees truely enjoyed the quiz, We declared around 10 winners for each meetup, and awarded them with the goodies from EPAM and AWS🎁. Thanks to AWS User group Pune team for giving me the opportunity to be a Quizmaster to these meetups, and this could not be possible without a excellent and flawless quiz platform quizhub by konfhub technologies. Thanks to Ganesh and team for their assistance in setting up those quizzes!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6tscwu0v0hk5azfy6fx1.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6tscwu0v0hk5azfy6fx1.jpeg" alt="quiz fun" width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
I am incredibly proud of the success of this technical meetup with such a overwhelmed response and would like to extend my sincere thanks to all the attendees for making it such a memorable and productive event. I am already looking forward to the next meetup, and I hope to see many of you there!&lt;br&gt;
Thanks to my friend and our community’s social media hero Dheeraj choudhary for all his help for organising this venue, food and social media posts!&lt;br&gt;
Thanks to EPAM System Pune team for their venue sponsorship.&lt;/p&gt;

&lt;p&gt;I would like to express my gratitude to our UG community peer lead Toshal Khawale for mentoring and supporting us with all required things like speakers management, topics and slides selection as he had in-person attended the Re:invent at Las vegas in December 2022, and the  experience he shared with us helped us a lot in organising this meetup series.&lt;/p&gt;

&lt;p&gt;This post won’t be complete without thanking all volunteers of AWS UG Pune team and AWS community team &lt;strong&gt;Rohini Gaonkar, Ridhima Kapoor, Shafraz Rahim for all their love, support and motivation&lt;/strong&gt; which inspires us to host and speak at such great meetups!&lt;/p&gt;

&lt;p&gt;In conclusion, hosting this technical meetup series was a great way to bring together professionals and AWS enthusiasts from the IT field all over the pune, and to facilitate discussions and exchanges on a relevant and timely topic. &lt;em&gt;I was extremely delighted listening to the attendees feedback and observing that our AWS UG Pune community growing so fast!&lt;/em&gt; If you missed this one, be sure to keep an eye out for the next one!&lt;/p&gt;

&lt;p&gt;Best regards,&lt;/p&gt;

&lt;p&gt;Vishal Alhat&lt;/p&gt;

&lt;p&gt;co-organizer&lt;br&gt;
AWS User group, Pune&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>productivity</category>
      <category>softwaredevelopment</category>
    </item>
    <item>
      <title>AWS Community Day Pune 2022</title>
      <dc:creator>Vishal Alhat</dc:creator>
      <pubDate>Fri, 20 Jan 2023 13:54:03 +0000</pubDate>
      <link>https://dev.to/vishalcloud/aws-community-day-pune-2022-2p1l</link>
      <guid>https://dev.to/vishalcloud/aws-community-day-pune-2022-2p1l</guid>
      <description>&lt;p&gt;🎉🎉  𝐀𝐖𝐒 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐭𝐲 𝐃𝐚𝐲 𝐏𝐮𝐧𝐞 2022 🎉 🎉&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“The greatness of a community is most accurately measured by the dedicated actions of its members.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;With the continuous flow of overwhelming reviews and feedbacks on LinkedIn, Twitter, and Emails about AWS User Group Pune and AWS community day Pune 2022, I could really feel this greatness and I am feeling 😇 lucky to be a part of leading  team and 🤩 proud of my team behind this grandly successful event with around 600+ happy participants.&lt;/p&gt;

&lt;p&gt;𝑰 𝒉𝒐𝒑𝒆 𝒚𝒐𝒖 𝒂𝒍𝒍 𝒉𝒂𝒅 𝒂 𝒈𝒓𝒆𝒂𝒕 𝒕𝒊𝒎𝒆 𝒂𝒕 𝑨𝑾𝑺 𝑪𝒐𝒎𝒎𝒖𝒏𝒊𝒕𝒚 𝒅𝒂𝒚 𝑷𝒖𝒏𝒆 2022, 𝒂𝒏𝒅 𝒚𝒐𝒖 𝒉𝒂𝒅 𝒂𝒏𝒐𝒕𝒉𝒆𝒓 𝒍𝒆𝒗𝒆𝒍 𝒐𝒇 𝒍𝒆𝒂𝒓𝒏𝒊𝒏𝒈 𝒂𝒏𝒅 𝒏𝒆𝒕𝒘𝒐𝒓𝒌𝒊𝒏𝒈 🤝  𝒆𝒙𝒑𝒆𝒓𝒊𝒆𝒏𝒄𝒆! &lt;/p&gt;

&lt;p&gt;Planning for an event where we expected 550+ participants is not at all easy!, But the past experiences with ACD Pune 2020, passion and willingness about community, and with strong foundational mentorship and leadership support from Toshal Khawale, along with the forthright contribution from our core team members Dheeraj Choudhary, Somesh Srivastava Atul Kumbhar Akshay Ithape Anshul Upadhyay and others, we could plan and execute pre-event and event day activities, by overcoming many hurdles with the real hard team work and few sleepless nights! Post-event activities and success celebrations 🎊 🎂  are still going on! 🤗 &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;𝘓𝘦𝘵 𝘮𝘦 𝘵𝘢𝘬𝘦 𝘵𝘩𝘪𝘴 𝘮𝘰𝘮𝘦𝘯𝘵 𝘵𝘰 𝘵𝘩𝘢𝘯𝘬 𝘵𝘩𝘦 𝘸𝘩𝘰𝘭𝘦 𝘵𝘦𝘢𝘮, V𝘰𝘭𝘶𝘯𝘵𝘦𝘦𝘳𝘴, 𝘚𝘱𝘰𝘯𝘴𝘰𝘳𝘴, 𝘚𝘱𝘦𝘢𝘬𝘦𝘳𝘴, S𝘶𝘱𝘱𝘰𝘳𝘵𝘦𝘳𝘴, V𝘦𝘯𝘥𝘰𝘳𝘴, 𝘢𝘭𝘭 𝘰𝘵𝘩𝘦𝘳 𝘴𝘵𝘳𝘰𝘯𝘨 𝘱𝘪𝘭𝘭𝘢𝘳𝘴 𝘢𝘯𝘥 𝘢𝘭𝘭 𝘵𝘩𝘦 𝘶𝘯𝘴𝘶𝘯𝘨 𝘩𝘦𝘳𝘰’𝘴 𝘣𝘦𝘩𝘪𝘯𝘥 𝘵𝘩𝘪𝘴 𝘨𝘳𝘦𝘢𝘵 𝘦𝘷𝘦𝘯𝘵. 𝘛𝘰𝘨𝘦𝘵𝘩𝘦𝘳 𝘸𝘦 𝘳𝘢𝘪𝘴𝘦𝘥 𝘵𝘩𝘦 𝘣𝘢𝘳 𝘢𝘨𝘢𝘪𝘯 𝘵𝘰 𝘮𝘢𝘬𝘦 𝘵𝘩𝘪𝘴 𝘢 𝘣𝘦𝘴𝘵 𝘦𝘷𝘦𝘯𝘵. 🙌 &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;*&lt;em&gt;It wouldn't have been possible without the constant support from Shafraz Rahim 🌤 Farrah Campbell Ridhima Kapoor Rohini Gaonkar Jason Dunn Karissa Fuller and AWS User Group India Team! Thanks 🙏 *&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;💪Thanks to AWS UG Pune community and its 9000+ members for all the support and love ❤️. &lt;/p&gt;

&lt;p&gt;Let's make it bigger and stronger by continuing to contribute and share knowledge, and expanding our network with like-minded great people! 🤝 &lt;/p&gt;

&lt;p&gt;&lt;em&gt;The 🗾 Roadmap for 2023 🗓  is set, planned with many exciting meetups, workshops and sessions and we shall ensure the members benefit whomever they associate with. Let's build more with Amazon Web Services (AWS) ☁ !&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;👋 See you all at the next meetup! Follow and Keep watching the posts from AWS User Group Pune page for updates!&lt;/p&gt;

&lt;h1&gt;
  
  
  acdpune2022 #aws #awscloud #awsugpune #awsugindia #awscommunity #awsusergroups #awscommunityday #awscommunitybuilders #awsheroes #aws #serverless #awscommunity #awscertified #awscloud #aws #cloudcomputing #awscommunitybuilders #awsdeveloper #awsdevops #devops #share #thankyou #tech #pune #community #india #awsusergroup #awsusergroups #team #success
&lt;/h1&gt;

</description>
      <category>productivity</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
